1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981198219831984198519861987198819891990199119921993199419951996199719981999200020012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202420252026202720282029203020312032203320342035203620372038203920402041204220432044204520462047204820492050205120522053205420552056205720582059206020612062206320642065206620672068206920702071207220732074207520762077207820792080208120822083208420852086208720882089209020912092209320942095209620972098209921002101210221032104210521062107210821092110211121122113211421152116211721182119212021212122212321242125212621272128212921302131213221332134213521362137213821392140214121422143214421452146214721482149215021512152215321542155215621572158215921602161216221632164216521662167216821692170217121722173217421752176217721782179218021812182218321842185218621872188218921902191219221932194219521962197219821992200220122022203220422052206220722082209221022112212221322142215221622172218221922202221222222232224222522262227222822292230223122322233223422352236223722382239224022412242224322442245224622472248224922502251225222532254225522562257225822592260226122622263226422652266226722682269227022712272227322742275227622772278227922802281228222832284228522862287228822892290229122922293229422952296229722982299230023012302230323042305230623072308230923102311231223132314231523162317231823192320232123222323232423252326232723282329233023312332233323342335233623372338233923402341234223432344234523462347234823492350235123522353235423552356235723582359236023612362236323642365236623672368236923702371237223732374237523762377237823792380238123822383238423852386238723882389239023912392239323942395239623972398239924002401240224032404240524062407240824092410241124122413241424152416241724182419242024212422242324242425242624272428242924302431243224332434243524362437243824392440244124422443244424452446244724482449245024512452245324542455245624572458245924602461246224632464246524662467246824692470247124722473247424752476247724782479248024812482248324842485248624872488248924902491249224932494249524962497249824992500250125022503250425052506250725082509251025112512251325142515251625172518251925202521252225232524252525262527252825292530253125322533253425352536253725382539254025412542254325442545254625472548254925502551255225532554255525562557255825592560256125622563256425652566256725682569257025712572257325742575257625772578257925802581258225832584258525862587258825892590259125922593259425952596259725982599260026012602260326042605260626072608260926102611261226132614261526162617261826192620262126222623262426252626262726282629263026312632263326342635263626372638263926402641264226432644264526462647264826492650265126522653265426552656265726582659266026612662266326642665266626672668266926702671267226732674267526762677267826792680268126822683268426852686268726882689269026912692269326942695269626972698269927002701270227032704270527062707270827092710271127122713271427152716271727182719272027212722272327242725272627272728272927302731273227332734273527362737273827392740274127422743274427452746274727482749275027512752275327542755275627572758275927602761276227632764276527662767276827692770277127722773277427752776277727782779278027812782278327842785278627872788278927902791279227932794279527962797279827992800280128022803280428052806280728082809281028112812281328142815281628172818281928202821282228232824282528262827282828292830283128322833283428352836283728382839284028412842284328442845284628472848284928502851285228532854285528562857285828592860286128622863286428652866286728682869287028712872287328742875287628772878287928802881288228832884288528862887288828892890289128922893289428952896289728982899290029012902290329042905290629072908290929102911291229132914291529162917291829192920292129222923292429252926292729282929293029312932293329342935293629372938293929402941294229432944294529462947294829492950295129522953295429552956295729582959296029612962296329642965296629672968296929702971297229732974297529762977297829792980298129822983298429852986298729882989299029912992299329942995299629972998299930003001300230033004300530063007300830093010301130123013301430153016301730183019302030213022302330243025302630273028302930303031303230333034303530363037303830393040304130423043304430453046304730483049305030513052305330543055305630573058305930603061306230633064306530663067306830693070307130723073307430753076307730783079308030813082308330843085308630873088308930903091309230933094309530963097309830993100310131023103310431053106310731083109311031113112311331143115311631173118311931203121312231233124312531263127312831293130313131323133313431353136313731383139314031413142314331443145314631473148314931503151315231533154315531563157315831593160316131623163316431653166316731683169317031713172317331743175317631773178317931803181318231833184318531863187318831893190319131923193319431953196319731983199320032013202320332043205320632073208320932103211321232133214321532163217321832193220322132223223322432253226322732283229323032313232323332343235323632373238323932403241324232433244324532463247324832493250325132523253325432553256325732583259326032613262326332643265326632673268326932703271327232733274327532763277327832793280328132823283328432853286328732883289329032913292329332943295329632973298329933003301330233033304330533063307330833093310331133123313331433153316331733183319332033213322332333243325332633273328332933303331333233333334333533363337333833393340334133423343334433453346334733483349335033513352335333543355335633573358335933603361336233633364336533663367336833693370337133723373337433753376337733783379338033813382338333843385338633873388338933903391339233933394339533963397339833993400340134023403340434053406340734083409341034113412341334143415341634173418341934203421342234233424342534263427342834293430343134323433343434353436343734383439344034413442344334443445344634473448344934503451345234533454345534563457345834593460346134623463346434653466346734683469347034713472347334743475347634773478347934803481348234833484348534863487348834893490349134923493349434953496349734983499350035013502350335043505350635073508350935103511351235133514351535163517351835193520352135223523352435253526352735283529353035313532353335343535353635373538353935403541354235433544354535463547354835493550355135523553355435553556355735583559356035613562356335643565356635673568356935703571357235733574357535763577357835793580358135823583358435853586358735883589359035913592359335943595359635973598359936003601360236033604360536063607360836093610361136123613361436153616361736183619362036213622362336243625362636273628362936303631363236333634363536363637363836393640364136423643364436453646364736483649365036513652365336543655365636573658365936603661366236633664366536663667366836693670367136723673367436753676367736783679368036813682368336843685368636873688368936903691369236933694369536963697369836993700370137023703370437053706370737083709371037113712371337143715371637173718371937203721372237233724372537263727372837293730373137323733373437353736373737383739374037413742374337443745374637473748374937503751375237533754375537563757375837593760376137623763376437653766376737683769377037713772377337743775377637773778377937803781378237833784378537863787378837893790379137923793379437953796379737983799380038013802380338043805380638073808380938103811381238133814381538163817381838193820382138223823382438253826382738283829383038313832383338343835383638373838383938403841384238433844384538463847384838493850385138523853385438553856385738583859386038613862386338643865386638673868386938703871387238733874387538763877387838793880388138823883388438853886388738883889389038913892389338943895389638973898389939003901390239033904390539063907390839093910391139123913391439153916391739183919392039213922392339243925392639273928392939303931393239333934393539363937393839393940394139423943394439453946394739483949395039513952395339543955395639573958395939603961396239633964396539663967396839693970397139723973397439753976397739783979398039813982398339843985398639873988398939903991399239933994399539963997399839994000400140024003400440054006400740084009401040114012401340144015401640174018401940204021402240234024402540264027402840294030403140324033403440354036403740384039404040414042404340444045404640474048404940504051405240534054405540564057405840594060406140624063406440654066406740684069407040714072407340744075407640774078407940804081408240834084408540864087408840894090409140924093409440954096409740984099410041014102410341044105410641074108410941104111411241134114411541164117411841194120412141224123412441254126412741284129413041314132413341344135413641374138413941404141414241434144414541464147414841494150415141524153415441554156415741584159416041614162416341644165416641674168416941704171417241734174417541764177417841794180418141824183418441854186418741884189419041914192419341944195419641974198419942004201420242034204420542064207420842094210421142124213421442154216421742184219422042214222422342244225422642274228422942304231423242334234423542364237423842394240424142424243424442454246424742484249425042514252425342544255425642574258425942604261426242634264426542664267426842694270427142724273427442754276427742784279428042814282428342844285428642874288428942904291429242934294429542964297429842994300430143024303430443054306430743084309431043114312431343144315431643174318431943204321432243234324432543264327432843294330433143324333433443354336433743384339434043414342434343444345434643474348434943504351435243534354435543564357435843594360436143624363436443654366436743684369437043714372437343744375437643774378437943804381438243834384438543864387438843894390439143924393439443954396439743984399440044014402440344044405440644074408440944104411441244134414441544164417441844194420442144224423442444254426442744284429443044314432443344344435443644374438443944404441444244434444444544464447444844494450445144524453445444554456445744584459446044614462446344644465446644674468446944704471447244734474447544764477447844794480448144824483448444854486448744884489449044914492449344944495449644974498449945004501450245034504450545064507450845094510451145124513451445154516451745184519452045214522452345244525452645274528452945304531453245334534453545364537453845394540454145424543454445454546454745484549455045514552455345544555455645574558455945604561456245634564456545664567456845694570457145724573457445754576457745784579458045814582458345844585458645874588458945904591459245934594459545964597459845994600460146024603460446054606460746084609461046114612461346144615461646174618461946204621462246234624462546264627462846294630463146324633463446354636463746384639464046414642464346444645464646474648464946504651465246534654465546564657465846594660466146624663466446654666466746684669467046714672467346744675467646774678467946804681468246834684468546864687468846894690469146924693469446954696469746984699470047014702470347044705470647074708470947104711471247134714471547164717471847194720472147224723472447254726472747284729473047314732473347344735473647374738473947404741474247434744474547464747474847494750475147524753475447554756475747584759476047614762476347644765476647674768476947704771477247734774477547764777477847794780478147824783478447854786478747884789479047914792479347944795479647974798479948004801480248034804480548064807480848094810481148124813481448154816481748184819482048214822482348244825482648274828482948304831483248334834483548364837483848394840484148424843484448454846484748484849485048514852485348544855485648574858485948604861486248634864486548664867486848694870487148724873487448754876487748784879488048814882488348844885488648874888488948904891489248934894489548964897489848994900490149024903490449054906490749084909491049114912491349144915491649174918491949204921492249234924492549264927492849294930493149324933493449354936493749384939494049414942494349444945494649474948494949504951495249534954495549564957495849594960496149624963496449654966496749684969497049714972497349744975497649774978497949804981498249834984498549864987498849894990499149924993499449954996499749984999500050015002500350045005500650075008500950105011501250135014501550165017501850195020502150225023502450255026502750285029503050315032503350345035503650375038503950405041504250435044504550465047504850495050505150525053505450555056505750585059506050615062506350645065506650675068506950705071507250735074507550765077507850795080508150825083508450855086508750885089509050915092509350945095509650975098509951005101510251035104510551065107510851095110511151125113511451155116511751185119512051215122512351245125512651275128512951305131513251335134513551365137513851395140514151425143514451455146514751485149515051515152515351545155515651575158515951605161516251635164516551665167516851695170517151725173517451755176517751785179518051815182518351845185518651875188518951905191519251935194519551965197519851995200520152025203520452055206520752085209521052115212521352145215521652175218521952205221522252235224522552265227522852295230523152325233523452355236523752385239524052415242524352445245524652475248524952505251525252535254525552565257525852595260526152625263526452655266526752685269527052715272527352745275527652775278527952805281528252835284528552865287528852895290
Jul 08 16:12:23 dom0 kernel: Linux version 6.12.25-1.qubes.fc37.x86_64 (mockbuild@f5c1036f3e904c71ab30b706d129fc9f) (gcc (GCC) 12.3.1 20230508 (Red Hat 12.3.1-1), GNU ld version 2.38-27.fc37) #1 SMP PREEMPT_DYNAMIC Mon Apr 28 03:58:25 GMT 2025
Jul 08 16:12:23 dom0 kernel: Command line: placeholder root=/dev/mapper/qubes_dom0-root ro rd.md.uuid=7761fe0f:2417c99e:b3d5758b:85c6aa83 rd.luks.uuid=luks-c4157ae0-c1c9-4d2e-8ee9-9aecc2d9966d rd.lvm.lv=qubes_dom0/root rd.md.uuid=b8962e44:79f48918:4e54459c:9dffc52c rd.lvm.lv=qubes_dom0/swap plymouth.ignore-serial-consoles 6.6.36-1.qubes.fc37.x86_64 x86_64 rhgb quiet usbcore.authorized_default=0 fips=0 boot=UUID=498e4b33-4544-4195-b627-cd3391190a2d
Jul 08 16:12:23 dom0 kernel: [Firmware Bug]: TSC doesn't count with P0 frequency!
Jul 08 16:12:23 dom0 kernel: Released 0 page(s)
Jul 08 16:12:23 dom0 kernel: BIOS-provided physical RAM map:
Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x0000000000000000-0x000000000007ffff] usable
Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x0000000000080000-0x00000000000fffff] reserved
Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x0000000000100000-0x0000000009afffff] usable
Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x0000000009b00000-0x0000000009dfffff] reserved
Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x0000000009e00000-0x0000000009efffff] usable
Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x0000000009f00000-0x0000000009f3bfff] ACPI NVS
Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x0000000009f3c000-0x0000000049b5ffff] usable
Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x0000000049b60000-0x000000004bd5ffff] reserved
Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x000000004bd60000-0x000000004bd68fff] usable
Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x000000004bd69000-0x000000004bd6cfff] reserved
Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x000000004bd6d000-0x000000004bd6efff] usable
Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x000000004bd6f000-0x000000004bd6ffff] reserved
Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x000000004bd70000-0x0000000057f7efff] usable
Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x0000000057f7f000-0x000000005a77efff] reserved
Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x000000005a77f000-0x000000005af7efff] ACPI NVS
Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x000000005af7f000-0x000000005affefff] ACPI data
Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x000000005afff000-0x000000005affffff] usable
Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x000000005b000000-0x000000005bffffff] reserved
Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x000000005d790000-0x000000005d7effff] reserved
Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x000000005d7f5000-0x000000005fffffff] reserved
Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x00000000c0200000-0x00000000c0203fff] reserved
Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x00000000c0300000-0x00000000c03fffff] reserved
Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x00000000e0000000-0x00000000efffffff] reserved
Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x00000000fec00000-0x00000000fec01fff] reserved
Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x00000000fec10000-0x00000000fec10fff] reserved
Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x00000000fec20000-0x00000000fec20fff] reserved
Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x00000000fed80000-0x00000000fed81fff] reserved
Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x00000000fee00000-0x00000000feefffff] reserved
Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x00000000ff000000-0x00000000ffffffff] reserved
Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x0000000100000000-0x00000001aa640fff] usable
Jul 08 16:12:23 dom0 kernel: Xen: [mem 0x0000001020000000-0x00000010c01fffff] reserved
Jul 08 16:12:23 dom0 kernel: NX (Execute Disable) protection: active
Jul 08 16:12:23 dom0 kernel: APIC: Static calls initialized
Jul 08 16:12:23 dom0 kernel: efi: EFI v2.9 by INSYDE Corp.
Jul 08 16:12:23 dom0 kernel: efi: ACPI=0x5affe000 ACPI 2.0=0x5affe014 TPMFinalLog=0x5af3f000 SMBIOS=0x58e77000 SMBIOS 3.0=0x58e74000 (MEMATTR=0x52c7d018 unusable) ESRT=0x5af94018
Jul 08 16:12:23 dom0 kernel: SMBIOS 3.6.0 present.
Jul 08 16:12:23 dom0 kernel: DMI: Framework Laptop 16 (AMD Ryzen 7040 Series)/FRANMZCP07, BIOS 03.03 03/27/2024
Jul 08 16:12:23 dom0 kernel: DMI: Memory slots populated: 2/2
Jul 08 16:12:23 dom0 kernel: Hypervisor detected: Xen PV
Jul 08 16:12:23 dom0 kernel: Xen PV: Detected 8 vCPUS
Jul 08 16:12:23 dom0 kernel: tsc: Fast TSC calibration using PIT
Jul 08 16:12:23 dom0 kernel: tsc: Detected 3792.840 MHz processor
Jul 08 16:12:23 dom0 kernel: tsc: Detected 3792.862 MHz TSC
Jul 08 16:12:23 dom0 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved
Jul 08 16:12:23 dom0 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable
Jul 08 16:12:23 dom0 kernel: last_pfn = 0x1aa641 max_arch_pfn = 0x400000000
Jul 08 16:12:23 dom0 kernel: MTRR map: 3 entries (0 fixed + 3 variable; max 16), built from 8 variable MTRRs
Jul 08 16:12:23 dom0 kernel: MTRRs set to read-only
Jul 08 16:12:23 dom0 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT
Jul 08 16:12:23 dom0 kernel: last_pfn = 0x5b000 max_arch_pfn = 0x400000000
Jul 08 16:12:23 dom0 kernel: esrt: Reserving ESRT space from 0x000000005af94018 to 0x000000005af94050.
Jul 08 16:12:23 dom0 kernel: Secure boot disabled
Jul 08 16:12:23 dom0 kernel: RAMDISK: [mem 0x04000000-0x08336fff]
Jul 08 16:12:23 dom0 kernel: ACPI: Early table checksum verification disabled
Jul 08 16:12:23 dom0 kernel: ACPI: RSDP 0x000000005AFFE014 000024 (v02 INSYDE)
Jul 08 16:12:23 dom0 kernel: ACPI: XSDT 0x000000005AFAA228 0001A4 (v01 INSYDE EDK2 00000002 01000013)
Jul 08 16:12:23 dom0 kernel: ACPI: FACP 0x000000005AFEE000 00010C (v05 INSYDE EDK2 00000002 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: DSDT 0x000000005AFDE000 009ADE (v02 INSYDE EDK2 00000002 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: FACS 0x000000005AEB1000 000040
Jul 08 16:12:23 dom0 kernel: ACPI: UEFI 0x000000005AF67000 0001CF (v01 INSYDE EDK2 00000001 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFF4000 008416 (v02 INSYDE EDK2 00000002 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFF3000 00033E (v01 INSYDE EDK2 00001000 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFF1000 000ABD (v02 INSYDE EDK2 00001000 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: ASF! 0x000000005AFF0000 0000A5 (v32 INSYDE EDK2 00000002 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: BOOT 0x000000005AFEF000 000028 (v01 INSYDE EDK2 00000002 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: HPET 0x000000005AFED000 000038 (v01 INSYDE EDK2 00000002 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: APIC 0x000000005AFEC000 000138 (v03 INSYDE EDK2 00000002 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: MCFG 0x000000005AFEB000 00003C (v01 INSYDE EDK2 00000002 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: SLIC 0x000000005AFEA000 000176 (v01 INSYDE EDK2 00000002 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: VFCT 0x000000005AFD9000 004284 (v01 INSYDE EDK2 00000001 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFD8000 0000F8 (v02 INSYDE EDK2 00001000 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFD2000 00547E (v02 INSYDE EDK2 00000001 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: CRAT 0x000000005AFD1000 000F10 (v01 INSYDE EDK2 00000001 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: CDIT 0x000000005AFD0000 000029 (v01 INSYDE EDK2 00000001 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFCF000 000F8D (v02 INSYDE EDK2 00000001 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFCE000 000F41 (v02 INSYDE EDK2 00000001 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFFD000 0008CD (v02 INSYDE EDK2 00000001 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFCB000 001E78 (v02 INSYDE EDK2 00000001 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFCA000 00077A (v02 INSYDE EDK2 00000001 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFC9000 000737 (v02 INSYDE EDK2 00000001 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFC7000 0015C8 (v02 INSYDE EDK2 00000001 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFC4000 002AAB (v02 INSYDE EDK2 00000001 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFBA000 0098F6 (v02 INSYDE EDK2 00000001 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: FPDT 0x000000005AFB9000 000044 (v01 INSYDE EDK2 00000002 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: BGRT 0x000000005AFB8000 000038 (v01 INSYDE EDK2 00000002 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: WSMT 0x000000005AFB7000 000028 (v01 INSYDE EDK2 00000001 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: TPM2 0x000000005AFE9000 000050 (v05 INSYDE EDK2 20505348 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFB4000 002370 (v02 INSYDE EDK2 00000001 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: MHSP 0x000000005AFE8000 0000C8 (v04 INSYDE EDK2 20505348 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFB3000 0000E5 (v02 INSYDE EDK2 00000004 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: IVRS 0x000000005AFB2000 000198 (v02 INSYDE EDK2 00000001 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFB1000 000C44 (v01 INSYDE EDK2 00000001 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFB0000 00074A (v02 INSYDE EDK2 00000001 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFAF000 000C3A (v02 INSYDE EDK2 00000001 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFAE000 00074A (v02 INSYDE EDK2 00000001 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFAD000 000C3A (v02 INSYDE EDK2 00000001 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFAC000 000A3A (v02 INSYDE EDK2 00000001 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFAB000 000057 (v02 INSYDE EDK2 00000001 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFA8000 001743 (v02 INSYDE EDK2 00000001 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AFCD000 000FF7 (v02 INSYDE EDK2 00000001 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AF9E000 0098BD (v02 INSYDE EDK2 00000001 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AF99000 004FEB (v02 INSYDE EDK2 00000001 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AF98000 000D41 (v02 INSYDE EDK2 00000001 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AF97000 000968 (v02 INSYDE EDK2 00000001 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AF96000 00008D (v02 INSYDE EDK2 00000001 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: SSDT 0x000000005AF95000 000FF5 (v02 INSYDE EDK2 00000001 ACPI 00040000)
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving FACP table memory at [mem 0x5afee000-0x5afee10b]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving DSDT table memory at [mem 0x5afde000-0x5afe7add]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving FACS table memory at [mem 0x5aeb1000-0x5aeb103f]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving UEFI table memory at [mem 0x5af67000-0x5af671ce]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5aff4000-0x5affc415]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5aff3000-0x5aff333d]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5aff1000-0x5aff1abc]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving ASF! table memory at [mem 0x5aff0000-0x5aff00a4]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving BOOT table memory at [mem 0x5afef000-0x5afef027]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving HPET table memory at [mem 0x5afed000-0x5afed037]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving APIC table memory at [mem 0x5afec000-0x5afec137]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving MCFG table memory at [mem 0x5afeb000-0x5afeb03b]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SLIC table memory at [mem 0x5afea000-0x5afea175]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving VFCT table memory at [mem 0x5afd9000-0x5afdd283]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5afd8000-0x5afd80f7]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5afd2000-0x5afd747d]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving CRAT table memory at [mem 0x5afd1000-0x5afd1f0f]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving CDIT table memory at [mem 0x5afd0000-0x5afd0028]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5afcf000-0x5afcff8c]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5afce000-0x5afcef40]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5affd000-0x5affd8cc]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5afcb000-0x5afcce77]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5afca000-0x5afca779]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5afc9000-0x5afc9736]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5afc7000-0x5afc85c7]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5afc4000-0x5afc6aaa]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5afba000-0x5afc38f5]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving FPDT table memory at [mem 0x5afb9000-0x5afb9043]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving BGRT table memory at [mem 0x5afb8000-0x5afb8037]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving WSMT table memory at [mem 0x5afb7000-0x5afb7027]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving TPM2 table memory at [mem 0x5afe9000-0x5afe904f]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5afb4000-0x5afb636f]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving MHSP table memory at [mem 0x5afe8000-0x5afe80c7]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5afb3000-0x5afb30e4]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving IVRS table memory at [mem 0x5afb2000-0x5afb2197]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5afb1000-0x5afb1c43]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5afb0000-0x5afb0749]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5afaf000-0x5afafc39]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5afae000-0x5afae749]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5afad000-0x5afadc39]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5afac000-0x5afaca39]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5afab000-0x5afab056]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5afa8000-0x5afa9742]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5afcd000-0x5afcdff6]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5af9e000-0x5afa78bc]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5af99000-0x5af9dfea]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5af98000-0x5af98d40]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5af97000-0x5af97967]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5af96000-0x5af9608c]
Jul 08 16:12:23 dom0 kernel: ACPI: Reserving SSDT table memory at [mem 0x5af95000-0x5af95ff4]
Jul 08 16:12:23 dom0 kernel: APIC: Switched APIC routing to: Xen PV
Jul 08 16:12:23 dom0 kernel: NUMA turned off
Jul 08 16:12:23 dom0 kernel: Faking a node at [mem 0x0000000000000000-0x00000001aa640fff]
Jul 08 16:12:23 dom0 kernel: NODE_DATA(0) allocated [mem 0x5777d2c0-0x577a7fff]
Jul 08 16:12:23 dom0 kernel: Zone ranges:
Jul 08 16:12:23 dom0 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff]
Jul 08 16:12:23 dom0 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff]
Jul 08 16:12:23 dom0 kernel: Normal [mem 0x0000000100000000-0x00000001aa640fff]
Jul 08 16:12:23 dom0 kernel: Device empty
Jul 08 16:12:23 dom0 kernel: Movable zone start for each node
Jul 08 16:12:23 dom0 kernel: Early memory node ranges
Jul 08 16:12:23 dom0 kernel: node 0: [mem 0x0000000000001000-0x000000000007ffff]
Jul 08 16:12:23 dom0 kernel: node 0: [mem 0x0000000000100000-0x0000000009afffff]
Jul 08 16:12:23 dom0 kernel: node 0: [mem 0x0000000009e00000-0x0000000009efffff]
Jul 08 16:12:23 dom0 kernel: node 0: [mem 0x0000000009f3c000-0x0000000049b5ffff]
Jul 08 16:12:23 dom0 kernel: node 0: [mem 0x000000004bd60000-0x000000004bd68fff]
Jul 08 16:12:23 dom0 kernel: node 0: [mem 0x000000004bd6d000-0x000000004bd6efff]
Jul 08 16:12:23 dom0 kernel: node 0: [mem 0x000000004bd70000-0x0000000057f7efff]
Jul 08 16:12:23 dom0 kernel: node 0: [mem 0x000000005afff000-0x000000005affffff]
Jul 08 16:12:23 dom0 kernel: node 0: [mem 0x0000000100000000-0x00000001aa640fff]
Jul 08 16:12:23 dom0 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x00000001aa640fff]
Jul 08 16:12:23 dom0 kernel: On node 0, zone DMA: 1 pages in unavailable ranges
Jul 08 16:12:23 dom0 kernel: On node 0, zone DMA: 128 pages in unavailable ranges
Jul 08 16:12:23 dom0 kernel: On node 0, zone DMA32: 768 pages in unavailable ranges
Jul 08 16:12:23 dom0 kernel: On node 0, zone DMA32: 60 pages in unavailable ranges
Jul 08 16:12:23 dom0 kernel: On node 0, zone DMA32: 8704 pages in unavailable ranges
Jul 08 16:12:23 dom0 kernel: On node 0, zone DMA32: 4 pages in unavailable ranges
Jul 08 16:12:23 dom0 kernel: On node 0, zone DMA32: 1 pages in unavailable ranges
Jul 08 16:12:23 dom0 kernel: On node 0, zone DMA32: 12416 pages in unavailable ranges
Jul 08 16:12:23 dom0 kernel: On node 0, zone Normal: 20480 pages in unavailable ranges
Jul 08 16:12:23 dom0 kernel: On node 0, zone Normal: 22975 pages in unavailable ranges
Jul 08 16:12:23 dom0 kernel: p2m virtual area at (____ptrval____), size is 40000000
Jul 08 16:12:23 dom0 kernel: Remapped 697921 page(s)
Jul 08 16:12:23 dom0 kernel: Remapped 0 non-RAM page(s)
Jul 08 16:12:23 dom0 kernel: ACPI: PM-Timer IO Port: 0x408
Jul 08 16:12:23 dom0 kernel: CPU topo: CPU limit of 8 reached. Ignoring further CPUs
Jul 08 16:12:23 dom0 kernel: ACPI: LAPIC_NMI (acpi_id[0x00] high edge lint[0x1])
Jul 08 16:12:23 dom0 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1])
Jul 08 16:12:23 dom0 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1])
Jul 08 16:12:23 dom0 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1])
Jul 08 16:12:23 dom0 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1])
Jul 08 16:12:23 dom0 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1])
Jul 08 16:12:23 dom0 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1])
Jul 08 16:12:23 dom0 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1])
Jul 08 16:12:23 dom0 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1])
Jul 08 16:12:23 dom0 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1])
Jul 08 16:12:23 dom0 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1])
Jul 08 16:12:23 dom0 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1])
Jul 08 16:12:23 dom0 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1])
Jul 08 16:12:23 dom0 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1])
Jul 08 16:12:23 dom0 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1])
Jul 08 16:12:23 dom0 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1])
Jul 08 16:12:23 dom0 kernel: IOAPIC[0]: apic_id 33, version 33, address 0xfec00000, GSI 0-23
Jul 08 16:12:23 dom0 kernel: IOAPIC[1]: apic_id 34, version 33, address 0xfec01000, GSI 24-55
Jul 08 16:12:23 dom0 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl)
Jul 08 16:12:23 dom0 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 low level)
Jul 08 16:12:23 dom0 kernel: ACPI: Using ACPI (MADT) for SMP configuration information
Jul 08 16:12:23 dom0 kernel: ACPI: HPET id: 0x10228210 base: 0xfed00000
Jul 08 16:12:23 dom0 kernel: CPU topo: Max. logical packages: 1
Jul 08 16:12:23 dom0 kernel: CPU topo: Max. logical dies: 1
Jul 08 16:12:23 dom0 kernel: CPU topo: Max. dies per package: 1
Jul 08 16:12:23 dom0 kernel: CPU topo: Max. threads per core: 1
Jul 08 16:12:23 dom0 kernel: CPU topo: Num. cores per package: 8
Jul 08 16:12:23 dom0 kernel: CPU topo: Num. threads per package: 8
Jul 08 16:12:23 dom0 kernel: CPU topo: Allowing 8 present CPUs plus 0 hotplug CPUs
Jul 08 16:12:23 dom0 kernel: CPU topo: Rejected CPUs 8
Jul 08 16:12:23 dom0 kernel: [mem 0x60000000-0xc01fffff] available for PCI devices
Jul 08 16:12:23 dom0 kernel: Booting kernel on Xen
Jul 08 16:12:23 dom0 kernel: Xen version: 4.17.5 (preserve-AD)
Jul 08 16:12:23 dom0 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns
Jul 08 16:12:23 dom0 kernel: setup_percpu: NR_CPUS:8192 nr_cpumask_bits:8 nr_cpu_ids:8 nr_node_ids:1
Jul 08 16:12:23 dom0 kernel: percpu: Embedded 88 pages/cpu s237568 r8192 d114688 u524288
Jul 08 16:12:23 dom0 kernel: pcpu-alloc: s237568 r8192 d114688 u524288 alloc=1*2097152
Jul 08 16:12:23 dom0 kernel: pcpu-alloc: [0] 0 1 2 3 [0] 4 5 6 7
Jul 08 16:12:23 dom0 kernel: xen: PV spinlocks enabled
Jul 08 16:12:23 dom0 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear)
Jul 08 16:12:23 dom0 kernel: Kernel command line: placeholder root=/dev/mapper/qubes_dom0-root ro rd.md.uuid=7761fe0f:2417c99e:b3d5758b:85c6aa83 rd.luks.uuid=luks-c4157ae0-c1c9-4d2e-8ee9-9aecc2d9966d rd.lvm.lv=qubes_dom0/root rd.md.uuid=b8962e44:79f48918:4e54459c:9dffc52c rd.lvm.lv=qubes_dom0/swap plymouth.ignore-serial-consoles 6.6.36-1.qubes.fc37.x86_64 x86_64 rhgb quiet usbcore.authorized_default=0 fips=0 boot=UUID=498e4b33-4544-4195-b627-cd3391190a2d
Jul 08 16:12:23 dom0 kernel: fips mode: disabled
Jul 08 16:12:23 dom0 kernel: Unknown kernel command line parameters "placeholder x86_64 rhgb boot=UUID=498e4b33-4544-4195-b627-cd3391190a2d", will be passed to user space.
Jul 08 16:12:23 dom0 kernel: random: crng init done
Jul 08 16:12:23 dom0 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear)
Jul 08 16:12:23 dom0 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear)
Jul 08 16:12:23 dom0 kernel: Fallback order for Node 0: 0
Jul 08 16:12:23 dom0 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1048575
Jul 08 16:12:23 dom0 kernel: Policy zone: Normal
Jul 08 16:12:23 dom0 kernel: mem auto-init: stack:all(zero), heap alloc:on, heap free:on
Jul 08 16:12:23 dom0 kernel: mem auto-init: clearing system memory may take some time...
Jul 08 16:12:23 dom0 kernel: software IO TLB: area num 8.
Jul 08 16:12:23 dom0 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=8, Nodes=1
Jul 08 16:12:23 dom0 kernel: ftrace: allocating 59429 entries in 233 pages
Jul 08 16:12:23 dom0 kernel: ftrace: allocated 233 pages with 5 groups
Jul 08 16:12:23 dom0 kernel: Dynamic Preempt: full
Jul 08 16:12:23 dom0 kernel: rcu: Preemptible hierarchical RCU implementation.
Jul 08 16:12:23 dom0 kernel: rcu: RCU event tracing is enabled.
Jul 08 16:12:23 dom0 kernel: rcu: RCU restricting CPUs from NR_CPUS=8192 to nr_cpu_ids=8.
Jul 08 16:12:23 dom0 kernel: Trampoline variant of Tasks RCU enabled.
Jul 08 16:12:23 dom0 kernel: Rude variant of Tasks RCU enabled.
Jul 08 16:12:23 dom0 kernel: Tracing variant of Tasks RCU enabled.
Jul 08 16:12:23 dom0 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies.
Jul 08 16:12:23 dom0 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=8
Jul 08 16:12:23 dom0 kernel: RCU Tasks: Setting shift to 3 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=8.
Jul 08 16:12:23 dom0 kernel: RCU Tasks Rude: Setting shift to 3 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=8.
Jul 08 16:12:23 dom0 kernel: RCU Tasks Trace: Setting shift to 3 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=8.
Jul 08 16:12:23 dom0 kernel: NR_IRQS: 524544, nr_irqs: 1032, preallocated irqs: 16
Jul 08 16:12:23 dom0 kernel: xen:events: Using FIFO-based ABI
Jul 08 16:12:23 dom0 kernel: xen: --> pirq=1 -> irq=1 (gsi=1)
Jul 08 16:12:23 dom0 kernel: xen: --> pirq=2 -> irq=2 (gsi=2)
Jul 08 16:12:23 dom0 kernel: xen: --> pirq=3 -> irq=3 (gsi=3)
Jul 08 16:12:23 dom0 kernel: xen: --> pirq=4 -> irq=4 (gsi=4)
Jul 08 16:12:23 dom0 kernel: xen: --> pirq=5 -> irq=5 (gsi=5)
Jul 08 16:12:23 dom0 kernel: xen: --> pirq=6 -> irq=6 (gsi=6)
Jul 08 16:12:23 dom0 kernel: xen: --> pirq=7 -> irq=7 (gsi=7)
Jul 08 16:12:23 dom0 kernel: xen: --> pirq=8 -> irq=8 (gsi=8)
Jul 08 16:12:23 dom0 kernel: xen: --> pirq=9 -> irq=9 (gsi=9)
Jul 08 16:12:23 dom0 kernel: xen: --> pirq=10 -> irq=10 (gsi=10)
Jul 08 16:12:23 dom0 kernel: xen: --> pirq=11 -> irq=11 (gsi=11)
Jul 08 16:12:23 dom0 kernel: xen: --> pirq=12 -> irq=12 (gsi=12)
Jul 08 16:12:23 dom0 kernel: xen: --> pirq=13 -> irq=13 (gsi=13)
Jul 08 16:12:23 dom0 kernel: xen: --> pirq=14 -> irq=14 (gsi=14)
Jul 08 16:12:23 dom0 kernel: xen: --> pirq=15 -> irq=15 (gsi=15)
Jul 08 16:12:23 dom0 kernel: rcu: srcu_init: Setting srcu_struct sizes based on contention.
Jul 08 16:12:23 dom0 kernel: kfence: initialized - using 2097152 bytes for 255 objects at 0x(____ptrval____)-0x(____ptrval____)
Jul 08 16:12:23 dom0 kernel: Console: colour dummy device 80x25
Jul 08 16:12:23 dom0 kernel: printk: legacy console [tty0] enabled
Jul 08 16:12:23 dom0 kernel: printk: legacy console [hvc0] enabled
Jul 08 16:12:23 dom0 kernel: ACPI: Core revision 20240827
Jul 08 16:12:23 dom0 kernel: ACPI BIOS Warning (bug): Incorrect checksum in table [BGRT] - 0xC3, should be 0x0C (20240827/utcksum-58)
Jul 08 16:12:23 dom0 kernel: clocksource: xen: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns
Jul 08 16:12:23 dom0 kernel: Xen: using vcpuop timer interface
Jul 08 16:12:23 dom0 kernel: installing Xen timer for CPU 0
Jul 08 16:12:23 dom0 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x6d58014d282, max_idle_ns: 881590509159 ns
Jul 08 16:12:23 dom0 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 7585.72 BogoMIPS (lpj=3792862)
Jul 08 16:12:23 dom0 kernel: Last level iTLB entries: 4KB 512, 2MB 512, 4MB 256
Jul 08 16:12:23 dom0 kernel: Last level dTLB entries: 4KB 3072, 2MB 3072, 4MB 1536, 1GB 0
Jul 08 16:12:23 dom0 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization
Jul 08 16:12:23 dom0 kernel: Spectre V2 : Mitigation: Retpolines
Jul 08 16:12:23 dom0 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch
Jul 08 16:12:23 dom0 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT
Jul 08 16:12:23 dom0 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier
Jul 08 16:12:23 dom0 kernel: Speculative Store Bypass: Vulnerable
Jul 08 16:12:23 dom0 kernel: Speculative Return Stack Overflow: Mitigation: Safe RET
Jul 08 16:12:23 dom0 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers'
Jul 08 16:12:23 dom0 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers'
Jul 08 16:12:23 dom0 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers'
Jul 08 16:12:23 dom0 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask'
Jul 08 16:12:23 dom0 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256'
Jul 08 16:12:23 dom0 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256'
Jul 08 16:12:23 dom0 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256
Jul 08 16:12:23 dom0 kernel: x86/fpu: xstate_offset[5]: 832, xstate_sizes[5]: 64
Jul 08 16:12:23 dom0 kernel: x86/fpu: xstate_offset[6]: 896, xstate_sizes[6]: 512
Jul 08 16:12:23 dom0 kernel: x86/fpu: xstate_offset[7]: 1408, xstate_sizes[7]: 1024
Jul 08 16:12:23 dom0 kernel: x86/fpu: Enabled xstate features 0xe7, context size is 2432 bytes, using 'compacted' format.
Jul 08 16:12:23 dom0 kernel: Freeing SMP alternatives memory: 52K
Jul 08 16:12:23 dom0 kernel: pid_max: default: 32768 minimum: 301
Jul 08 16:12:23 dom0 kernel: LSM: initializing lsm=lockdown,capability,yama,ima,evm
Jul 08 16:12:23 dom0 kernel: Yama: becoming mindful.
Jul 08 16:12:23 dom0 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear)
Jul 08 16:12:23 dom0 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear)
Jul 08 16:12:23 dom0 kernel: cpu 0 spinlock event irq 57
Jul 08 16:12:23 dom0 kernel: VPMU disabled by hypervisor.
Jul 08 16:12:23 dom0 kernel: Performance Events: PMU not available due to virtualization, using software events only.
Jul 08 16:12:23 dom0 kernel: signal: max sigframe size: 3376
Jul 08 16:12:23 dom0 kernel: rcu: Hierarchical SRCU implementation.
Jul 08 16:12:23 dom0 kernel: rcu: Max phase no-delay instances is 400.
Jul 08 16:12:23 dom0 kernel: Timer migration: 1 hierarchy levels; 8 children per group; 1 crossnode level
Jul 08 16:12:23 dom0 kernel: NMI watchdog: Perf NMI watchdog permanently disabled
Jul 08 16:12:23 dom0 kernel: smp: Bringing up secondary CPUs ...
Jul 08 16:12:23 dom0 kernel: installing Xen timer for CPU 1
Jul 08 16:12:23 dom0 kernel: installing Xen timer for CPU 2
Jul 08 16:12:23 dom0 kernel: installing Xen timer for CPU 3
Jul 08 16:12:23 dom0 kernel: installing Xen timer for CPU 4
Jul 08 16:12:23 dom0 kernel: installing Xen timer for CPU 5
Jul 08 16:12:23 dom0 kernel: installing Xen timer for CPU 6
Jul 08 16:12:23 dom0 kernel: installing Xen timer for CPU 7
Jul 08 16:12:23 dom0 kernel: cpu 1 spinlock event irq 97
Jul 08 16:12:23 dom0 kernel: cpu 2 spinlock event irq 98
Jul 08 16:12:23 dom0 kernel: cpu 3 spinlock event irq 99
Jul 08 16:12:23 dom0 kernel: cpu 4 spinlock event irq 100
Jul 08 16:12:23 dom0 kernel: cpu 5 spinlock event irq 101
Jul 08 16:12:23 dom0 kernel: cpu 6 spinlock event irq 102
Jul 08 16:12:23 dom0 kernel: cpu 7 spinlock event irq 103
Jul 08 16:12:23 dom0 kernel: smp: Brought up 1 node, 8 CPUs
Jul 08 16:12:23 dom0 kernel: Memory: 3897752K/4194300K available (20480K kernel code, 4361K rwdata, 10052K rodata, 5588K init, 5944K bss, 283168K reserved, 0K cma-reserved)
Jul 08 16:12:23 dom0 kernel: devtmpfs: initialized
Jul 08 16:12:23 dom0 kernel: x86/mm: Memory block size: 128MB
Jul 08 16:12:23 dom0 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x09f00000-0x09f3bfff] (245760 bytes)
Jul 08 16:12:23 dom0 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x5a77f000-0x5af7efff] (8388608 bytes)
Jul 08 16:12:23 dom0 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns
Jul 08 16:12:23 dom0 kernel: futex hash table entries: 2048 (order: 5, 131072 bytes, linear)
Jul 08 16:12:23 dom0 kernel: pinctrl core: initialized pinctrl subsystem
Jul 08 16:12:23 dom0 kernel: PM: RTC time: 21:12:22, date: 2025-07-08
Jul 08 16:12:23 dom0 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family
Jul 08 16:12:23 dom0 kernel: xen:grant_table: Grant tables using version 1 layout
Jul 08 16:12:23 dom0 kernel: Grant table initialized
Jul 08 16:12:23 dom0 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations
Jul 08 16:12:23 dom0 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations
Jul 08 16:12:23 dom0 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations
Jul 08 16:12:23 dom0 kernel: audit: initializing netlink subsys (disabled)
Jul 08 16:12:23 dom0 kernel: audit: type=2000 audit(1752009143.568:1): state=initialized audit_enabled=0 res=1
Jul 08 16:12:23 dom0 kernel: thermal_sys: Registered thermal governor 'fair_share'
Jul 08 16:12:23 dom0 kernel: thermal_sys: Registered thermal governor 'bang_bang'
Jul 08 16:12:23 dom0 kernel: thermal_sys: Registered thermal governor 'step_wise'
Jul 08 16:12:23 dom0 kernel: thermal_sys: Registered thermal governor 'user_space'
Jul 08 16:12:23 dom0 kernel: Simple Boot Flag at 0x44 set to 0x1
Jul 08 16:12:23 dom0 kernel: PCI: ECAM [mem 0xe0000000-0xefffffff] (base 0xe0000000) for domain 0000 [bus 00-ff]
Jul 08 16:12:23 dom0 kernel: PCI: Using configuration type 1 for base access
Jul 08 16:12:23 dom0 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible.
Jul 08 16:12:23 dom0 kernel: cryptd: max_cpu_qlen set to 1000
Jul 08 16:12:23 dom0 kernel: raid6: skipped pq benchmark and selected avx512x4
Jul 08 16:12:23 dom0 kernel: raid6: using avx512x2 recovery algorithm
Jul 08 16:12:23 dom0 kernel: ACPI: Added _OSI(Module Device)
Jul 08 16:12:23 dom0 kernel: ACPI: Added _OSI(Processor Device)
Jul 08 16:12:23 dom0 kernel: ACPI: Added _OSI(3.0 _SCP Extensions)
Jul 08 16:12:23 dom0 kernel: ACPI: Added _OSI(Processor Aggregator Device)
Jul 08 16:12:23 dom0 kernel: ACPI: 32 ACPI AML tables successfully acquired and loaded
Jul 08 16:12:23 dom0 kernel: xen: registering gsi 9 triggering 0 polarity 1
Jul 08 16:12:23 dom0 kernel: ACPI: USB4 _OSC: OS supports USB3+ DisplayPort+ PCIe+ XDomain+
Jul 08 16:12:23 dom0 kernel: ACPI: USB4 _OSC: OS controls USB3+ DisplayPort+ PCIe+ XDomain+
Jul 08 16:12:23 dom0 kernel: ACPI: EC: EC started
Jul 08 16:12:23 dom0 kernel: ACPI: EC: interrupt blocked
Jul 08 16:12:23 dom0 kernel: ACPI: EC: EC_CMD/EC_SC=0x66, EC_DATA=0x62
Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PCI0.LPC0.EC0_: Boot DSDT EC used to handle transactions
Jul 08 16:12:23 dom0 kernel: ACPI: Interpreter enabled
Jul 08 16:12:23 dom0 kernel: ACPI: PM: (supports S0 S5)
Jul 08 16:12:23 dom0 kernel: ACPI: Using IOAPIC for interrupt routing
Jul 08 16:12:23 dom0 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug
Jul 08 16:12:23 dom0 kernel: PCI: Ignoring E820 reservations for host bridge windows
Jul 08 16:12:23 dom0 kernel: ACPI: Enabled 3 GPEs in block 00 to 1F
Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PCI0.GPP1.P0NV: New power resource
Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PCI0.GPP6.PWSR: New power resource
Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PCI0.GPP8.P0NV: New power resource
Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PCI0.GP11.PWRS: New power resource
Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PCI0.GP11.SWUS.PWRS: New power resource
Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PCI0.GP12.PWRS: New power resource
Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PCI0.GP12.SWUS.PWRS: New power resource
Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PCI0.GP17.PWRS: New power resource
Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PCI0.GP17.VGA_.PWRS: New power resource
Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PCI0.GP17.ACP_.PWRS: New power resource
Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PCI0.GP17.AZAL.PWRS: New power resource
Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PCI0.GP17.HDAU.PWRS: New power resource
Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PCI0.GP17.XHC0.PWRS: New power resource
Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PCI0.GP17.XHC1.PWRS: New power resource
Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PCI0.GP19.XHC2.PWRS: New power resource
Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PCI0.GP19.NHI0.PWRS: New power resource
Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PCI0.GP19.XHC3.PWRS: New power resource
Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PCI0.GP19.NHI1.PWRS: New power resource
Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PCI0.GP19.XHC4.PWRS: New power resource
Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PRWL: New power resource
Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PRWB: New power resource
Jul 08 16:12:23 dom0 kernel: ACPI: Unable to map lapic to logical cpu number
Jul 08 16:12:23 dom0 kernel: ACPI: Unable to map lapic to logical cpu number
Jul 08 16:12:23 dom0 kernel: ACPI: Unable to map lapic to logical cpu number
Jul 08 16:12:23 dom0 kernel: ACPI: Unable to map lapic to logical cpu number
Jul 08 16:12:23 dom0 kernel: ACPI: Unable to map lapic to logical cpu number
Jul 08 16:12:23 dom0 kernel: ACPI: Unable to map lapic to logical cpu number
Jul 08 16:12:23 dom0 kernel: ACPI: Unable to map lapic to logical cpu number
Jul 08 16:12:23 dom0 kernel: ACPI: Unable to map lapic to logical cpu number
Jul 08 16:12:23 dom0 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff])
Jul 08 16:12:23 dom0 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI EDR HPX-Type3]
Jul 08 16:12:23 dom0 kernel: acpi PNP0A08:00: _OSC: platform does not support [AER]
Jul 08 16:12:23 dom0 kernel: acpi PNP0A08:00: _OSC: OS now controls [PME PCIeCapability LTR DPC]
Jul 08 16:12:23 dom0 kernel: PCI host bridge to bus 0000:00
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: root bus resource [mem 0x000c0000-0x000cffff window]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: root bus resource [mem 0x000d0000-0x000effff window]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: root bus resource [mem 0x60000000-0x90cfffff window]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: root bus resource [mem 0xf0000000-0xfec00000 window]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: root bus resource [mem 0xfed45000-0xfed814ff window]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: root bus resource [mem 0xfed81900-0xfed81fff window]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: root bus resource [mem 0xfedc0000-0xfedc0fff window]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: root bus resource [mem 0xfedc6000-0xfedc6fff window]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: root bus resource [mem 0x10c0200000-0x891fffffff window]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: root bus resource [bus 00-ff]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:00.0: [1022:14e8] type 00 class 0x060000 conventional PCI endpoint
Jul 08 16:12:23 dom0 kernel: pci 0000:00:00.2: [1022:14e9] type 00 class 0x080600 conventional PCI endpoint
Jul 08 16:12:23 dom0 kernel: pci 0000:00:01.0: [1022:14ea] type 00 class 0x060000 conventional PCI endpoint
Jul 08 16:12:23 dom0 kernel: pci 0000:00:01.2: [1022:14ed] type 01 class 0x060400 PCIe Root Port
Jul 08 16:12:23 dom0 kernel: pci 0000:00:01.2: PCI bridge to [bus 01]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:01.2: bridge window [mem 0x90c00000-0x90cfffff]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:01.2: PME# supported from D0 D3hot D3cold
Jul 08 16:12:23 dom0 kernel: pci 0000:00:02.0: [1022:14ea] type 00 class 0x060000 conventional PCI endpoint
Jul 08 16:12:23 dom0 kernel: pci 0000:00:02.2: [1022:14ee] type 01 class 0x060400 PCIe Root Port
Jul 08 16:12:23 dom0 kernel: pci 0000:00:02.2: PCI bridge to [bus 02]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:02.2: bridge window [mem 0x90b00000-0x90bfffff]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:02.2: bridge window [mem 0x8810900000-0x88109fffff 64bit pref]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:02.2: PME# supported from D0 D3hot D3cold
Jul 08 16:12:23 dom0 kernel: pci 0000:00:02.4: [1022:14ee] type 01 class 0x060400 PCIe Root Port
Jul 08 16:12:23 dom0 kernel: pci 0000:00:02.4: PCI bridge to [bus 03]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:02.4: bridge window [mem 0x90a00000-0x90afffff]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:02.4: PME# supported from D0 D3hot D3cold
Jul 08 16:12:23 dom0 kernel: pci 0000:00:03.0: [1022:14ea] type 00 class 0x060000 conventional PCI endpoint
Jul 08 16:12:23 dom0 kernel: pci 0000:00:03.1: [1022:14ef] type 01 class 0x060400 PCIe Root Port
Jul 08 16:12:23 dom0 kernel: pci 0000:00:03.1: PCI bridge to [bus 04-62]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:03.1: bridge window [io 0x6000-0x9fff]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:03.1: bridge window [mem 0x78000000-0x8fffffff]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:03.1: bridge window [mem 0x7800000000-0x87ffffffff 64bit pref]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:03.1: PME# supported from D0 D3hot D3cold
Jul 08 16:12:23 dom0 kernel: pci 0000:00:04.0: [1022:14ea] type 00 class 0x060000 conventional PCI endpoint
Jul 08 16:12:23 dom0 kernel: pci 0000:00:04.1: [1022:14ef] type 01 class 0x060400 PCIe Root Port
Jul 08 16:12:23 dom0 kernel: pci 0000:00:04.1: PCI bridge to [bus 63-c1]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:04.1: bridge window [io 0x2000-0x5fff]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:04.1: bridge window [mem 0x60000000-0x77ffffff]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:04.1: bridge window [mem 0x6800000000-0x77ffffffff 64bit pref]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:04.1: PME# supported from D0 D3hot D3cold
Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.0: [1022:14ea] type 00 class 0x060000 conventional PCI endpoint
Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.1: [1022:14eb] type 01 class 0x060400 PCIe Root Port
Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.1: PCI bridge to [bus c2]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.1: bridge window [io 0x1000-0x1fff]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.1: bridge window [mem 0x90000000-0x905fffff]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.1: bridge window [mem 0x8800000000-0x88107fffff 64bit pref]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.1: enabling Extended Tags
Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.1: PME# supported from D0 D3hot D3cold
Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.2: [1022:14eb] type 01 class 0x060400 PCIe Root Port
Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.2: PCI bridge to [bus c3]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.2: bridge window [mem 0x90900000-0x909fffff]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.2: bridge window [mem 0x8810800000-0x88108fffff 64bit pref]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.2: enabling Extended Tags
Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.2: PME# supported from D0 D3hot D3cold
Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.3: [1022:14eb] type 01 class 0x060400 PCIe Root Port
Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.3: PCI bridge to [bus c4]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.3: bridge window [mem 0x90600000-0x908fffff]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.3: enabling Extended Tags
Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.3: PME# supported from D0 D3hot D3cold
Jul 08 16:12:23 dom0 kernel: pci 0000:00:14.0: [1022:790b] type 00 class 0x0c0500 conventional PCI endpoint
Jul 08 16:12:23 dom0 kernel: pci 0000:00:14.3: [1022:790e] type 00 class 0x060100 conventional PCI endpoint
Jul 08 16:12:23 dom0 kernel: pci 0000:00:18.0: [1022:14f0] type 00 class 0x060000 conventional PCI endpoint
Jul 08 16:12:23 dom0 kernel: pci 0000:00:18.1: [1022:14f1] type 00 class 0x060000 conventional PCI endpoint
Jul 08 16:12:23 dom0 kernel: pci 0000:00:18.2: [1022:14f2] type 00 class 0x060000 conventional PCI endpoint
Jul 08 16:12:23 dom0 kernel: pci 0000:00:18.3: [1022:14f3] type 00 class 0x060000 conventional PCI endpoint
Jul 08 16:12:23 dom0 kernel: pci 0000:00:18.4: [1022:14f4] type 00 class 0x060000 conventional PCI endpoint
Jul 08 16:12:23 dom0 kernel: pci 0000:00:18.5: [1022:14f5] type 00 class 0x060000 conventional PCI endpoint
Jul 08 16:12:23 dom0 kernel: pci 0000:00:18.6: [1022:14f6] type 00 class 0x060000 conventional PCI endpoint
Jul 08 16:12:23 dom0 kernel: pci 0000:00:18.7: [1022:14f7] type 00 class 0x060000 conventional PCI endpoint
Jul 08 16:12:23 dom0 kernel: pci 0000:01:00.0: [15b7:5042] type 00 class 0x010802 PCIe Endpoint
Jul 08 16:12:23 dom0 kernel: pci 0000:01:00.0: BAR 0 [mem 0x90c00000-0x90c03fff 64bit]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:01.2: PCI bridge to [bus 01]
Jul 08 16:12:23 dom0 kernel: pci 0000:02:00.0: [14c3:0616] type 00 class 0x028000 PCIe Endpoint
Jul 08 16:12:23 dom0 kernel: pci 0000:02:00.0: BAR 0 [mem 0x8810900000-0x88109fffff 64bit pref]
Jul 08 16:12:23 dom0 kernel: pci 0000:02:00.0: BAR 2 [mem 0x90b00000-0x90b07fff 64bit]
Jul 08 16:12:23 dom0 kernel: pci 0000:02:00.0: PME# supported from D0 D3hot D3cold
Jul 08 16:12:23 dom0 kernel: pci 0000:00:02.2: PCI bridge to [bus 02]
Jul 08 16:12:23 dom0 kernel: pci 0000:03:00.0: [15b7:5017] type 00 class 0x010802 PCIe Endpoint
Jul 08 16:12:23 dom0 kernel: pci 0000:03:00.0: BAR 0 [mem 0x90a00000-0x90a03fff 64bit]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:02.4: PCI bridge to [bus 03]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:03.1: PCI bridge to [bus 04-62]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:04.1: PCI bridge to [bus 63-c1]
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.0: [1002:15bf] type 00 class 0x030000 PCIe Legacy Endpoint
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.0: BAR 0 [mem 0x8800000000-0x880fffffff 64bit pref]
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.0: BAR 2 [mem 0x90000000-0x901fffff 64bit pref]
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.0: BAR 4 [io 0x1000-0x10ff]
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.0: BAR 5 [mem 0x90500000-0x9057ffff]
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.0: enabling Extended Tags
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.0: PME# supported from D1 D2 D3hot D3cold
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.1: [1002:1640] type 00 class 0x040300 PCIe Legacy Endpoint
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.1: BAR 0 [mem 0x905c8000-0x905cbfff]
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.1: enabling Extended Tags
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.1: PME# supported from D1 D2 D3hot D3cold
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.2: [1022:15c7] type 00 class 0x108000 PCIe Endpoint
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.2: BAR 2 [mem 0x90400000-0x904fffff]
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.2: BAR 5 [mem 0x905cc000-0x905cdfff]
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.2: enabling Extended Tags
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.3: [1022:15b9] type 00 class 0x0c0330 PCIe Endpoint
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.3: BAR 0 [mem 0x90200000-0x902fffff 64bit]
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.3: enabling Extended Tags
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.3: PME# supported from D0 D3hot D3cold
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.4: [1022:15ba] type 00 class 0x0c0330 PCIe Endpoint
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.4: BAR 0 [mem 0x90300000-0x903fffff 64bit]
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.4: enabling Extended Tags
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.4: PME# supported from D0 D3hot D3cold
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.5: [1022:15e2] type 00 class 0x048000 PCIe Endpoint
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.5: BAR 0 [mem 0x90580000-0x905bffff]
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.5: BAR 2 [mem 0x8810000000-0x88107fffff 64bit pref]
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.5: enabling Extended Tags
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.5: PME# supported from D0 D3hot D3cold
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.6: [1022:15e3] type 00 class 0x040300 PCIe Endpoint
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.6: BAR 0 [mem 0x905c0000-0x905c7fff]
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.6: enabling Extended Tags
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.6: PME# supported from D0 D3hot D3cold
Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.1: PCI bridge to [bus c2]
Jul 08 16:12:23 dom0 kernel: pci 0000:c3:00.0: [1022:14ec] type 00 class 0x130000 PCIe Endpoint
Jul 08 16:12:23 dom0 kernel: pci 0000:c3:00.0: enabling Extended Tags
Jul 08 16:12:23 dom0 kernel: pci 0000:c3:00.0: PME# supported from D3hot D3cold
Jul 08 16:12:23 dom0 kernel: pci 0000:c3:00.1: [1022:1502] type 00 class 0x118000 PCIe Endpoint
Jul 08 16:12:23 dom0 kernel: pci 0000:c3:00.1: BAR 0 [mem 0x90900000-0x9097ffff]
Jul 08 16:12:23 dom0 kernel: pci 0000:c3:00.1: BAR 1 [mem 0x909c0000-0x909c1fff]
Jul 08 16:12:23 dom0 kernel: pci 0000:c3:00.1: BAR 2 [mem 0x8810800000-0x881083ffff 64bit pref]
Jul 08 16:12:23 dom0 kernel: pci 0000:c3:00.1: BAR 4 [mem 0x90980000-0x909bffff]
Jul 08 16:12:23 dom0 kernel: pci 0000:c3:00.1: enabling Extended Tags
Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.2: PCI bridge to [bus c3]
Jul 08 16:12:23 dom0 kernel: pci 0000:c4:00.0: [1022:14ec] type 00 class 0x130000 PCIe Endpoint
Jul 08 16:12:23 dom0 kernel: pci 0000:c4:00.0: enabling Extended Tags
Jul 08 16:12:23 dom0 kernel: pci 0000:c4:00.3: [1022:15c0] type 00 class 0x0c0330 PCIe Endpoint
Jul 08 16:12:23 dom0 kernel: pci 0000:c4:00.3: BAR 0 [mem 0x90600000-0x906fffff 64bit]
Jul 08 16:12:23 dom0 kernel: pci 0000:c4:00.3: enabling Extended Tags
Jul 08 16:12:23 dom0 kernel: pci 0000:c4:00.3: PME# supported from D0 D3hot D3cold
Jul 08 16:12:23 dom0 kernel: pci 0000:c4:00.4: [1022:15c1] type 00 class 0x0c0330 PCIe Endpoint
Jul 08 16:12:23 dom0 kernel: pci 0000:c4:00.4: BAR 0 [mem 0x90700000-0x907fffff 64bit]
Jul 08 16:12:23 dom0 kernel: pci 0000:c4:00.4: enabling Extended Tags
Jul 08 16:12:23 dom0 kernel: pci 0000:c4:00.4: PME# supported from D0 D3hot D3cold
Jul 08 16:12:23 dom0 kernel: pci 0000:c4:00.5: [1022:1668] type 00 class 0x0c0340 PCIe Endpoint
Jul 08 16:12:23 dom0 kernel: pci 0000:c4:00.5: BAR 0 [mem 0x90800000-0x9087ffff 64bit]
Jul 08 16:12:23 dom0 kernel: pci 0000:c4:00.5: Max Payload Size set to 128 (was 256, max 256)
Jul 08 16:12:23 dom0 kernel: pci 0000:c4:00.5: enabling Extended Tags
Jul 08 16:12:23 dom0 kernel: pci 0000:c4:00.5: PME# supported from D0 D3hot D3cold
Jul 08 16:12:23 dom0 kernel: pci 0000:c4:00.6: [1022:1669] type 00 class 0x0c0340 PCIe Endpoint
Jul 08 16:12:23 dom0 kernel: pci 0000:c4:00.6: BAR 0 [mem 0x90880000-0x908fffff 64bit]
Jul 08 16:12:23 dom0 kernel: pci 0000:c4:00.6: Max Payload Size set to 128 (was 256, max 256)
Jul 08 16:12:23 dom0 kernel: pci 0000:c4:00.6: enabling Extended Tags
Jul 08 16:12:23 dom0 kernel: pci 0000:c4:00.6: PME# supported from D0 D3hot D3cold
Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.3: PCI bridge to [bus c4]
Jul 08 16:12:23 dom0 kernel: xen: registering gsi 8 triggering 1 polarity 0
Jul 08 16:12:23 dom0 kernel: xen: registering gsi 13 triggering 1 polarity 0
Jul 08 16:12:23 dom0 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 0
Jul 08 16:12:23 dom0 kernel: ACPI: PCI: Interrupt link LNKA disabled
Jul 08 16:12:23 dom0 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 0
Jul 08 16:12:23 dom0 kernel: ACPI: PCI: Interrupt link LNKB disabled
Jul 08 16:12:23 dom0 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 0
Jul 08 16:12:23 dom0 kernel: ACPI: PCI: Interrupt link LNKC disabled
Jul 08 16:12:23 dom0 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 0
Jul 08 16:12:23 dom0 kernel: ACPI: PCI: Interrupt link LNKD disabled
Jul 08 16:12:23 dom0 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 0
Jul 08 16:12:23 dom0 kernel: ACPI: PCI: Interrupt link LNKE disabled
Jul 08 16:12:23 dom0 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 0
Jul 08 16:12:23 dom0 kernel: ACPI: PCI: Interrupt link LNKF disabled
Jul 08 16:12:23 dom0 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 0
Jul 08 16:12:23 dom0 kernel: ACPI: PCI: Interrupt link LNKG disabled
Jul 08 16:12:23 dom0 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 0
Jul 08 16:12:23 dom0 kernel: ACPI: PCI: Interrupt link LNKH disabled
Jul 08 16:12:23 dom0 kernel: xen: registering gsi 7 triggering 0 polarity 1
Jul 08 16:12:23 dom0 kernel: xen: registering gsi 10 triggering 1 polarity 0
Jul 08 16:12:23 dom0 kernel: xen: registering gsi 6 triggering 1 polarity 0
Jul 08 16:12:23 dom0 kernel: xen: registering gsi 50 triggering 0 polarity 1
Jul 08 16:12:23 dom0 kernel: xen: --> pirq=50 -> irq=50 (gsi=50)
Jul 08 16:12:23 dom0 kernel: xen: registering gsi 51 triggering 0 polarity 1
Jul 08 16:12:23 dom0 kernel: xen: --> pirq=51 -> irq=51 (gsi=51)
Jul 08 16:12:23 dom0 kernel: xen: registering gsi 52 triggering 0 polarity 1
Jul 08 16:12:23 dom0 kernel: xen: --> pirq=52 -> irq=52 (gsi=52)
Jul 08 16:12:23 dom0 kernel: xen: registering gsi 53 triggering 0 polarity 1
Jul 08 16:12:23 dom0 kernel: xen: --> pirq=53 -> irq=53 (gsi=53)
Jul 08 16:12:23 dom0 kernel: Low-power S0 idle used by default for system suspend
Jul 08 16:12:23 dom0 kernel: ACPI: EC: interrupt unblocked
Jul 08 16:12:23 dom0 kernel: ACPI: EC: event unblocked
Jul 08 16:12:23 dom0 kernel: ACPI: EC: EC_CMD/EC_SC=0x66, EC_DATA=0x62
Jul 08 16:12:23 dom0 kernel: ACPI: EC: GPE=0xb
Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PCI0.LPC0.EC0_: Boot DSDT EC initialization complete
Jul 08 16:12:23 dom0 kernel: ACPI: \_SB_.PCI0.LPC0.EC0_: EC: Used to handle transactions and events
Jul 08 16:12:23 dom0 kernel: xen:balloon: Initialising balloon driver
Jul 08 16:12:23 dom0 kernel: iommu: Default domain type: Translated
Jul 08 16:12:23 dom0 kernel: iommu: DMA domain TLB invalidation policy: lazy mode
Jul 08 16:12:23 dom0 kernel: SCSI subsystem initialized
Jul 08 16:12:23 dom0 kernel: libata version 3.00 loaded.
Jul 08 16:12:23 dom0 kernel: ACPI: bus type USB registered
Jul 08 16:12:23 dom0 kernel: usbcore: registered new interface driver usbfs
Jul 08 16:12:23 dom0 kernel: usbcore: registered new interface driver hub
Jul 08 16:12:23 dom0 kernel: usbcore: registered new device driver usb
Jul 08 16:12:23 dom0 kernel: pps_core: LinuxPPS API ver. 1 registered
Jul 08 16:12:23 dom0 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti <giometti@linux.it>
Jul 08 16:12:23 dom0 kernel: PTP clock support registered
Jul 08 16:12:23 dom0 kernel: EDAC MC: Ver: 3.0.0
Jul 08 16:12:23 dom0 kernel: efivars: Registered efivars operations
Jul 08 16:12:23 dom0 kernel: NetLabel: Initializing
Jul 08 16:12:23 dom0 kernel: NetLabel: domain hash size = 128
Jul 08 16:12:23 dom0 kernel: NetLabel: protocols = UNLABELED CIPSOv4 CALIPSO
Jul 08 16:12:23 dom0 kernel: NetLabel: unlabeled traffic allowed by default
Jul 08 16:12:23 dom0 kernel: mctp: management component transport protocol core
Jul 08 16:12:23 dom0 kernel: NET: Registered PF_MCTP protocol family
Jul 08 16:12:23 dom0 kernel: PCI: Using ACPI for IRQ routing
Jul 08 16:12:23 dom0 kernel: PCI: pci_cache_line_size set to 64 bytes
Jul 08 16:12:23 dom0 kernel: resource: Expanded resource Reserved due to conflict with PCI Bus 0000:00
Jul 08 16:12:23 dom0 kernel: resource: Expanded resource Reserved due to conflict with PCI Bus 0000:00
Jul 08 16:12:23 dom0 kernel: e820: reserve RAM buffer [mem 0x09b00000-0x0bffffff]
Jul 08 16:12:23 dom0 kernel: e820: reserve RAM buffer [mem 0x09f00000-0x0bffffff]
Jul 08 16:12:23 dom0 kernel: e820: reserve RAM buffer [mem 0x49b60000-0x4bffffff]
Jul 08 16:12:23 dom0 kernel: e820: reserve RAM buffer [mem 0x4bd69000-0x4bffffff]
Jul 08 16:12:23 dom0 kernel: e820: reserve RAM buffer [mem 0x4bd6f000-0x4bffffff]
Jul 08 16:12:23 dom0 kernel: e820: reserve RAM buffer [mem 0x57f7f000-0x57ffffff]
Jul 08 16:12:23 dom0 kernel: e820: reserve RAM buffer [mem 0x5b000000-0x5bffffff]
Jul 08 16:12:23 dom0 kernel: e820: reserve RAM buffer [mem 0x1aa641000-0x1abffffff]
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.0: vgaarb: setting as boot VGA device
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.0: vgaarb: bridge control possible
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.0: vgaarb: VGA device added: decodes=io+mem,owns=none,locks=none
Jul 08 16:12:23 dom0 kernel: vgaarb: loaded
Jul 08 16:12:23 dom0 kernel: clocksource: Switched to clocksource tsc-early
Jul 08 16:12:23 dom0 kernel: VFS: Disk quotas dquot_6.6.0
Jul 08 16:12:23 dom0 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes)
Jul 08 16:12:23 dom0 kernel: hugetlbfs: disabling because there are no supported hugepage sizes
Jul 08 16:12:23 dom0 kernel: pnp: PnP ACPI init
Jul 08 16:12:23 dom0 kernel: system 00:00: [mem 0xfec00000-0xfec01fff] could not be reserved
Jul 08 16:12:23 dom0 kernel: system 00:00: [mem 0xfee00000-0xfee00fff] has been reserved
Jul 08 16:12:23 dom0 kernel: system 00:02: [io 0x0400-0x04cf] has been reserved
Jul 08 16:12:23 dom0 kernel: system 00:02: [io 0x04d0-0x04d1] has been reserved
Jul 08 16:12:23 dom0 kernel: system 00:02: [io 0x04d6] has been reserved
Jul 08 16:12:23 dom0 kernel: system 00:02: [io 0x0c00-0x0c01] has been reserved
Jul 08 16:12:23 dom0 kernel: system 00:02: [io 0x0c14] has been reserved
Jul 08 16:12:23 dom0 kernel: system 00:02: [io 0x0c50-0x0c52] has been reserved
Jul 08 16:12:23 dom0 kernel: system 00:02: [io 0x0c6c] has been reserved
Jul 08 16:12:23 dom0 kernel: system 00:02: [io 0x0c6f] has been reserved
Jul 08 16:12:23 dom0 kernel: system 00:02: [io 0x0cd0-0x0cdb] has been reserved
Jul 08 16:12:23 dom0 kernel: system 00:03: [mem 0x000e0000-0x000fffff] could not be reserved
Jul 08 16:12:23 dom0 kernel: system 00:03: [mem 0xfe000000-0xffffffff] could not be reserved
Jul 08 16:12:23 dom0 kernel: pnp: PnP ACPI: found 4 devices
Jul 08 16:12:23 dom0 kernel: PM-Timer failed consistency check (0xffffff) - aborting.
Jul 08 16:12:23 dom0 kernel: NET: Registered PF_INET protocol family
Jul 08 16:12:23 dom0 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear)
Jul 08 16:12:23 dom0 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear)
Jul 08 16:12:23 dom0 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear)
Jul 08 16:12:23 dom0 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear)
Jul 08 16:12:23 dom0 kernel: TCP bind hash table entries: 16384 (order: 7, 524288 bytes, linear)
Jul 08 16:12:23 dom0 kernel: TCP: Hash tables configured (established 16384 bind 16384)
Jul 08 16:12:23 dom0 kernel: MPTCP token hash table entries: 2048 (order: 3, 49152 bytes, linear)
Jul 08 16:12:23 dom0 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear)
Jul 08 16:12:23 dom0 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear)
Jul 08 16:12:23 dom0 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family
Jul 08 16:12:23 dom0 kernel: NET: Registered PF_XDP protocol family
Jul 08 16:12:23 dom0 kernel: pci 0000:00:01.2: PCI bridge to [bus 01]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:01.2: bridge window [mem 0x90c00000-0x90cfffff]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:02.2: PCI bridge to [bus 02]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:02.2: bridge window [mem 0x90b00000-0x90bfffff]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:02.2: bridge window [mem 0x8810900000-0x88109fffff 64bit pref]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:02.4: PCI bridge to [bus 03]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:02.4: bridge window [mem 0x90a00000-0x90afffff]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:03.1: PCI bridge to [bus 04-62]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:03.1: bridge window [io 0x6000-0x9fff]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:03.1: bridge window [mem 0x78000000-0x8fffffff]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:03.1: bridge window [mem 0x7800000000-0x87ffffffff 64bit pref]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:04.1: PCI bridge to [bus 63-c1]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:04.1: bridge window [io 0x2000-0x5fff]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:04.1: bridge window [mem 0x60000000-0x77ffffff]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:04.1: bridge window [mem 0x6800000000-0x77ffffffff 64bit pref]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.1: PCI bridge to [bus c2]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.1: bridge window [io 0x1000-0x1fff]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.1: bridge window [mem 0x90000000-0x905fffff]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.1: bridge window [mem 0x8800000000-0x88107fffff 64bit pref]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.2: PCI bridge to [bus c3]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.2: bridge window [mem 0x90900000-0x909fffff]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.2: bridge window [mem 0x8810800000-0x88108fffff 64bit pref]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.3: PCI bridge to [bus c4]
Jul 08 16:12:23 dom0 kernel: pci 0000:00:08.3: bridge window [mem 0x90600000-0x908fffff]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: resource 7 [mem 0x000c0000-0x000cffff window]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: resource 8 [mem 0x000d0000-0x000effff window]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: resource 9 [mem 0x60000000-0x90cfffff window]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: resource 10 [mem 0xf0000000-0xfec00000 window]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: resource 11 [mem 0xfed45000-0xfed814ff window]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: resource 12 [mem 0xfed81900-0xfed81fff window]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: resource 13 [mem 0xfedc0000-0xfedc0fff window]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: resource 14 [mem 0xfedc6000-0xfedc6fff window]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:00: resource 15 [mem 0x10c0200000-0x891fffffff window]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:01: resource 1 [mem 0x90c00000-0x90cfffff]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:02: resource 1 [mem 0x90b00000-0x90bfffff]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:02: resource 2 [mem 0x8810900000-0x88109fffff 64bit pref]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:03: resource 1 [mem 0x90a00000-0x90afffff]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:04: resource 0 [io 0x6000-0x9fff]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:04: resource 1 [mem 0x78000000-0x8fffffff]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:04: resource 2 [mem 0x7800000000-0x87ffffffff 64bit pref]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:63: resource 0 [io 0x2000-0x5fff]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:63: resource 1 [mem 0x60000000-0x77ffffff]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:63: resource 2 [mem 0x6800000000-0x77ffffffff 64bit pref]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:c2: resource 0 [io 0x1000-0x1fff]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:c2: resource 1 [mem 0x90000000-0x905fffff]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:c2: resource 2 [mem 0x8800000000-0x88107fffff 64bit pref]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:c3: resource 1 [mem 0x90900000-0x909fffff]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:c3: resource 2 [mem 0x8810800000-0x88108fffff 64bit pref]
Jul 08 16:12:23 dom0 kernel: pci_bus 0000:c4: resource 1 [mem 0x90600000-0x908fffff]
Jul 08 16:12:23 dom0 kernel: pci 0000:c2:00.1: D0 power state depends on 0000:c2:00.0
Jul 08 16:12:23 dom0 kernel: xen: registering gsi 40 triggering 0 polarity 1
Jul 08 16:12:23 dom0 kernel: xen: --> pirq=40 -> irq=40 (gsi=40)
Jul 08 16:12:23 dom0 kernel: xen: registering gsi 37 triggering 0 polarity 1
Jul 08 16:12:23 dom0 kernel: xen: --> pirq=37 -> irq=37 (gsi=37)
Jul 08 16:12:23 dom0 kernel: xen: registering gsi 38 triggering 0 polarity 1
Jul 08 16:12:23 dom0 kernel: xen: --> pirq=38 -> irq=38 (gsi=38)
Jul 08 16:12:23 dom0 kernel: xen: registering gsi 40 triggering 0 polarity 1
Jul 08 16:12:23 dom0 kernel: Already setup the GSI :40
Jul 08 16:12:23 dom0 kernel: xen: registering gsi 46 triggering 0 polarity 1
Jul 08 16:12:23 dom0 kernel: xen: --> pirq=46 -> irq=46 (gsi=46)
Jul 08 16:12:23 dom0 kernel: xen: registering gsi 47 triggering 0 polarity 1
Jul 08 16:12:23 dom0 kernel: xen: --> pirq=47 -> irq=47 (gsi=47)
Jul 08 16:12:23 dom0 kernel: PCI: CLS 64 bytes, default 64
Jul 08 16:12:23 dom0 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB)
Jul 08 16:12:23 dom0 kernel: software IO TLB: mapped [mem 0x00000001a5d00000-0x00000001a9d00000] (64MB)
Jul 08 16:12:23 dom0 kernel: Trying to unpack rootfs image as initramfs...
Jul 08 16:12:23 dom0 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x6d58014d282, max_idle_ns: 881590509159 ns
Jul 08 16:12:23 dom0 kernel: clocksource: Switched to clocksource tsc
Jul 08 16:12:23 dom0 kernel: Initialise system trusted keyrings
Jul 08 16:12:23 dom0 kernel: Key type blacklist registered
Jul 08 16:12:23 dom0 kernel: workingset: timestamp_bits=36 max_order=20 bucket_order=0
Jul 08 16:12:23 dom0 kernel: zbud: loaded
Jul 08 16:12:23 dom0 kernel: integrity: Platform Keyring initialized
Jul 08 16:12:23 dom0 kernel: integrity: Machine keyring initialized
Jul 08 16:12:23 dom0 kernel: NET: Registered PF_ALG protocol family
Jul 08 16:12:23 dom0 kernel: xor: automatically using best checksumming function avx
Jul 08 16:12:23 dom0 kernel: Key type asymmetric registered
Jul 08 16:12:23 dom0 kernel: Asymmetric key parser 'x509' registered
Jul 08 16:12:23 dom0 kernel: Freeing initrd memory: 68828K
Jul 08 16:12:23 dom0 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 245)
Jul 08 16:12:23 dom0 kernel: io scheduler mq-deadline registered
Jul 08 16:12:23 dom0 kernel: io scheduler kyber registered
Jul 08 16:12:23 dom0 kernel: io scheduler bfq registered
Jul 08 16:12:23 dom0 kernel: atomic64_test: passed for x86-64 platform with CX8 and with SSE
Jul 08 16:12:23 dom0 kernel: pcieport 0000:00:01.2: PME: Signaling with IRQ 114
Jul 08 16:12:23 dom0 kernel: pcieport 0000:00:02.2: PME: Signaling with IRQ 115
Jul 08 16:12:23 dom0 kernel: pcieport 0000:00:02.4: PME: Signaling with IRQ 116
Jul 08 16:12:23 dom0 kernel: pcieport 0000:00:03.1: PME: Signaling with IRQ 117
Jul 08 16:12:23 dom0 kernel: pcieport 0000:00:04.1: PME: Signaling with IRQ 118
Jul 08 16:12:23 dom0 kernel: pcieport 0000:00:08.1: PME: Signaling with IRQ 119
Jul 08 16:12:23 dom0 kernel: xen: registering gsi 40 triggering 0 polarity 1
Jul 08 16:12:23 dom0 kernel: Already setup the GSI :40
Jul 08 16:12:23 dom0 kernel: pcieport 0000:00:08.2: PME: Signaling with IRQ 120
Jul 08 16:12:23 dom0 kernel: pcieport 0000:00:08.3: PME: Signaling with IRQ 121
Jul 08 16:12:23 dom0 kernel: ACPI: AC: AC Adapter [ACAD] (on-line)
Jul 08 16:12:23 dom0 kernel: input: Lid Switch as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0A08:00/device:4c/PNP0C09:00/PNP0C0D:00/input/input0
Jul 08 16:12:23 dom0 kernel: ACPI: button: Lid Switch [LID0]
Jul 08 16:12:23 dom0 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input1
Jul 08 16:12:23 dom0 kernel: ACPI: button: Power Button [PWRB]
Jul 08 16:12:23 dom0 kernel: [Firmware Bug]: ACPI MWAIT C-state 0x0 not supported by HW (0x0)
Jul 08 16:12:23 dom0 kernel: [Firmware Bug]: ACPI MWAIT C-state 0x0 not supported by HW (0x0)
Jul 08 16:12:23 dom0 kernel: [Firmware Bug]: ACPI MWAIT C-state 0x0 not supported by HW (0x0)
Jul 08 16:12:23 dom0 kernel: [Firmware Bug]: ACPI MWAIT C-state 0x0 not supported by HW (0x0)
Jul 08 16:12:23 dom0 kernel: [Firmware Bug]: ACPI MWAIT C-state 0x0 not supported by HW (0x0)
Jul 08 16:12:23 dom0 kernel: [Firmware Bug]: ACPI MWAIT C-state 0x0 not supported by HW (0x0)
Jul 08 16:12:23 dom0 kernel: [Firmware Bug]: ACPI MWAIT C-state 0x0 not supported by HW (0x0)
Jul 08 16:12:23 dom0 kernel: [Firmware Bug]: ACPI MWAIT C-state 0x0 not supported by HW (0x0)
Jul 08 16:12:23 dom0 kernel: ACPI: thermal: [Firmware Bug]: Invalid critical threshold (-274000)
Jul 08 16:12:23 dom0 kernel: ACPI: thermal: [Firmware Bug]: No valid trip points!
Jul 08 16:12:23 dom0 kernel: thermal LNXTHERM:00: registered as thermal_zone0
Jul 08 16:12:23 dom0 kernel: ACPI: thermal: Thermal Zone [TZ00] (34 C)
Jul 08 16:12:23 dom0 kernel: ACPI: thermal: [Firmware Bug]: Invalid critical threshold (-274000)
Jul 08 16:12:23 dom0 kernel: ACPI: thermal: [Firmware Bug]: No valid trip points!
Jul 08 16:12:23 dom0 kernel: thermal LNXTHERM:01: registered as thermal_zone1
Jul 08 16:12:23 dom0 kernel: ACPI: thermal: Thermal Zone [TZ01] (35 C)
Jul 08 16:12:23 dom0 kernel: ACPI: thermal: [Firmware Bug]: Invalid critical threshold (-274000)
Jul 08 16:12:23 dom0 kernel: ACPI: thermal: [Firmware Bug]: No valid trip points!
Jul 08 16:12:23 dom0 kernel: thermal LNXTHERM:02: registered as thermal_zone2
Jul 08 16:12:23 dom0 kernel: ACPI: thermal: Thermal Zone [TZ02] (36 C)
Jul 08 16:12:23 dom0 kernel: ACPI: thermal: [Firmware Bug]: Invalid critical threshold (-274000)
Jul 08 16:12:23 dom0 kernel: ACPI: thermal: [Firmware Bug]: No valid trip points!
Jul 08 16:12:23 dom0 kernel: thermal LNXTHERM:03: registered as thermal_zone3
Jul 08 16:12:23 dom0 kernel: ACPI: thermal: Thermal Zone [TZ03] (76 C)
Jul 08 16:12:23 dom0 kernel: Serial: 8250/16550 driver, 32 ports, IRQ sharing enabled
Jul 08 16:12:23 dom0 kernel: ACPI: battery: Slot [BAT1] (battery present)
Jul 08 16:12:23 dom0 kernel: hpet_acpi_add: no address or irqs in _CRS
Jul 08 16:12:23 dom0 kernel: Non-volatile memory driver v1.3
Jul 08 16:12:23 dom0 kernel: Linux agpgart interface v0.103
Jul 08 16:12:23 dom0 kernel: ACPI: bus type drm_connector registered
Jul 08 16:12:23 dom0 kernel: usbcore: registered new interface driver usbserial_generic
Jul 08 16:12:23 dom0 kernel: usbserial: USB Serial support registered for generic
Jul 08 16:12:23 dom0 kernel: i8042: PNP: No PS/2 controller found.
Jul 08 16:12:23 dom0 kernel: mousedev: PS/2 mouse device common for all mice
Jul 08 16:12:23 dom0 kernel: rtc_cmos 00:01: RTC can wake from S4
Jul 08 16:12:23 dom0 kernel: rtc_cmos 00:01: registered as rtc0
Jul 08 16:12:23 dom0 kernel: rtc_cmos 00:01: setting system clock to 2025-07-08T21:12:23 UTC (1752009143)
Jul 08 16:12:23 dom0 kernel: rtc_cmos 00:01: alarms up to one month, 114 bytes nvram
Jul 08 16:12:23 dom0 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log.
Jul 08 16:12:23 dom0 kernel: device-mapper: uevent: version 1.0.3
Jul 08 16:12:23 dom0 kernel: device-mapper: ioctl: 4.48.0-ioctl (2023-03-01) initialised: dm-devel@lists.linux.dev
Jul 08 16:12:23 dom0 kernel: amd_pstate: The CPPC feature is supported but currently disabled by the BIOS.
Jul 08 16:12:23 dom0 kernel: amd_pstate: failed to enable driver mode(3)
Jul 08 16:12:23 dom0 kernel: sysfb: VRAM smaller than advertised
Jul 08 16:12:23 dom0 kernel: efifb: probing for efifb
Jul 08 16:12:23 dom0 kernel: efifb: No BGRT, not showing boot graphics
Jul 08 16:12:23 dom0 kernel: efifb: framebuffer at 0x8800000000, using 16000k, total 16000k
Jul 08 16:12:23 dom0 kernel: efifb: mode is 2560x1600x32, linelength=10240, pages=1
Jul 08 16:12:23 dom0 kernel: efifb: scrolling: redraw
Jul 08 16:12:23 dom0 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0
Jul 08 16:12:23 dom0 kernel: fbcon: Deferring console take-over
Jul 08 16:12:23 dom0 kernel: fb0: EFI VGA frame buffer device
Jul 08 16:12:23 dom0 kernel: xen: registering gsi 36 triggering 0 polarity 1
Jul 08 16:12:23 dom0 kernel: xen: --> pirq=36 -> irq=36 (gsi=36)
Jul 08 16:12:23 dom0 kernel: ccp 0000:c2:00.2: tee: ring init command failed (0x00000005)
Jul 08 16:12:23 dom0 kernel: ccp 0000:c2:00.2: tee: failed to init ring buffer
Jul 08 16:12:23 dom0 kernel: ccp 0000:c2:00.2: tee initialization failed
Jul 08 16:12:23 dom0 kernel: ccp 0000:c2:00.2: psp initialization failed
Jul 08 16:12:23 dom0 kernel: hid: raw HID events driver (C) Jiri Kosina
Jul 08 16:12:23 dom0 kernel: usbcore: registered new interface driver usbhid
Jul 08 16:12:23 dom0 kernel: usbhid: USB HID core driver
Jul 08 16:12:23 dom0 kernel: drop_monitor: Initializing network drop monitor service
Jul 08 16:12:23 dom0 kernel: Initializing XFRM netlink socket
Jul 08 16:12:23 dom0 kernel: NET: Registered PF_INET6 protocol family
Jul 08 16:12:23 dom0 kernel: Segment Routing with IPv6
Jul 08 16:12:23 dom0 kernel: RPL Segment Routing with IPv6
Jul 08 16:12:23 dom0 kernel: In-situ OAM (IOAM) with IPv6
Jul 08 16:12:23 dom0 kernel: mip6: Mobile IPv6
Jul 08 16:12:23 dom0 kernel: NET: Registered PF_PACKET protocol family
Jul 08 16:12:23 dom0 kernel: IPI shorthand broadcast: enabled
Jul 08 16:12:23 dom0 kernel: AES CTR mode by8 optimization enabled
Jul 08 16:12:23 dom0 kernel: sched_clock: Marking stable (1208001675, 35867577)->(1247018130, -3148878)
Jul 08 16:12:23 dom0 kernel: registered taskstats version 1
Jul 08 16:12:23 dom0 kernel: Loading compiled-in X.509 certificates
Jul 08 16:12:23 dom0 kernel: Loaded X.509 cert 'Build time autogenerated kernel key: 79131dced0910c4fab17a743e3691ded82cfbb73'
Jul 08 16:12:23 dom0 kernel: Demotion targets for Node 0: null
Jul 08 16:12:23 dom0 kernel: page_owner is disabled
Jul 08 16:12:23 dom0 kernel: Key type .fscrypt registered
Jul 08 16:12:23 dom0 kernel: Key type fscrypt-provisioning registered
Jul 08 16:12:23 dom0 kernel: Btrfs loaded, zoned=yes, fsverity=yes
Jul 08 16:12:23 dom0 kernel: Key type big_key registered
Jul 08 16:12:23 dom0 kernel: Key type trusted registered
Jul 08 16:12:23 dom0 kernel: Key type encrypted registered
Jul 08 16:12:23 dom0 kernel: integrity: Loading X.509 certificate: UEFI:db
Jul 08 16:12:23 dom0 kernel: integrity: Loaded X.509 cert 'Microsoft Windows Production PCA 2011: a92902398e16c49778cd90f99e4f9ae17c55af53'
Jul 08 16:12:23 dom0 kernel: integrity: Loading X.509 certificate: UEFI:db
Jul 08 16:12:23 dom0 kernel: integrity: Loaded X.509 cert 'Microsoft Corporation UEFI CA 2011: 13adbf4309bd82709c8cd54f316ed522988a1bd4'
Jul 08 16:12:23 dom0 kernel: integrity: Loading X.509 certificate: UEFI:db
Jul 08 16:12:23 dom0 kernel: integrity: Loaded X.509 cert 'frame.work-LaptopAMDDB: 02'
Jul 08 16:12:23 dom0 kernel: Loading compiled-in module X.509 certificates
Jul 08 16:12:23 dom0 kernel: Loaded X.509 cert 'Build time autogenerated kernel key: 79131dced0910c4fab17a743e3691ded82cfbb73'
Jul 08 16:12:23 dom0 kernel: ima: Allocated hash algorithm: sha256
Jul 08 16:12:23 dom0 kernel: ima: No architecture policies found
Jul 08 16:12:23 dom0 kernel: evm: Initialising EVM extended attributes:
Jul 08 16:12:23 dom0 kernel: evm: security.selinux
Jul 08 16:12:23 dom0 kernel: evm: security.SMACK64 (disabled)
Jul 08 16:12:23 dom0 kernel: evm: security.SMACK64EXEC (disabled)
Jul 08 16:12:23 dom0 kernel: evm: security.SMACK64TRANSMUTE (disabled)
Jul 08 16:12:23 dom0 kernel: evm: security.SMACK64MMAP (disabled)
Jul 08 16:12:23 dom0 kernel: evm: security.apparmor
Jul 08 16:12:23 dom0 kernel: evm: security.ima
Jul 08 16:12:23 dom0 kernel: evm: security.capability
Jul 08 16:12:23 dom0 kernel: evm: HMAC attrs: 0x1
Jul 08 16:12:23 dom0 kernel: alg: No test for 842 (842-scomp)
Jul 08 16:12:23 dom0 kernel: alg: No test for 842 (842-generic)
Jul 08 16:12:23 dom0 kernel: PM: Magic number: 1:5:247
Jul 08 16:12:23 dom0 kernel: gpio gpiochip0: hash matches
Jul 08 16:12:23 dom0 kernel: RAS: Correctable Errors collector initialized.
Jul 08 16:12:23 dom0 kernel: clk: Disabling unused clocks
Jul 08 16:12:23 dom0 kernel: PM: genpd: Disabling unused power domains
Jul 08 16:12:23 dom0 kernel: Freeing unused decrypted memory: 2028K
Jul 08 16:12:23 dom0 kernel: Freeing unused kernel image (initmem) memory: 5588K
Jul 08 16:12:23 dom0 kernel: Write protecting the kernel read-only data: 30720k
Jul 08 16:12:23 dom0 kernel: Freeing unused kernel image (rodata/data gap) memory: 188K
Jul 08 16:12:23 dom0 kernel: Run /init as init process
Jul 08 16:12:23 dom0 kernel: with arguments:
Jul 08 16:12:23 dom0 kernel: /init
Jul 08 16:12:23 dom0 kernel: placeholder
Jul 08 16:12:23 dom0 kernel: x86_64
Jul 08 16:12:23 dom0 kernel: rhgb
Jul 08 16:12:23 dom0 kernel: with environment:
Jul 08 16:12:23 dom0 kernel: HOME=/
Jul 08 16:12:23 dom0 kernel: TERM=linux
Jul 08 16:12:23 dom0 kernel: boot=UUID=498e4b33-4544-4195-b627-cd3391190a2d
Jul 08 16:12:23 dom0 systemd[1]: systemd 251.19-1.fc37 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP -GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS +FIDO2 +IDN2 -IDN -IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 +PWQUALITY +P11KIT +QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD +BPF_FRAMEWORK +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified)
Jul 08 16:12:23 dom0 systemd[1]: Detected virtualization vm-other.
Jul 08 16:12:23 dom0 systemd[1]: Detected architecture x86-64.
Jul 08 16:12:23 dom0 systemd[1]: Running in initial RAM disk.
Jul 08 16:12:23 dom0 systemd[1]: Hostname set to <dom0>.
Jul 08 16:12:23 dom0 systemd[1]: Failed to open libbpf, cgroup BPF features disabled: Operation not supported
Jul 08 16:12:23 dom0 systemd[1]: Queued start job for default target initrd.target.
Jul 08 16:12:23 dom0 systemd[1]: Created slice system-systemd\x2dcryptsetup.slice - Slice /system/systemd-cryptsetup.
Jul 08 16:12:23 dom0 systemd[1]: Reached target initrd-usr-fs.target - Initrd /usr File System.
Jul 08 16:12:23 dom0 systemd[1]: Reached target local-fs.target - Local File Systems.
Jul 08 16:12:23 dom0 systemd[1]: Reached target slices.target - Slice Units.
Jul 08 16:12:23 dom0 systemd[1]: Reached target swap.target - Swaps.
Jul 08 16:12:23 dom0 systemd[1]: Reached target timers.target - Timer Units.
Jul 08 16:12:23 dom0 systemd[1]: Listening on systemd-journald-audit.socket - Journal Audit Socket.
Jul 08 16:12:23 dom0 systemd[1]: Listening on systemd-journald-dev-log.socket - Journal Socket (/dev/log).
Jul 08 16:12:23 dom0 systemd[1]: Listening on systemd-journald.socket - Journal Socket.
Jul 08 16:12:23 dom0 systemd[1]: Listening on systemd-udevd-control.socket - udev Control Socket.
Jul 08 16:12:23 dom0 systemd[1]: Listening on systemd-udevd-kernel.socket - udev Kernel Socket.
Jul 08 16:12:23 dom0 systemd[1]: Reached target sockets.target - Socket Units.
Jul 08 16:12:23 dom0 systemd[1]: Starting kmod-static-nodes.service - Create List of Static Device Nodes...
Jul 08 16:12:23 dom0 systemd[1]: memstrack.service - Memstrack Anylazing Service was skipped because all trigger condition checks failed.
Jul 08 16:12:23 dom0 systemd[1]: Starting systemd-journald.service - Journal Service...
Jul 08 16:12:23 dom0 systemd[1]: Starting systemd-modules-load.service - Load Kernel Modules...
Jul 08 16:12:23 dom0 systemd[1]: Starting systemd-vconsole-setup.service - Setup Virtual Console...
Jul 08 16:12:23 dom0 systemd[1]: Finished kmod-static-nodes.service - Create List of Static Device Nodes.
Jul 08 16:12:23 dom0 systemd[1]: Starting systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev...
Jul 08 16:12:23 dom0 systemd[1]: Finished systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev.
Jul 08 16:12:23 dom0 kernel: audit: type=1130 audit(1752009143.798:2): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:23 dom0 kernel: alua: device handler registered
Jul 08 16:12:23 dom0 kernel: emc: device handler registered
Jul 08 16:12:23 dom0 kernel: rdac: device handler registered
Jul 08 16:12:23 dom0 kernel: xen:xen_evtchn: Event-channel device installed
Jul 08 16:12:23 dom0 kernel: xen_pciback: backend is vpci
Jul 08 16:12:23 dom0 kernel: xen_acpi_processor: Uploading Xen processor PM info
Jul 08 16:12:23 dom0 systemd[1]: Finished systemd-modules-load.service - Load Kernel Modules.
Jul 08 16:12:23 dom0 kernel: audit: type=1130 audit(1752009143.810:3): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:23 dom0 systemd-journald[341]: Journal started
Jul 08 16:12:23 dom0 systemd-journald[341]: Runtime Journal (/run/log/journal/0c67c932d86e4cf398b860f50e4aef19) is 8.0M, max 77.8M, 69.8M free.
Jul 08 16:12:23 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:23 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:23 dom0 systemd-modules-load[343]: Module 'msr' is built in
Jul 08 16:12:23 dom0 systemd-modules-load[343]: Inserted module 'dm_multipath'
Jul 08 16:12:23 dom0 systemd-modules-load[343]: Inserted module 'uinput'
Jul 08 16:12:23 dom0 systemd-modules-load[343]: Inserted module 'scsi_dh_alua'
Jul 08 16:12:23 dom0 systemd-modules-load[343]: Inserted module 'scsi_dh_emc'
Jul 08 16:12:23 dom0 systemd-modules-load[343]: Inserted module 'scsi_dh_rdac'
Jul 08 16:12:23 dom0 systemd-modules-load[343]: Inserted module 'xen_evtchn'
Jul 08 16:12:23 dom0 systemd-modules-load[343]: Inserted module 'xen_gntdev'
Jul 08 16:12:23 dom0 systemd-modules-load[343]: Inserted module 'xen_gntalloc'
Jul 08 16:12:23 dom0 systemd-modules-load[343]: Inserted module 'xen_blkback'
Jul 08 16:12:23 dom0 systemd-modules-load[343]: Inserted module 'xen_pciback'
Jul 08 16:12:23 dom0 systemd-modules-load[343]: Inserted module 'xen_privcmd'
Jul 08 16:12:23 dom0 systemd-modules-load[343]: Inserted module 'xen_acpi_processor'
Jul 08 16:12:23 dom0 systemd[1]: Starting systemd-sysctl.service - Apply Kernel Variables...
Jul 08 16:12:23 dom0 systemd[1]: Started systemd-journald.service - Journal Service.
Jul 08 16:12:23 dom0 kernel: audit: type=1130 audit(1752009143.858:4): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:23 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:23 dom0 systemd[1]: Finished systemd-vconsole-setup.service - Setup Virtual Console.
Jul 08 16:12:23 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:23 dom0 kernel: audit: type=1130 audit(1752009143.858:5): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:23 dom0 systemd[1]: dracut-cmdline-ask.service - dracut ask for additional cmdline parameters was skipped because all trigger condition checks failed.
Jul 08 16:12:23 dom0 systemd[1]: Starting dracut-cmdline.service - dracut cmdline hook...
Jul 08 16:12:23 dom0 systemd[1]: Starting systemd-tmpfiles-setup.service - Create Volatile Files and Directories...
Jul 08 16:12:23 dom0 systemd[1]: Finished systemd-sysctl.service - Apply Kernel Variables.
Jul 08 16:12:23 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:23 dom0 kernel: audit: type=1130 audit(1752009143.864:6): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:23 dom0 systemd[1]: Finished systemd-tmpfiles-setup.service - Create Volatile Files and Directories.
Jul 08 16:12:23 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:23 dom0 kernel: audit: type=1130 audit(1752009143.868:7): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:23 dom0 dracut-cmdline[360]: dracut-4.2 (R4.2) dracut-059-5.fc37
Jul 08 16:12:23 dom0 dracut-cmdline[360]: Using kernel command line parameters: placeholder root=/dev/mapper/qubes_dom0-root ro rd.md.uuid=7761fe0f:2417c99e:b3d5758b:85c6aa83 rd.luks.uuid=luks-c4157ae0-c1c9-4d2e-8ee9-9aecc2d9966d rd.lvm.lv=qubes_dom0/root rd.md.uuid=b8962e44:79f48918:4e54459c:9dffc52c rd.lvm.lv=qubes_dom0/swap plymouth.ignore-serial-consoles 6.6.36-1.qubes.fc37.x86_64 x86_64 rhgb quiet usbcore.authorized_default=0 fips=0 boot=UUID=498e4b33-4544-4195-b627-cd3391190a2d
Jul 08 16:12:23 dom0 kernel: pciback 0000:02:00.0: xen_pciback: seizing device
Jul 08 16:12:24 dom0 kernel: xen: registering gsi 46 triggering 0 polarity 1
Jul 08 16:12:24 dom0 kernel: Already setup the GSI :46
Jul 08 16:12:24 dom0 kernel: pcieport 0000:00:02.2: unlocked secondary bus reset via: __pci_reset_function_locked+0x49/0x90
Jul 08 16:12:24 dom0 dracut-cmdline[360]: Restricting USB in dom0 via usbguard.
Jul 08 16:12:24 dom0 systemd[1]: Reloading.
Jul 08 16:12:24 dom0 audit: BPF prog-id=6 op=LOAD
Jul 08 16:12:24 dom0 audit: BPF prog-id=3 op=UNLOAD
Jul 08 16:12:24 dom0 audit: BPF prog-id=7 op=LOAD
Jul 08 16:12:24 dom0 audit: BPF prog-id=8 op=LOAD
Jul 08 16:12:24 dom0 audit: BPF prog-id=4 op=UNLOAD
Jul 08 16:12:24 dom0 audit: BPF prog-id=5 op=UNLOAD
Jul 08 16:12:24 dom0 kernel: audit: type=1334 audit(1752009144.203:8): prog-id=6 op=LOAD
Jul 08 16:12:24 dom0 kernel: audit: type=1334 audit(1752009144.203:9): prog-id=3 op=UNLOAD
Jul 08 16:12:24 dom0 kernel: audit: type=1334 audit(1752009144.204:10): prog-id=7 op=LOAD
Jul 08 16:12:24 dom0 audit: BPF prog-id=9 op=LOAD
Jul 08 16:12:24 dom0 audit: BPF prog-id=10 op=LOAD
Jul 08 16:12:24 dom0 audit: BPF prog-id=11 op=LOAD
Jul 08 16:12:24 dom0 systemd[1]: Starting usbguard.service - USBGuard daemon...
Jul 08 16:12:24 dom0 usbguard-daemon[456]: [1752009144.238] (W) PERMISSIONS CHECK ON POLICY FILE ARE TURNED OFF!
Jul 08 16:12:24 dom0 systemd[1]: Started usbguard.service - USBGuard daemon.
Jul 08 16:12:24 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=usbguard comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:24 dom0 systemd-escape[495]: Input 'luks-c4157ae0-c1c9-4d2e-8ee9-9aecc2d9966d' is not an absolute file system path, escaping is likely not going to be reversible.
Jul 08 16:12:24 dom0 systemd[1]: Finished dracut-cmdline.service - dracut cmdline hook.
Jul 08 16:12:24 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:24 dom0 systemd[1]: Starting dracut-pre-udev.service - dracut pre-udev hook...
Jul 08 16:12:24 dom0 systemd[1]: Finished dracut-pre-udev.service - dracut pre-udev hook.
Jul 08 16:12:24 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:24 dom0 audit: BPF prog-id=12 op=LOAD
Jul 08 16:12:24 dom0 audit: BPF prog-id=13 op=LOAD
Jul 08 16:12:24 dom0 systemd[1]: Starting systemd-udevd.service - Rule-based Manager for Device Events and Files...
Jul 08 16:12:24 dom0 systemd-udevd[553]: Using default interface naming scheme 'v251'.
Jul 08 16:12:24 dom0 systemd[1]: Started systemd-udevd.service - Rule-based Manager for Device Events and Files.
Jul 08 16:12:24 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:24 dom0 systemd[1]: Starting dracut-pre-trigger.service - dracut pre-trigger hook...
Jul 08 16:12:24 dom0 kernel: tpm tpm0: auth session is active
Jul 08 16:12:24 dom0 systemd[1]: Finished dracut-pre-trigger.service - dracut pre-trigger hook.
Jul 08 16:12:24 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:24 dom0 systemd[1]: Starting systemd-udev-trigger.service - Coldplug All udev Devices...
Jul 08 16:12:24 dom0 systemd[1]: Created slice system-modprobe.slice - Slice /system/modprobe.
Jul 08 16:12:24 dom0 systemd[1]: Starting modprobe@configfs.service - Load Kernel Module configfs...
Jul 08 16:12:24 dom0 systemd[1]: Finished systemd-udev-trigger.service - Coldplug All udev Devices.
Jul 08 16:12:24 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:24 dom0 systemd[1]: Starting dracut-initqueue.service - dracut initqueue hook...
Jul 08 16:12:24 dom0 systemd[1]: Starting plymouth-start.service - Show Plymouth Boot Screen...
Jul 08 16:12:24 dom0 systemd[1]: modprobe@configfs.service: Deactivated successfully.
Jul 08 16:12:24 dom0 systemd[1]: Finished modprobe@configfs.service - Load Kernel Module configfs.
Jul 08 16:12:24 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:24 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:24 dom0 systemd[1]: Mounting sys-kernel-config.mount - Kernel Configuration File System...
Jul 08 16:12:24 dom0 systemd[1]: Mounted sys-kernel-config.mount - Kernel Configuration File System.
Jul 08 16:12:24 dom0 systemd[1]: Received SIGRTMIN+20 from PID 670 (plymouthd).
Jul 08 16:12:24 dom0 systemd[1]: Started plymouth-start.service - Show Plymouth Boot Screen.
Jul 08 16:12:24 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=plymouth-start comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:24 dom0 systemd[1]: systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch was skipped because of a failed condition check (ConditionPathExists=!/run/plymouth/pid).
Jul 08 16:12:24 dom0 systemd[1]: Started systemd-ask-password-plymouth.path - Forward Password Requests to Plymouth Directory Watch.
Jul 08 16:12:24 dom0 systemd[1]: Reached target paths.target - Path Units.
Jul 08 16:12:24 dom0 systemd[1]: Reloading.
Jul 08 16:12:24 dom0 kernel: sp5100_tco: SP5100/SB800 TCO WatchDog Timer Driver
Jul 08 16:12:24 dom0 kernel: sp5100-tco sp5100-tco: Using 0xfeb00000 for watchdog MMIO address
Jul 08 16:12:24 dom0 kernel: sp5100-tco sp5100-tco: initialized. heartbeat=60 sec (nowayout=0)
Jul 08 16:12:24 dom0 kernel: input: PIXA3854:00 093A:0274 Mouse as /devices/platform/AMDI0010:03/i2c-1/i2c-PIXA3854:00/0018:093A:0274.0001/input/input2
Jul 08 16:12:24 dom0 kernel: input: PIXA3854:00 093A:0274 Touchpad as /devices/platform/AMDI0010:03/i2c-1/i2c-PIXA3854:00/0018:093A:0274.0001/input/input3
Jul 08 16:12:24 dom0 kernel: hid-generic 0018:093A:0274.0001: input,hidraw0: I2C HID v1.00 Mouse [PIXA3854:00 093A:0274] on i2c-PIXA3854:00
Jul 08 16:12:24 dom0 audit: BPF prog-id=14 op=LOAD
Jul 08 16:12:24 dom0 audit: BPF prog-id=6 op=UNLOAD
Jul 08 16:12:24 dom0 audit: BPF prog-id=15 op=LOAD
Jul 08 16:12:24 dom0 audit: BPF prog-id=16 op=LOAD
Jul 08 16:12:24 dom0 audit: BPF prog-id=7 op=UNLOAD
Jul 08 16:12:24 dom0 audit: BPF prog-id=8 op=UNLOAD
Jul 08 16:12:24 dom0 audit: BPF prog-id=17 op=LOAD
Jul 08 16:12:24 dom0 audit: BPF prog-id=18 op=LOAD
Jul 08 16:12:24 dom0 audit: BPF prog-id=12 op=UNLOAD
Jul 08 16:12:24 dom0 audit: BPF prog-id=13 op=UNLOAD
Jul 08 16:12:24 dom0 audit: BPF prog-id=19 op=LOAD
Jul 08 16:12:24 dom0 audit: BPF prog-id=9 op=UNLOAD
Jul 08 16:12:24 dom0 audit: BPF prog-id=20 op=LOAD
Jul 08 16:12:24 dom0 audit: BPF prog-id=21 op=LOAD
Jul 08 16:12:24 dom0 audit: BPF prog-id=10 op=UNLOAD
Jul 08 16:12:24 dom0 audit: BPF prog-id=11 op=UNLOAD
Jul 08 16:12:24 dom0 kernel: hid-generic 0018:32AC:001B.0002: hidraw1: I2C HID v1.00 Device [FRMW0003:00 32AC:001B] on i2c-FRMW0003:00
Jul 08 16:12:24 dom0 kernel: nvme 0000:01:00.0: platform quirk: setting simple suspend
Jul 08 16:12:25 dom0 kernel: nvme 0000:03:00.0: platform quirk: setting simple suspend
Jul 08 16:12:25 dom0 kernel: nvme nvme0: pci function 0000:01:00.0
Jul 08 16:12:25 dom0 kernel: xen: registering gsi 28 triggering 0 polarity 1
Jul 08 16:12:25 dom0 kernel: ACPI: video: Video Device [VGA] (multi-head: yes rom: no post: no)
Jul 08 16:12:25 dom0 kernel: nvme nvme1: pci function 0000:03:00.0
Jul 08 16:12:25 dom0 kernel: xen: registering gsi 42 triggering 0 polarity 1
Jul 08 16:12:25 dom0 kernel: xen: registering gsi 37 triggering 0 polarity 1
Jul 08 16:12:25 dom0 kernel: Already setup the GSI :37
Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c2:00.3: xHCI Host Controller
Jul 08 16:12:25 dom0 kernel: input: Video Bus as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0A08:00/device:17/LNXVIDEO:00/input/input4
Jul 08 16:12:25 dom0 kernel: xen: --> pirq=28 -> irq=28 (gsi=28)
Jul 08 16:12:25 dom0 kernel: xen: --> pirq=42 -> irq=42 (gsi=42)
Jul 08 16:12:25 dom0 kernel: hid-sensor-hub 0018:32AC:001B.0002: hidraw1: I2C HID v1.00 Device [FRMW0003:00 32AC:001B] on i2c-FRMW0003:00
Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c2:00.3: new USB bus registered, assigned bus number 1
Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c2:00.3: hcc params 0x0128ffc5 hci version 0x120 quirks 0x0000000200000010
Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c2:00.3: xHCI Host Controller
Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c2:00.3: new USB bus registered, assigned bus number 2
Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c2:00.3: Host supports USB 3.1 Enhanced SuperSpeed
Jul 08 16:12:25 dom0 kernel: usb usb1: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 6.12
Jul 08 16:12:25 dom0 kernel: usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1
Jul 08 16:12:25 dom0 kernel: usb usb1: Product: xHCI Host Controller
Jul 08 16:12:25 dom0 kernel: usb usb1: Manufacturer: Linux 6.12.25-1.qubes.fc37.x86_64 xhci-hcd
Jul 08 16:12:25 dom0 kernel: usb usb1: SerialNumber: 0000:c2:00.3
Jul 08 16:12:25 dom0 kernel: hub 1-0:1.0: USB hub found
Jul 08 16:12:25 dom0 kernel: hub 1-0:1.0: 5 ports detected
Jul 08 16:12:25 dom0 kernel: usb usb2: We don't know the algorithms for LPM for this host, disabling LPM.
Jul 08 16:12:25 dom0 kernel: usb usb2: New USB device found, idVendor=1d6b, idProduct=0003, bcdDevice= 6.12
Jul 08 16:12:25 dom0 kernel: usb usb2: New USB device strings: Mfr=3, Product=2, SerialNumber=1
Jul 08 16:12:25 dom0 kernel: usb usb2: Product: xHCI Host Controller
Jul 08 16:12:25 dom0 kernel: usb usb2: Manufacturer: Linux 6.12.25-1.qubes.fc37.x86_64 xhci-hcd
Jul 08 16:12:25 dom0 kernel: usb usb2: SerialNumber: 0000:c2:00.3
Jul 08 16:12:25 dom0 kernel: hub 2-0:1.0: USB hub found
Jul 08 16:12:25 dom0 kernel: hub 2-0:1.0: 2 ports detected
Jul 08 16:12:25 dom0 kernel: xen: registering gsi 38 triggering 0 polarity 1
Jul 08 16:12:25 dom0 kernel: Already setup the GSI :38
Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c2:00.4: xHCI Host Controller
Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c2:00.4: new USB bus registered, assigned bus number 3
Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c2:00.4: hcc params 0x0110ffc5 hci version 0x120 quirks 0x0000000200000010
Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c2:00.4: xHCI Host Controller
Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c2:00.4: new USB bus registered, assigned bus number 4
Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c2:00.4: Host supports USB 3.1 Enhanced SuperSpeed
Jul 08 16:12:25 dom0 kernel: usb usb3: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 6.12
Jul 08 16:12:25 dom0 kernel: usb usb3: New USB device strings: Mfr=3, Product=2, SerialNumber=1
Jul 08 16:12:25 dom0 kernel: usb usb3: Product: xHCI Host Controller
Jul 08 16:12:25 dom0 kernel: usb usb3: Manufacturer: Linux 6.12.25-1.qubes.fc37.x86_64 xhci-hcd
Jul 08 16:12:25 dom0 kernel: usb usb3: SerialNumber: 0000:c2:00.4
Jul 08 16:12:25 dom0 kernel: hub 3-0:1.0: USB hub found
Jul 08 16:12:25 dom0 kernel: hub 3-0:1.0: 1 port detected
Jul 08 16:12:25 dom0 kernel: usb usb4: We don't know the algorithms for LPM for this host, disabling LPM.
Jul 08 16:12:25 dom0 kernel: usb usb4: New USB device found, idVendor=1d6b, idProduct=0003, bcdDevice= 6.12
Jul 08 16:12:25 dom0 kernel: usb usb4: New USB device strings: Mfr=3, Product=2, SerialNumber=1
Jul 08 16:12:25 dom0 kernel: usb usb4: Product: xHCI Host Controller
Jul 08 16:12:25 dom0 kernel: usb usb4: Manufacturer: Linux 6.12.25-1.qubes.fc37.x86_64 xhci-hcd
Jul 08 16:12:25 dom0 kernel: usb usb4: SerialNumber: 0000:c2:00.4
Jul 08 16:12:25 dom0 kernel: hub 4-0:1.0: USB hub found
Jul 08 16:12:25 dom0 kernel: hub 4-0:1.0: 1 port detected
Jul 08 16:12:25 dom0 kernel: xen: registering gsi 46 triggering 0 polarity 1
Jul 08 16:12:25 dom0 kernel: Already setup the GSI :46
Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c4:00.3: xHCI Host Controller
Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c4:00.3: new USB bus registered, assigned bus number 5
Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c4:00.3: hcc params 0x0110ffc5 hci version 0x120 quirks 0x0000000200000010
Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c4:00.3: xHCI Host Controller
Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c4:00.3: new USB bus registered, assigned bus number 6
Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c4:00.3: Host supports USB 3.1 Enhanced SuperSpeed
Jul 08 16:12:25 dom0 kernel: usb usb5: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 6.12
Jul 08 16:12:25 dom0 kernel: usb usb5: New USB device strings: Mfr=3, Product=2, SerialNumber=1
Jul 08 16:12:25 dom0 kernel: usb usb5: Product: xHCI Host Controller
Jul 08 16:12:25 dom0 kernel: usb usb5: Manufacturer: Linux 6.12.25-1.qubes.fc37.x86_64 xhci-hcd
Jul 08 16:12:25 dom0 kernel: usb usb5: SerialNumber: 0000:c4:00.3
Jul 08 16:12:25 dom0 kernel: hub 5-0:1.0: USB hub found
Jul 08 16:12:25 dom0 kernel: hub 5-0:1.0: 1 port detected
Jul 08 16:12:25 dom0 kernel: usb usb6: We don't know the algorithms for LPM for this host, disabling LPM.
Jul 08 16:12:25 dom0 kernel: usb usb6: New USB device found, idVendor=1d6b, idProduct=0003, bcdDevice= 6.12
Jul 08 16:12:25 dom0 kernel: usb usb6: New USB device strings: Mfr=3, Product=2, SerialNumber=1
Jul 08 16:12:25 dom0 kernel: usb usb6: Product: xHCI Host Controller
Jul 08 16:12:25 dom0 kernel: usb usb6: Manufacturer: Linux 6.12.25-1.qubes.fc37.x86_64 xhci-hcd
Jul 08 16:12:25 dom0 kernel: usb usb6: SerialNumber: 0000:c4:00.3
Jul 08 16:12:25 dom0 kernel: hub 6-0:1.0: USB hub found
Jul 08 16:12:25 dom0 kernel: hub 6-0:1.0: 1 port detected
Jul 08 16:12:25 dom0 kernel: xen: registering gsi 47 triggering 0 polarity 1
Jul 08 16:12:25 dom0 kernel: Already setup the GSI :47
Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c4:00.4: xHCI Host Controller
Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c4:00.4: new USB bus registered, assigned bus number 7
Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c4:00.4: hcc params 0x0110ffc5 hci version 0x120 quirks 0x0000000200000010
Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c4:00.4: xHCI Host Controller
Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c4:00.4: new USB bus registered, assigned bus number 8
Jul 08 16:12:25 dom0 kernel: xhci_hcd 0000:c4:00.4: Host supports USB 3.1 Enhanced SuperSpeed
Jul 08 16:12:25 dom0 kernel: usb usb7: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 6.12
Jul 08 16:12:25 dom0 kernel: usb usb7: New USB device strings: Mfr=3, Product=2, SerialNumber=1
Jul 08 16:12:25 dom0 kernel: usb usb7: Product: xHCI Host Controller
Jul 08 16:12:25 dom0 kernel: usb usb7: Manufacturer: Linux 6.12.25-1.qubes.fc37.x86_64 xhci-hcd
Jul 08 16:12:25 dom0 kernel: usb usb7: SerialNumber: 0000:c4:00.4
Jul 08 16:12:25 dom0 kernel: hub 7-0:1.0: USB hub found
Jul 08 16:12:25 dom0 kernel: hub 7-0:1.0: 1 port detected
Jul 08 16:12:25 dom0 kernel: usb usb8: We don't know the algorithms for LPM for this host, disabling LPM.
Jul 08 16:12:25 dom0 kernel: usb usb8: New USB device found, idVendor=1d6b, idProduct=0003, bcdDevice= 6.12
Jul 08 16:12:25 dom0 kernel: usb usb8: New USB device strings: Mfr=3, Product=2, SerialNumber=1
Jul 08 16:12:25 dom0 kernel: usb usb8: Product: xHCI Host Controller
Jul 08 16:12:25 dom0 kernel: usb usb8: Manufacturer: Linux 6.12.25-1.qubes.fc37.x86_64 xhci-hcd
Jul 08 16:12:25 dom0 kernel: usb usb8: SerialNumber: 0000:c4:00.4
Jul 08 16:12:25 dom0 kernel: hub 8-0:1.0: USB hub found
Jul 08 16:12:25 dom0 kernel: hub 8-0:1.0: 1 port detected
Jul 08 16:12:25 dom0 kernel: nvme nvme0: allocated 32 MiB host memory buffer.
Jul 08 16:12:25 dom0 kernel: nvme nvme1: allocated 32 MiB host memory buffer.
Jul 08 16:12:25 dom0 kernel: nvme nvme0: 8/0/0 default/read/poll queues
Jul 08 16:12:25 dom0 kernel: input: PIXA3854:00 093A:0274 Mouse as /devices/platform/AMDI0010:03/i2c-1/i2c-PIXA3854:00/0018:093A:0274.0001/input/input5
Jul 08 16:12:25 dom0 kernel: input: PIXA3854:00 093A:0274 Touchpad as /devices/platform/AMDI0010:03/i2c-1/i2c-PIXA3854:00/0018:093A:0274.0001/input/input6
Jul 08 16:12:25 dom0 kernel: hid-multitouch 0018:093A:0274.0001: input,hidraw0: I2C HID v1.00 Mouse [PIXA3854:00 093A:0274] on i2c-PIXA3854:00
Jul 08 16:12:25 dom0 kernel: nvme nvme1: 8/0/0 default/read/poll queues
Jul 08 16:12:25 dom0 kernel: nvme0n1: p1 p2 p3
Jul 08 16:12:25 dom0 kernel: nvme1n1: p1 p2 p3
Jul 08 16:12:24 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1" device_rule=616C6C6F7720696420316436623A30303032206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362312220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:24 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1" target="allow" device_rule=616C6C6F7720696420316436623A30303032206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362312220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:24 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb2" device_rule=616C6C6F7720696420316436623A30303033206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362322220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:24 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb2" target="allow" device_rule=616C6C6F7720696420316436623A30303033206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362322220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:24 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.4/usb3" device_rule=616C6C6F7720696420316436623A30303032206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362332220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:24 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.4/usb3" target="allow" device_rule=616C6C6F7720696420316436623A30303032206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362332220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:24 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.4/usb4" device_rule=616C6C6F7720696420316436623A30303033206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362342220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:24 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.4/usb4" target="allow" device_rule=616C6C6F7720696420316436623A30303033206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362342220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:24 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:08.3/0000:c4:00.3/usb5" device_rule=616C6C6F7720696420316436623A30303032206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362352220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:24 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.3/0000:c4:00.3/usb5" target="allow" device_rule=616C6C6F7720696420316436623A30303032206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362352220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:24 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:08.3/0000:c4:00.3/usb6" device_rule=616C6C6F7720696420316436623A30303033206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362362220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:24 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.3/0000:c4:00.3/usb6" target="allow" device_rule=616C6C6F7720696420316436623A30303033206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362362220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:24 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:08.3/0000:c4:00.4/usb7" device_rule=616C6C6F7720696420316436623A30303032206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362372220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:24 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.3/0000:c4:00.4/usb7" target="allow" device_rule=616C6C6F7720696420316436623A30303032206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362372220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:24 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:08.3/0000:c4:00.4/usb8" device_rule=616C6C6F7720696420316436623A30303033206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362382220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:24 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.3/0000:c4:00.4/usb8" target="allow" device_rule=616C6C6F7720696420316436623A30303033206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362382220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:25 dom0 kernel: block device autoloading is deprecated and will be removed.
Jul 08 16:12:25 dom0 kernel: block device autoloading is deprecated and will be removed.
Jul 08 16:12:25 dom0 kernel: usb 1-2: new high-speed USB device number 2 using xhci_hcd
Jul 08 16:12:25 dom0 kernel: usb 3-1: new high-speed USB device number 2 using xhci_hcd
Jul 08 16:12:25 dom0 kernel: usb 1-2: New USB device found, idVendor=05e3, idProduct=0610, bcdDevice=34.04
Jul 08 16:12:25 dom0 kernel: usb 1-2: New USB device strings: Mfr=1, Product=2, SerialNumber=0
Jul 08 16:12:25 dom0 kernel: usb 1-2: Product: USB2.1 Hub
Jul 08 16:12:25 dom0 kernel: usb 1-2: Manufacturer: GenesysLogic
Jul 08 16:12:25 dom0 kernel: usb 1-2: Device is not authorized for usage
Jul 08 16:12:25 dom0 kernel: usb 3-1: New USB device found, idVendor=0bda, idProduct=5634, bcdDevice= 0.21
Jul 08 16:12:25 dom0 kernel: usb 3-1: New USB device strings: Mfr=3, Product=1, SerialNumber=2
Jul 08 16:12:25 dom0 kernel: usb 3-1: Product: Laptop Camera
Jul 08 16:12:25 dom0 kernel: usb 3-1: Manufacturer: Generic
Jul 08 16:12:25 dom0 kernel: usb 3-1: SerialNumber: 200901010001
Jul 08 16:12:25 dom0 kernel: usb 3-1: Device is not authorized for usage
Jul 08 16:12:25 dom0 kernel: ucsi_acpi USBC000:00: unknown error 0
Jul 08 16:12:25 dom0 kernel: ucsi_acpi USBC000:00: GET_CABLE_PROPERTY failed (-5)
Jul 08 16:12:25 dom0 kernel: usb 2-2: new SuperSpeed Plus Gen 2x1 USB device number 2 using xhci_hcd
Jul 08 16:12:25 dom0 kernel: usb 2-2: New USB device found, idVendor=05e3, idProduct=0625, bcdDevice=34.04
Jul 08 16:12:25 dom0 kernel: usb 2-2: New USB device strings: Mfr=1, Product=2, SerialNumber=0
Jul 08 16:12:25 dom0 kernel: usb 2-2: Product: USB3.2 Hub
Jul 08 16:12:25 dom0 kernel: usb 2-2: Manufacturer: GenesysLogic
Jul 08 16:12:25 dom0 kernel: usb 2-2: Device is not authorized for usage
Jul 08 16:12:25 dom0 kernel: usb 1-3: new high-speed USB device number 3 using xhci_hcd
Jul 08 16:12:25 dom0 kernel: usb 1-3: New USB device found, idVendor=05e3, idProduct=0610, bcdDevice=61.60
Jul 08 16:12:25 dom0 kernel: usb 1-3: New USB device strings: Mfr=0, Product=1, SerialNumber=0
Jul 08 16:12:25 dom0 kernel: usb 1-3: Product: USB2.0 Hub
Jul 08 16:12:25 dom0 kernel: usb 1-3: Device is not authorized for usage
Jul 08 16:12:25 dom0 kernel: ucsi_acpi USBC000:00: unknown error 0
Jul 08 16:12:25 dom0 kernel: ucsi_acpi USBC000:00: GET_CABLE_PROPERTY failed (-5)
Jul 08 16:12:25 dom0 kernel: usb 1-4: new high-speed USB device number 4 using xhci_hcd
Jul 08 16:12:25 dom0 kernel: usb 1-4: New USB device found, idVendor=05e3, idProduct=0610, bcdDevice=61.60
Jul 08 16:12:25 dom0 kernel: usb 1-4: New USB device strings: Mfr=0, Product=1, SerialNumber=0
Jul 08 16:12:25 dom0 kernel: usb 1-4: Product: USB2.0 Hub
Jul 08 16:12:25 dom0 kernel: usb 1-4: Device is not authorized for usage
Jul 08 16:12:26 dom0 kernel: usb 1-5: new high-speed USB device number 5 using xhci_hcd
Jul 08 16:12:26 dom0 kernel: usb 1-5: New USB device found, idVendor=0e8d, idProduct=e616, bcdDevice= 1.00
Jul 08 16:12:26 dom0 kernel: usb 1-5: New USB device strings: Mfr=5, Product=6, SerialNumber=7
Jul 08 16:12:26 dom0 kernel: usb 1-5: Product: Wireless_Device
Jul 08 16:12:26 dom0 kernel: usb 1-5: Manufacturer: MediaTek Inc.
Jul 08 16:12:26 dom0 kernel: usb 1-5: SerialNumber: 000000000
Jul 08 16:12:26 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-2" device_rule=626C6F636B20696420303565333A30363130206E616D652022555342322E312048756222207669612D706F72742022312D322220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:26 dom0 kernel: usb 1-5: Device is not authorized for usage
Jul 08 16:12:26 dom0 kernel: hub 1-2:1.0: USB hub found
Jul 08 16:12:26 dom0 kernel: hub 1-2:1.0: 4 ports detected
Jul 08 16:12:26 dom0 kernel: usb 1-2: authorized to connect
Jul 08 16:12:26 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-2" target="allow" device_rule=626C6F636B20696420303565333A30363130206E616D652022555342322E312048756222207669612D706F72742022312D322220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:26 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.4/usb3/3-1" device_rule=626C6F636B20696420306264613A35363334206E616D6520224C6170746F702043616D65726122207669612D706F72742022332D312220776974682D696E74657266616365207B2030653A30313A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A3030207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:26 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.4/usb3/3-1" target="block" device_rule=626C6F636B20696420306264613A35363334206E616D6520224C6170746F702043616D65726122207669612D706F72742022332D312220776974682D696E74657266616365207B2030653A30313A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A3030207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:26 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb2/2-2" device_rule=626C6F636B20696420303565333A30363235206E616D652022555342332E322048756222207669612D706F72742022322D322220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:26 dom0 kernel: hub 2-2:1.0: USB hub found
Jul 08 16:12:26 dom0 kernel: hub 2-2:1.0: 3 ports detected
Jul 08 16:12:26 dom0 kernel: usb 2-2: authorized to connect
Jul 08 16:12:26 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb2/2-2" target="allow" device_rule=626C6F636B20696420303565333A30363235206E616D652022555342332E322048756222207669612D706F72742022322D322220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:26 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-3" device_rule=626C6F636B20696420303565333A30363130206E616D652022555342322E302048756222207669612D706F72742022312D332220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:26 dom0 kernel: hub 1-3:1.0: USB hub found
Jul 08 16:12:26 dom0 kernel: hub 1-3:1.0: 3 ports detected
Jul 08 16:12:26 dom0 kernel: md/raid1:md127: active with 2 out of 2 mirrors
Jul 08 16:12:26 dom0 kernel: md/raid1:md126: active with 2 out of 2 mirrors
Jul 08 16:12:26 dom0 kernel: md126: detected capacity change from 0 to 4188160
Jul 08 16:12:26 dom0 kernel: md127: detected capacity change from 0 to 970215424
Jul 08 16:12:26 dom0 kernel: [drm] amdgpu kernel modesetting enabled.
Jul 08 16:12:26 dom0 kernel: amdgpu: Virtual CRAT table created for CPU
Jul 08 16:12:26 dom0 kernel: amdgpu: Topology: Add CPU node
Jul 08 16:12:26 dom0 kernel: ucsi_acpi USBC000:00: unknown error 256
Jul 08 16:12:26 dom0 kernel: ucsi_acpi USBC000:00: GET_CABLE_PROPERTY failed (-5)
Jul 08 16:12:26 dom0 kernel: xen: registering gsi 38 triggering 0 polarity 1
Jul 08 16:12:26 dom0 kernel: Already setup the GSI :38
Jul 08 16:12:26 dom0 kernel: [drm] initializing kernel modesetting (IP DISCOVERY 0x1002:0x15BF 0xF111:0x0005 0xC2).
Jul 08 16:12:26 dom0 kernel: [drm] register mmio base: 0x90500000
Jul 08 16:12:26 dom0 kernel: [drm] register mmio size: 524288
Jul 08 16:12:26 dom0 kernel: [drm] add ip block number 0 <soc21_common>
Jul 08 16:12:26 dom0 kernel: [drm] add ip block number 1 <gmc_v11_0>
Jul 08 16:12:26 dom0 kernel: [drm] add ip block number 2 <ih_v6_0>
Jul 08 16:12:26 dom0 kernel: [drm] add ip block number 3 <psp>
Jul 08 16:12:26 dom0 kernel: [drm] add ip block number 4 <smu>
Jul 08 16:12:26 dom0 kernel: [drm] add ip block number 5 <dm>
Jul 08 16:12:26 dom0 kernel: [drm] add ip block number 6 <gfx_v11_0>
Jul 08 16:12:26 dom0 kernel: [drm] add ip block number 7 <sdma_v6_0>
Jul 08 16:12:26 dom0 kernel: [drm] add ip block number 8 <vcn_v4_0>
Jul 08 16:12:26 dom0 kernel: [drm] add ip block number 9 <jpeg_v4_0>
Jul 08 16:12:26 dom0 kernel: [drm] add ip block number 10 <mes_v11_0>
Jul 08 16:12:26 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: Fetched VBIOS from VFCT
Jul 08 16:12:27 dom0 kernel: amdgpu: ATOM BIOS: 113-PHXGENERIC-001
Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: vgaarb: deactivate vga console
Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: Trusted Memory Zone (TMZ) feature enabled
Jul 08 16:12:27 dom0 kernel: [drm] vm size is 262144 GB, 4 levels, block size is 9-bit, fragment size is 9-bit
Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: VRAM: 2048M 0x0000008000000000 - 0x000000807FFFFFFF (2048M used)
Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: GART: 512M 0x00007FFF00000000 - 0x00007FFF1FFFFFFF
Jul 08 16:12:27 dom0 kernel: [drm] Detected VRAM RAM=2048M, BAR=2048M
Jul 08 16:12:27 dom0 kernel: [drm] RAM width 128bits DDR5
Jul 08 16:12:27 dom0 kernel: usb 1-3: authorized to connect
Jul 08 16:12:27 dom0 kernel: hub 1-4:1.0: USB hub found
Jul 08 16:12:27 dom0 kernel: hub 1-4:1.0: 4 ports detected
Jul 08 16:12:27 dom0 kernel: usb 1-4: authorized to connect
Jul 08 16:12:27 dom0 kernel: [drm] amdgpu: 2048M of VRAM memory ready
Jul 08 16:12:27 dom0 kernel: [drm] amdgpu: 1947M of GTT memory ready.
Jul 08 16:12:27 dom0 kernel: [drm] GART: num cpu pages 131072, num gpu pages 131072
Jul 08 16:12:27 dom0 kernel: [drm] PCIE GART of 512M enabled (table at 0x000000807FD00000).
Jul 08 16:12:27 dom0 kernel: [drm] Loading DMUB firmware via PSP: version=0x08004E00
Jul 08 16:12:27 dom0 kernel: [drm] Found VCN firmware Version ENC: 1.23 DEC: 9 VEP: 0 Revision: 16
Jul 08 16:12:27 dom0 kernel: usb 1-2.3: new full-speed USB device number 6 using xhci_hcd
Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: reserve 0x4000000 from 0x8078000000 for PSP TMR
Jul 08 16:12:27 dom0 kernel: usb 1-2.3: New USB device found, idVendor=1050, idProduct=0404, bcdDevice= 4.37
Jul 08 16:12:27 dom0 kernel: usb 1-2.3: New USB device strings: Mfr=1, Product=2, SerialNumber=0
Jul 08 16:12:27 dom0 kernel: usb 1-2.3: Product: Yubikey 4 CCID
Jul 08 16:12:27 dom0 kernel: usb 1-2.3: Manufacturer: Yubico
Jul 08 16:12:27 dom0 kernel: usb 1-2.3: Device is not authorized for usage
Jul 08 16:12:27 dom0 kernel: usb 2-2.2: new SuperSpeed USB device number 3 using xhci_hcd
Jul 08 16:12:27 dom0 kernel: usb 2-2.2: New USB device found, idVendor=0bda, idProduct=8156, bcdDevice=31.04
Jul 08 16:12:27 dom0 kernel: usb 2-2.2: New USB device strings: Mfr=1, Product=2, SerialNumber=6
Jul 08 16:12:27 dom0 kernel: usb 2-2.2: Product: USB 10/100/1G/2.5G LAN
Jul 08 16:12:27 dom0 kernel: usb 2-2.2: Manufacturer: Realtek
Jul 08 16:12:27 dom0 kernel: usb 2-2.2: SerialNumber: 4013000001
Jul 08 16:12:27 dom0 kernel: usb 2-2.2: Device is not authorized for usage
Jul 08 16:12:27 dom0 kernel: usb 1-4.1: new full-speed USB device number 7 using xhci_hcd
Jul 08 16:12:27 dom0 kernel: usb 1-4.1: New USB device found, idVendor=27c6, idProduct=609c, bcdDevice= 1.00
Jul 08 16:12:27 dom0 kernel: usb 1-4.1: New USB device strings: Mfr=1, Product=2, SerialNumber=3
Jul 08 16:12:27 dom0 kernel: usb 1-4.1: Product: Goodix USB2.0 MISC
Jul 08 16:12:27 dom0 kernel: usb 1-4.1: Manufacturer: Goodix Technology Co., Ltd.
Jul 08 16:12:27 dom0 kernel: usb 1-4.1: SerialNumber: UIDD9EB3F17_XXXX_MOC_B0
Jul 08 16:12:27 dom0 kernel: usb 1-4.1: Device is not authorized for usage
Jul 08 16:12:27 dom0 kernel: usb 1-4.3: new full-speed USB device number 8 using xhci_hcd
Jul 08 16:12:27 dom0 kernel: usb 1-4.3: unable to get BOS descriptor set
Jul 08 16:12:27 dom0 kernel: usb 1-4.3: New USB device found, idVendor=32ac, idProduct=0012, bcdDevice= 0.29
Jul 08 16:12:27 dom0 kernel: usb 1-4.3: New USB device strings: Mfr=1, Product=2, SerialNumber=3
Jul 08 16:12:27 dom0 kernel: usb 1-4.3: Product: Laptop 16 Keyboard Module - ANSI
Jul 08 16:12:27 dom0 kernel: usb 1-4.3: Manufacturer: Framework
Jul 08 16:12:27 dom0 kernel: usb 1-4.3: SerialNumber: FRAKDKEN0100000000
Jul 08 16:12:27 dom0 kernel: usb 1-4.3: Device is not authorized for usage
Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: RAS: optional ras ta ucode is not available
Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: RAP: optional rap ta ucode is not available
Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: SECUREDISPLAY: securedisplay ta ucode is not available
Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: SMU is initialized successfully!
Jul 08 16:12:27 dom0 kernel: [drm] Seamless boot condition check passed
Jul 08 16:12:27 dom0 kernel: [drm] Display Core v3.2.301 initialized on DCN 3.1.4
Jul 08 16:12:27 dom0 kernel: [drm] DP-HDMI FRL PCON supported
Jul 08 16:12:27 dom0 kernel: [drm] DMUB hardware initialized: version=0x08004E00
Jul 08 16:12:27 dom0 kernel: kfd kfd: amdgpu: Allocated 3969056 bytes on gart
Jul 08 16:12:27 dom0 kernel: kfd kfd: amdgpu: Total number of KFD nodes to be created: 1
Jul 08 16:12:27 dom0 kernel: amdgpu: Virtual CRAT table created for GPU
Jul 08 16:12:27 dom0 kernel: amdgpu: Topology: Add dGPU node [0x15bf:0x1002]
Jul 08 16:12:27 dom0 kernel: kfd kfd: amdgpu: added device 1002:15bf
Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: SE 1, SH per SE 2, CU per SH 6, active_cu_number 12
Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: ring gfx_0.0.0 uses VM inv eng 0 on hub 0
Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: ring comp_1.0.0 uses VM inv eng 1 on hub 0
Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: ring comp_1.1.0 uses VM inv eng 4 on hub 0
Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: ring comp_1.2.0 uses VM inv eng 6 on hub 0
Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: ring comp_1.3.0 uses VM inv eng 7 on hub 0
Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: ring comp_1.0.1 uses VM inv eng 8 on hub 0
Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: ring comp_1.1.1 uses VM inv eng 9 on hub 0
Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: ring comp_1.2.1 uses VM inv eng 10 on hub 0
Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: ring comp_1.3.1 uses VM inv eng 11 on hub 0
Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: ring sdma0 uses VM inv eng 12 on hub 0
Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: ring vcn_unified_0 uses VM inv eng 0 on hub 8
Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: ring jpeg_dec uses VM inv eng 1 on hub 8
Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: ring mes_kiq_3.1.0 uses VM inv eng 13 on hub 0
Jul 08 16:12:27 dom0 kernel: [drm] ring gfx_32768.1.1 was added
Jul 08 16:12:27 dom0 kernel: [drm] ring compute_32768.2.2 was added
Jul 08 16:12:27 dom0 kernel: [drm] ring sdma_32768.3.3 was added
Jul 08 16:12:27 dom0 kernel: [drm] ring gfx_32768.1.1 ib test pass
Jul 08 16:12:27 dom0 kernel: [drm] ring compute_32768.2.2 ib test pass
Jul 08 16:12:27 dom0 kernel: [drm] ring sdma_32768.3.3 ib test pass
Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: amdgpu: Runtime PM not available
Jul 08 16:12:27 dom0 kernel: [drm] Initialized amdgpu 3.61.0 for 0000:c2:00.0 on minor 0
Jul 08 16:12:27 dom0 kernel: fbcon: amdgpudrmfb (fb0) is primary device
Jul 08 16:12:27 dom0 kernel: fbcon: Deferring console take-over
Jul 08 16:12:27 dom0 kernel: amdgpu 0000:c2:00.0: [drm] fb0: amdgpudrmfb frame buffer device
Jul 08 16:12:27 dom0 kernel: input: Framework Laptop 16 Keyboard Module - ANSI as /devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-4/1-4.3/1-4.3:1.0/0003:32AC:0012.0003/input/input7
Jul 08 16:12:27 dom0 kernel: [drm] pre_validate_dsc:1596 MST_DSC dsc precompute is not needed
Jul 08 16:12:27 dom0 kernel: hid-generic 0003:32AC:0012.0003: input,hidraw2: USB HID v1.11 Keyboard [Framework Laptop 16 Keyboard Module - ANSI] on usb-0000:c2:00.3-4.3/input0
Jul 08 16:12:27 dom0 kernel: hid-generic 0003:32AC:0012.0004: hiddev96,hidraw3: USB HID v1.11 Device [Framework Laptop 16 Keyboard Module - ANSI] on usb-0000:c2:00.3-4.3/input1
Jul 08 16:12:27 dom0 kernel: input: Framework Laptop 16 Keyboard Module - ANSI System Control as /devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-4/1-4.3/1-4.3:1.2/0003:32AC:0012.0005/input/input8
Jul 08 16:12:27 dom0 kernel: input: Framework Laptop 16 Keyboard Module - ANSI Consumer Control as /devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-4/1-4.3/1-4.3:1.2/0003:32AC:0012.0005/input/input9
Jul 08 16:12:27 dom0 kernel: input: Framework Laptop 16 Keyboard Module - ANSI Wireless Radio Control as /devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-4/1-4.3/1-4.3:1.2/0003:32AC:0012.0005/input/input10
Jul 08 16:12:27 dom0 kernel: input: Framework Laptop 16 Keyboard Module - ANSI Keyboard as /devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-4/1-4.3/1-4.3:1.2/0003:32AC:0012.0005/input/input11
Jul 08 16:12:27 dom0 kernel: hid-generic 0003:32AC:0012.0005: input,hidraw4: USB HID v1.11 Keyboard [Framework Laptop 16 Keyboard Module - ANSI] on usb-0000:c2:00.3-4.3/input2
Jul 08 16:12:27 dom0 kernel: hid-generic 0003:32AC:0012.0006: hiddev97,hidraw5: USB HID v1.11 Device [Framework Laptop 16 Keyboard Module - ANSI] on usb-0000:c2:00.3-4.3/input3
Jul 08 16:12:27 dom0 kernel: usb 1-4.3: authorized to connect
Jul 08 16:12:26 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-3" target="allow" device_rule=626C6F636B20696420303565333A30363130206E616D652022555342322E302048756222207669612D706F72742022312D332220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:26 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-4" device_rule=626C6F636B20696420303565333A30363130206E616D652022555342322E302048756222207669612D706F72742022312D342220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:26 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-4" target="allow" device_rule=626C6F636B20696420303565333A30363130206E616D652022555342322E302048756222207669612D706F72742022312D342220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:26 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-5" device_rule=626C6F636B20696420306538643A65363136206E616D652022576972656C6573735F44657669636522207669612D706F72742022312D352220776974682D696E74657266616365207B2065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A3031207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:26 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-5" target="block" device_rule=626C6F636B20696420306538643A65363136206E616D652022576972656C6573735F44657669636522207669612D706F72742022312D352220776974682D696E74657266616365207B2065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A3031207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:26 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-ask-password-plymouth comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:26 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-2/1-2.3" device_rule=626C6F636B20696420313035303A30343034206E616D652022597562696B65792034204343494422207669612D706F72742022312D322E332220776974682D696E746572666163652030623A30303A303020776974682D636F6E6E6563742D747970652022756E6B6E6F776E22 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:26 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-2/1-2.3" target="block" device_rule=626C6F636B20696420313035303A30343034206E616D652022597562696B65792034204343494422207669612D706F72742022312D322E332220776974682D696E746572666163652030623A30303A303020776974682D636F6E6E6563742D747970652022756E6B6E6F776E22 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:26 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb2/2-2/2-2.2" device_rule=626C6F636B20696420306264613A38313536206E616D6520225553422031302F3130302F31472F322E3547204C414E22207669612D706F72742022322D322E322220776974682D696E74657266616365207B2066663A66663A30302030323A30643A30302030613A30303A30312030613A30303A30312030323A30363A30302030613A30303A30302030613A30303A3030207D20776974682D636F6E6E6563742D747970652022756E6B6E6F776E22 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:26 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb2/2-2/2-2.2" target="block" device_rule=626C6F636B20696420306264613A38313536206E616D6520225553422031302F3130302F31472F322E3547204C414E22207669612D706F72742022322D322E322220776974682D696E74657266616365207B2066663A66663A30302030323A30643A30302030613A30303A30312030613A30303A30312030323A30363A30302030613A30303A30302030613A30303A3030207D20776974682D636F6E6E6563742D747970652022756E6B6E6F776E22 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:27 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-4/1-4.1" device_rule=626C6F636B20696420323763363A36303963206E616D652022476F6F64697820555342322E30204D49534322207669612D706F72742022312D342E312220776974682D696E746572666163652066663A30303A303020776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:27 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-4/1-4.1" target="block" device_rule=626C6F636B20696420323763363A36303963206E616D652022476F6F64697820555342322E30204D49534322207669612D706F72742022312D342E312220776974682D696E746572666163652066663A30303A303020776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:27 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-4/1-4.3" device_rule=626C6F636B20696420333261633A30303132206E616D6520224C6170746F70203136204B6579626F617264204D6F64756C65202D20414E534922207669612D706F72742022312D342E332220776974682D696E74657266616365207B2030333A30313A30312030333A30303A30302030333A30303A30302030333A30303A3030207D20776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:27 dom0 audit[466]: USER_DEVICE pid=466 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-4/1-4.3" target="allow" device_rule=626C6F636B20696420333261633A30303132206E616D6520224C6170746F70203136204B6579626F617264204D6F64756C65202D20414E534922207669612D706F72742022312D342E332220776974682D696E74657266616365207B2030333A30313A30312030333A30303A30302030333A30303A30302030333A30303A3030207D20776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:26 dom0 usbguard-daemon[466]: Ignoring unknown UEvent action: sysfs_devpath=/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-2 action=change
Jul 08 16:12:26 dom0 systemd[1]: Found device dev-disk-by\x2duuid-c4157ae0\x2dc1c9\x2d4d2e\x2d8ee9\x2d9aecc2d9966d.device - /dev/disk/by-uuid/c4157ae0-c1c9-4d2e-8ee9-9aecc2d9966d.
Jul 08 16:12:26 dom0 usbguard-daemon[466]: Ignoring unknown UEvent action: sysfs_devpath=/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb2/2-2 action=change
Jul 08 16:12:26 dom0 systemd[1]: Starting systemd-cryptsetup@luks\x2dc4157ae0\x2dc1c9\x2d4d2e\x2d8ee9\x2d9aecc2d9966d.service - Cryptography Setup for luks-c4157ae0-c1c9-4d2e-8ee9-9aecc2d9966d...
Jul 08 16:12:26 dom0 usbguard-daemon[466]: Ignoring unknown UEvent action: sysfs_devpath=/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-3 action=change
Jul 08 16:12:26 dom0 systemd[1]: Started systemd-ask-password-plymouth.service - Forward Password Requests to Plymouth.
Jul 08 16:12:26 dom0 usbguard-daemon[466]: Ignoring unknown UEvent action: sysfs_devpath=/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-4 action=change
Jul 08 16:12:27 dom0 usbguard-daemon[466]: Ignoring unknown UEvent action: sysfs_devpath=/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-4/1-4.3 action=change
Jul 08 16:12:37 dom0 systemd-cryptsetup[851]: Set cipher aes, mode xts-plain64, key size 512 bits for device /dev/disk/by-uuid/c4157ae0-c1c9-4d2e-8ee9-9aecc2d9966d.
Jul 08 16:12:39 dom0 audit[851]: DM_CTRL module=crypt op=ctr ppid=1 pid=851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-cryptse" exe="/usr/lib/systemd/systemd-cryptsetup" dev=253:0 error_msg='success' res=1
Jul 08 16:12:39 dom0 audit[851]: SYSCALL arch=c000003e syscall=16 success=yes exit=0 a0=4 a1=c138fd09 a2=58905e78e410 a3=0 items=8 ppid=1 pid=851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-cryptse" exe="/usr/lib/systemd/systemd-cryptsetup" key=(null)
Jul 08 16:12:39 dom0 audit: CWD cwd="/"
Jul 08 16:12:39 dom0 audit: PATH item=0 name=(null) inode=1025 dev=00:08 mode=040755 ouid=0 ogid=0 rdev=00:00 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul 08 16:12:39 dom0 audit: PATH item=1 name=(null) inode=11462 dev=00:08 mode=040755 ouid=0 ogid=0 rdev=00:00 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul 08 16:12:39 dom0 audit: PATH item=2 name=(null) inode=27 dev=00:08 mode=040755 ouid=0 ogid=0 rdev=00:00 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul 08 16:12:39 dom0 audit: PATH item=3 name=(null) inode=11463 dev=00:08 mode=040755 ouid=0 ogid=0 rdev=00:00 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul 08 16:12:39 dom0 audit: PATH item=4 name=(null) inode=11463 dev=00:08 mode=040755 ouid=0 ogid=0 rdev=00:00 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul 08 16:12:39 dom0 audit: PATH item=5 name=(null) inode=11464 dev=00:08 mode=0100444 ouid=0 ogid=0 rdev=00:00 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul 08 16:12:39 dom0 audit: PATH item=6 name=(null) inode=11463 dev=00:08 mode=040755 ouid=0 ogid=0 rdev=00:00 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul 08 16:12:39 dom0 audit: PATH item=7 name=(null) inode=11465 dev=00:08 mode=0100444 ouid=0 ogid=0 rdev=00:00 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul 08 16:12:39 dom0 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D642D6372797074736574757000617474616368006C756B732D63343135376165302D633163392D346432652D386565392D396165636332643939363664002F6465762F6469736B2F62792D757569642F63343135376165302D633163392D346432652D386565392D39
Jul 08 16:12:39 dom0 kernel: kauditd_printk_skb: 70 callbacks suppressed
Jul 08 16:12:39 dom0 kernel: audit: type=1338 audit(1752009159.125:81): module=crypt op=ctr ppid=1 pid=851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-cryptse" exe="/usr/lib/systemd/systemd-cryptsetup" dev=253:0 error_msg='success' res=1
Jul 08 16:12:39 dom0 kernel: audit: type=1300 audit(1752009159.125:81): arch=c000003e syscall=16 success=yes exit=0 a0=4 a1=c138fd09 a2=58905e78e410 a3=0 items=8 ppid=1 pid=851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-cryptse" exe="/usr/lib/systemd/systemd-cryptsetup" key=(null)
Jul 08 16:12:39 dom0 kernel: audit: type=1307 audit(1752009159.125:81): cwd="/"
Jul 08 16:12:39 dom0 kernel: audit: type=1302 audit(1752009159.125:81): item=0 name=(null) inode=1025 dev=00:08 mode=040755 ouid=0 ogid=0 rdev=00:00 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul 08 16:12:39 dom0 kernel: audit: type=1302 audit(1752009159.125:81): item=1 name=(null) inode=11462 dev=00:08 mode=040755 ouid=0 ogid=0 rdev=00:00 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul 08 16:12:39 dom0 kernel: audit: type=1302 audit(1752009159.125:81): item=2 name=(null) inode=27 dev=00:08 mode=040755 ouid=0 ogid=0 rdev=00:00 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul 08 16:12:39 dom0 kernel: audit: type=1302 audit(1752009159.125:81): item=3 name=(null) inode=11463 dev=00:08 mode=040755 ouid=0 ogid=0 rdev=00:00 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul 08 16:12:39 dom0 kernel: audit: type=1302 audit(1752009159.125:81): item=4 name=(null) inode=11463 dev=00:08 mode=040755 ouid=0 ogid=0 rdev=00:00 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul 08 16:12:39 dom0 kernel: audit: type=1302 audit(1752009159.125:81): item=5 name=(null) inode=11464 dev=00:08 mode=0100444 ouid=0 ogid=0 rdev=00:00 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul 08 16:12:39 dom0 kernel: audit: type=1302 audit(1752009159.125:81): item=6 name=(null) inode=11463 dev=00:08 mode=040755 ouid=0 ogid=0 rdev=00:00 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul 08 16:12:39 dom0 systemd[1]: Finished systemd-cryptsetup@luks\x2dc4157ae0\x2dc1c9\x2d4d2e\x2d8ee9\x2d9aecc2d9966d.service - Cryptography Setup for luks-c4157ae0-c1c9-4d2e-8ee9-9aecc2d9966d.
Jul 08 16:12:39 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-cryptsetup@luks\x2dc4157ae0\x2dc1c9\x2d4d2e\x2d8ee9\x2d9aecc2d9966d comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:39 dom0 systemd[1]: Reached target cryptsetup.target - Local Encrypted Volumes.
Jul 08 16:12:39 dom0 systemd[1]: Reached target sysinit.target - System Initialization.
Jul 08 16:12:39 dom0 systemd[1]: Reached target basic.target - Basic System.
Jul 08 16:12:39 dom0 dracut-initqueue[1137]: Scanning devices dm-0 for LVM logical volumes qubes_dom0/root
Jul 08 16:12:39 dom0 dracut-initqueue[1137]: qubes_dom0/swap
Jul 08 16:12:39 dom0 dracut-initqueue[1158]: WARNING: File locking is disabled.
Jul 08 16:12:39 dom0 dracut-initqueue[1137]: qubes_dom0/root thin
Jul 08 16:12:39 dom0 dracut-initqueue[1137]: qubes_dom0/swap linear
Jul 08 16:12:41 dom0 systemd[1]: Found device dev-mapper-qubes_dom0\x2droot.device - /dev/mapper/qubes_dom0-root.
Jul 08 16:12:41 dom0 systemd[1]: Reached target initrd-root-device.target - Initrd Root Device.
Jul 08 16:12:41 dom0 systemd[1]: Finished dracut-initqueue.service - dracut initqueue hook.
Jul 08 16:12:41 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:41 dom0 systemd[1]: Reached target remote-fs-pre.target - Preparation for Remote File Systems.
Jul 08 16:12:41 dom0 systemd[1]: Reached target remote-cryptsetup.target - Remote Encrypted Volumes.
Jul 08 16:12:41 dom0 systemd[1]: Reached target remote-fs.target - Remote File Systems.
Jul 08 16:12:41 dom0 systemd[1]: Starting dracut-pre-mount.service - dracut pre-mount hook...
Jul 08 16:12:41 dom0 systemd[1]: Finished dracut-pre-mount.service - dracut pre-mount hook.
Jul 08 16:12:41 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:41 dom0 systemd[1]: Starting systemd-fsck-root.service - File System Check on /dev/mapper/qubes_dom0-root...
Jul 08 16:12:41 dom0 systemd-fsck[1215]: root: clean, 312337/23691264 files, 5822568/94737408 blocks
Jul 08 16:12:41 dom0 systemd[1]: Finished systemd-fsck-root.service - File System Check on /dev/mapper/qubes_dom0-root.
Jul 08 16:12:41 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:41 dom0 systemd[1]: Mounting sysroot.mount - /sysroot...
Jul 08 16:12:41 dom0 kernel: EXT4-fs (dm-4): mounted filesystem 0ac75727-2814-43da-9fd8-825bf56de02d ro with ordered data mode. Quota mode: none.
Jul 08 16:12:41 dom0 systemd[1]: Mounted sysroot.mount - /sysroot.
Jul 08 16:12:41 dom0 systemd[1]: Reached target initrd-root-fs.target - Initrd Root File System.
Jul 08 16:12:41 dom0 systemd[1]: Starting initrd-parse-etc.service - Reload Configuration from the Real Root...
Jul 08 16:12:41 dom0 systemd[1]: Reloading.
Jul 08 16:12:42 dom0 audit: BPF prog-id=22 op=LOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=23 op=LOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=17 op=UNLOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=18 op=UNLOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=24 op=LOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=14 op=UNLOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=25 op=LOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=26 op=LOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=15 op=UNLOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=16 op=UNLOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=27 op=LOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=19 op=UNLOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=28 op=LOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=29 op=LOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=20 op=UNLOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=21 op=UNLOAD
Jul 08 16:12:42 dom0 systemd[1]: initrd-parse-etc.service: Deactivated successfully.
Jul 08 16:12:42 dom0 systemd[1]: Finished initrd-parse-etc.service - Reload Configuration from the Real Root.
Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 systemd[1]: Reached target initrd-fs.target - Initrd File Systems.
Jul 08 16:12:42 dom0 systemd[1]: Reached target initrd.target - Initrd Default Target.
Jul 08 16:12:42 dom0 systemd[1]: dracut-mount.service - dracut mount hook was skipped because all trigger condition checks failed.
Jul 08 16:12:42 dom0 systemd[1]: Starting dracut-pre-pivot.service - dracut pre-pivot and cleanup hook...
Jul 08 16:12:42 dom0 systemd[1]: Finished dracut-pre-pivot.service - dracut pre-pivot and cleanup hook.
Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 systemd[1]: Starting initrd-cleanup.service - Cleaning Up and Shutting Down Daemons...
Jul 08 16:12:42 dom0 systemd[1]: Stopped target remote-cryptsetup.target - Remote Encrypted Volumes.
Jul 08 16:12:42 dom0 systemd[1]: Stopped target timers.target - Timer Units.
Jul 08 16:12:42 dom0 systemd[1]: dracut-pre-pivot.service: Deactivated successfully.
Jul 08 16:12:42 dom0 systemd[1]: Stopped dracut-pre-pivot.service - dracut pre-pivot and cleanup hook.
Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 systemd[1]: Stopped target initrd.target - Initrd Default Target.
Jul 08 16:12:42 dom0 systemd[1]: Stopped target basic.target - Basic System.
Jul 08 16:12:42 dom0 systemd[1]: Stopped target initrd-root-device.target - Initrd Root Device.
Jul 08 16:12:42 dom0 systemd[1]: Stopped target initrd-usr-fs.target - Initrd /usr File System.
Jul 08 16:12:42 dom0 systemd[1]: Stopped target paths.target - Path Units.
Jul 08 16:12:42 dom0 systemd[1]: Stopped target remote-fs.target - Remote File Systems.
Jul 08 16:12:42 dom0 systemd[1]: Stopped target remote-fs-pre.target - Preparation for Remote File Systems.
Jul 08 16:12:42 dom0 systemd[1]: Stopped target slices.target - Slice Units.
Jul 08 16:12:42 dom0 systemd[1]: Stopped target sockets.target - Socket Units.
Jul 08 16:12:42 dom0 systemd[1]: Stopped target sysinit.target - System Initialization.
Jul 08 16:12:42 dom0 systemd[1]: Stopped target swap.target - Swaps.
Jul 08 16:12:42 dom0 systemd[1]: dracut-pre-mount.service: Deactivated successfully.
Jul 08 16:12:42 dom0 systemd[1]: Stopped dracut-pre-mount.service - dracut pre-mount hook.
Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 systemd[1]: Stopped target cryptsetup.target - Local Encrypted Volumes.
Jul 08 16:12:42 dom0 systemd[1]: dracut-initqueue.service: Deactivated successfully.
Jul 08 16:12:42 dom0 systemd[1]: Stopped dracut-initqueue.service - dracut initqueue hook.
Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 systemd[1]: dracut-initqueue.service: Consumed 2.418s CPU time.
Jul 08 16:12:42 dom0 systemd[1]: Starting plymouth-switch-root.service - Plymouth switch root service...
Jul 08 16:12:42 dom0 systemd[1]: systemd-sysctl.service: Deactivated successfully.
Jul 08 16:12:42 dom0 systemd[1]: Stopped systemd-sysctl.service - Apply Kernel Variables.
Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 systemd[1]: systemd-modules-load.service: Deactivated successfully.
Jul 08 16:12:42 dom0 systemd[1]: Stopped systemd-modules-load.service - Load Kernel Modules.
Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 systemd[1]: systemd-udev-trigger.service: Deactivated successfully.
Jul 08 16:12:42 dom0 systemd[1]: Stopped systemd-udev-trigger.service - Coldplug All udev Devices.
Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 systemd[1]: dracut-pre-trigger.service: Deactivated successfully.
Jul 08 16:12:42 dom0 systemd[1]: Stopped dracut-pre-trigger.service - dracut pre-trigger hook.
Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 systemd[1]: Stopping systemd-udevd.service - Rule-based Manager for Device Events and Files...
Jul 08 16:12:42 dom0 systemd[1]: Stopping usbguard.service - USBGuard daemon...
Jul 08 16:12:42 dom0 systemd[1]: usbguard.service: Deactivated successfully.
Jul 08 16:12:42 dom0 systemd[1]: Stopped usbguard.service - USBGuard daemon.
Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=usbguard comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 systemd[1]: initrd-cleanup.service: Deactivated successfully.
Jul 08 16:12:42 dom0 systemd[1]: Finished initrd-cleanup.service - Cleaning Up and Shutting Down Daemons.
Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 systemd[1]: systemd-tmpfiles-setup.service: Deactivated successfully.
Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 systemd[1]: Stopped systemd-tmpfiles-setup.service - Create Volatile Files and Directories.
Jul 08 16:12:42 dom0 systemd[1]: Stopped target local-fs.target - Local File Systems.
Jul 08 16:12:42 dom0 systemd[1]: systemd-udevd.service: Deactivated successfully.
Jul 08 16:12:42 dom0 systemd[1]: Stopped systemd-udevd.service - Rule-based Manager for Device Events and Files.
Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 systemd[1]: systemd-udevd.service: Consumed 2.752s CPU time.
Jul 08 16:12:42 dom0 systemd[1]: systemd-udevd-control.socket: Deactivated successfully.
Jul 08 16:12:42 dom0 systemd[1]: Closed systemd-udevd-control.socket - udev Control Socket.
Jul 08 16:12:42 dom0 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully.
Jul 08 16:12:42 dom0 systemd[1]: Closed systemd-udevd-kernel.socket - udev Kernel Socket.
Jul 08 16:12:42 dom0 systemd[1]: dracut-pre-udev.service: Deactivated successfully.
Jul 08 16:12:42 dom0 systemd[1]: Stopped dracut-pre-udev.service - dracut pre-udev hook.
Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 systemd[1]: dracut-cmdline.service: Deactivated successfully.
Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 systemd[1]: Stopped dracut-cmdline.service - dracut cmdline hook.
Jul 08 16:12:42 dom0 audit: BPF prog-id=27 op=UNLOAD
Jul 08 16:12:42 dom0 systemd[1]: Starting initrd-udevadm-cleanup-db.service - Cleanup udev Database...
Jul 08 16:12:42 dom0 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully.
Jul 08 16:12:42 dom0 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev.
Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 systemd[1]: kmod-static-nodes.service: Deactivated successfully.
Jul 08 16:12:42 dom0 systemd[1]: Stopped kmod-static-nodes.service - Create List of Static Device Nodes.
Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 systemd[1]: Finished plymouth-switch-root.service - Plymouth switch root service.
Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=plymouth-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully.
Jul 08 16:12:42 dom0 systemd[1]: Finished initrd-udevadm-cleanup-db.service - Cleanup udev Database.
Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 systemd[1]: Reached target initrd-switch-root.target - Switch Root.
Jul 08 16:12:42 dom0 systemd[1]: Starting initrd-switch-root.service - Switch Root...
Jul 08 16:12:42 dom0 systemd[1]: Switching root.
Jul 08 16:12:42 dom0 systemd-journald[341]: Journal stopped
Jul 08 16:12:42 dom0 systemd-journald[341]: Received SIGTERM from PID 1 (systemd).
Jul 08 16:12:42 dom0 systemd[1]: systemd 251.19-1.fc37 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP -GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS +FIDO2 +IDN2 -IDN -IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 +PWQUALITY +P11KIT +QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD +BPF_FRAMEWORK +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified)
Jul 08 16:12:42 dom0 systemd[1]: Detected virtualization vm-other.
Jul 08 16:12:42 dom0 systemd[1]: Detected architecture x86-64.
Jul 08 16:12:42 dom0 systemd[1]: bpf-lsm: BPF LSM hook not enabled in the kernel, BPF LSM not supported
Jul 08 16:12:42 dom0 systemd[1]: /usr/lib/systemd/system/qubesd.service:8: Standard output type syslog is obsolete, automatically updating to journal. Please update your unit file, and consider removing the setting altogether.
Jul 08 16:12:42 dom0 systemd[1]: /usr/lib/systemd/system/qubes-qmemman.service:7: Standard output type syslog is obsolete, automatically updating to journal. Please update your unit file, and consider removing the setting altogether.
Jul 08 16:12:42 dom0 systemd[1]: /usr/lib/systemd/system/qubes-db-dom0.service:9: Standard output type syslog is obsolete, automatically updating to journal. Please update your unit file, and consider removing the setting altogether.
Jul 08 16:12:42 dom0 systemd[1]: /usr/lib/systemd/system/qubes-core.service:8: Standard output type syslog is obsolete, automatically updating to journal. Please update your unit file, and consider removing the setting altogether.
Jul 08 16:12:42 dom0 systemd[1]: systemd-ask-password-plymouth.service: Deactivated successfully.
Jul 08 16:12:42 dom0 systemd[1]: initrd-switch-root.service: Deactivated successfully.
Jul 08 16:12:42 dom0 systemd[1]: Stopped initrd-switch-root.service - Switch Root.
Jul 08 16:12:42 dom0 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1.
Jul 08 16:12:42 dom0 systemd[1]: Created slice system-getty.slice - Slice /system/getty.
Jul 08 16:12:42 dom0 systemd[1]: Created slice system-qubes\x2dvm.slice - Slice /system/qubes-vm.
Jul 08 16:12:42 dom0 systemd[1]: Created slice system-serial\x2dgetty.slice - Slice /system/serial-getty.
Jul 08 16:12:42 dom0 systemd[1]: Created slice system-systemd\x2dfsck.slice - Slice /system/systemd-fsck.
Jul 08 16:12:42 dom0 systemd[1]: Created slice user.slice - User and Session Slice.
Jul 08 16:12:42 dom0 systemd[1]: systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch was skipped because of a failed condition check (ConditionPathExists=!/run/plymouth/pid).
Jul 08 16:12:42 dom0 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount - Arbitrary Executable File Formats File System Automount Point.
Jul 08 16:12:42 dom0 systemd[1]: Reached target blockdev@dev-mapper-luks\x2dc4157ae0\x2dc1c9\x2d4d2e\x2d8ee9\x2d9aecc2d9966d.target - Block Device Preparation for /dev/mapper/luks-c4157ae0-c1c9-4d2e-8ee9-9aecc2d9966d.
Jul 08 16:12:42 dom0 systemd[1]: Stopped target initrd-switch-root.target - Switch Root.
Jul 08 16:12:42 dom0 systemd[1]: Stopped target initrd-fs.target - Initrd File Systems.
Jul 08 16:12:42 dom0 systemd[1]: Stopped target initrd-root-fs.target - Initrd Root File System.
Jul 08 16:12:42 dom0 systemd[1]: Reached target integritysetup.target - Local Integrity Protected Volumes.
Jul 08 16:12:42 dom0 systemd[1]: Reached target remote-cryptsetup.target - Remote Encrypted Volumes.
Jul 08 16:12:42 dom0 systemd[1]: Reached target remote-fs.target - Remote File Systems.
Jul 08 16:12:42 dom0 systemd[1]: Reached target slices.target - Slice Units.
Jul 08 16:12:42 dom0 systemd[1]: Reached target veritysetup.target - Local Verity Protected Volumes.
Jul 08 16:12:42 dom0 systemd[1]: Listening on dm-event.socket - Device-mapper event daemon FIFOs.
Jul 08 16:12:42 dom0 systemd[1]: Listening on systemd-coredump.socket - Process Core Dump Socket.
Jul 08 16:12:42 dom0 systemd[1]: Listening on systemd-initctl.socket - initctl Compatibility Named Pipe.
Jul 08 16:12:42 dom0 systemd[1]: Listening on systemd-udevd-control.socket - udev Control Socket.
Jul 08 16:12:42 dom0 systemd[1]: Listening on systemd-udevd-kernel.socket - udev Kernel Socket.
Jul 08 16:12:42 dom0 systemd[1]: Listening on systemd-userdbd.socket - User Database Manager Socket.
Jul 08 16:12:42 dom0 systemd[1]: Activating swap dev-mapper-qubes_dom0\x2dswap.swap - /dev/mapper/qubes_dom0-swap...
Jul 08 16:12:42 dom0 systemd[1]: dev-hugepages.mount - Huge Pages File System was skipped because of a failed condition check (ConditionPathExists=/sys/kernel/mm/hugepages).
Jul 08 16:12:42 dom0 systemd[1]: Mounting dev-mqueue.mount - POSIX Message Queue File System...
Jul 08 16:12:42 dom0 systemd[1]: Mounting proc-xen.mount - Mount /proc/xen files...
Jul 08 16:12:42 dom0 systemd[1]: Mounting sys-kernel-debug.mount - Kernel Debug File System...
Jul 08 16:12:42 dom0 kernel: Adding 10485756k swap on /dev/mapper/qubes_dom0-swap. Priority:-2 extents:1 across:10485756k SS
Jul 08 16:12:42 dom0 systemd[1]: Mounting sys-kernel-tracing.mount - Kernel Trace File System...
Jul 08 16:12:42 dom0 systemd[1]: Starting kmod-static-nodes.service - Create List of Static Device Nodes...
Jul 08 16:12:42 dom0 systemd[1]: Starting lvm2-monitor.service - Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling...
Jul 08 16:12:42 dom0 systemd[1]: Starting modprobe@configfs.service - Load Kernel Module configfs...
Jul 08 16:12:42 dom0 systemd[1]: Starting modprobe@dm_mod.service - Load Kernel Module dm_mod...
Jul 08 16:12:42 dom0 systemd[1]: Starting modprobe@drm.service - Load Kernel Module drm...
Jul 08 16:12:42 dom0 systemd[1]: Starting modprobe@fuse.service - Load Kernel Module fuse...
Jul 08 16:12:42 dom0 systemd[1]: Starting modprobe@loop.service - Load Kernel Module loop...
Jul 08 16:12:42 dom0 systemd[1]: plymouth-switch-root.service: Deactivated successfully.
Jul 08 16:12:42 dom0 systemd[1]: Stopped plymouth-switch-root.service - Plymouth switch root service.
Jul 08 16:12:42 dom0 systemd[1]: Stopped systemd-journald.service - Journal Service.
Jul 08 16:12:42 dom0 systemd[1]: Starting systemd-journald.service - Journal Service...
Jul 08 16:12:42 dom0 systemd[1]: Starting systemd-modules-load.service - Load Kernel Modules...
Jul 08 16:12:42 dom0 systemd[1]: Starting systemd-network-generator.service - Generate network units from Kernel command line...
Jul 08 16:12:42 dom0 systemd[1]: Starting systemd-remount-fs.service - Remount Root and Kernel File Systems...
Jul 08 16:12:42 dom0 kernel: loop: module loaded
Jul 08 16:12:42 dom0 kernel: fuse: init (API version 7.41)
Jul 08 16:12:42 dom0 systemd[1]: Starting systemd-udev-trigger.service - Coldplug All udev Devices...
Jul 08 16:12:42 dom0 systemd[1]: Activated swap dev-mapper-qubes_dom0\x2dswap.swap - /dev/mapper/qubes_dom0-swap.
Jul 08 16:12:42 dom0 systemd[1]: Mounted dev-mqueue.mount - POSIX Message Queue File System.
Jul 08 16:12:42 dom0 systemd[1]: Mounted proc-xen.mount - Mount /proc/xen files.
Jul 08 16:12:42 dom0 systemd[1]: Mounted sys-kernel-debug.mount - Kernel Debug File System.
Jul 08 16:12:42 dom0 systemd[1]: Mounted sys-kernel-tracing.mount - Kernel Trace File System.
Jul 08 16:12:42 dom0 systemd[1]: Finished kmod-static-nodes.service - Create List of Static Device Nodes.
Jul 08 16:12:42 dom0 systemd[1]: modprobe@configfs.service: Deactivated successfully.
Jul 08 16:12:42 dom0 systemd[1]: Finished modprobe@configfs.service - Load Kernel Module configfs.
Jul 08 16:12:42 dom0 systemd[1]: modprobe@dm_mod.service: Deactivated successfully.
Jul 08 16:12:42 dom0 systemd[1]: Finished modprobe@dm_mod.service - Load Kernel Module dm_mod.
Jul 08 16:12:42 dom0 systemd[1]: modprobe@drm.service: Deactivated successfully.
Jul 08 16:12:42 dom0 systemd[1]: Finished modprobe@drm.service - Load Kernel Module drm.
Jul 08 16:12:42 dom0 systemd[1]: modprobe@fuse.service: Deactivated successfully.
Jul 08 16:12:42 dom0 systemd[1]: Finished modprobe@fuse.service - Load Kernel Module fuse.
Jul 08 16:12:42 dom0 systemd[1]: modprobe@loop.service: Deactivated successfully.
Jul 08 16:12:42 dom0 systemd-journald[1311]: Journal started
Jul 08 16:12:42 dom0 systemd-journald[1311]: Runtime Journal (/run/log/journal/0c67c932d86e4cf398b860f50e4aef19) is 8.0M, max 77.8M, 69.8M free.
Jul 08 16:12:42 dom0 systemd[1]: Finished modprobe@loop.service - Load Kernel Module loop.
Jul 08 16:12:42 dom0 audit: BPF prog-id=30 op=LOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=30 op=UNLOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=31 op=LOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=31 op=UNLOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=32 op=LOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=32 op=UNLOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=33 op=LOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=33 op=UNLOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=34 op=LOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=34 op=UNLOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=35 op=LOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=36 op=LOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=35 op=UNLOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=36 op=UNLOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=37 op=LOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=37 op=UNLOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=38 op=LOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=38 op=UNLOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=39 op=LOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=39 op=UNLOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=40 op=LOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=40 op=UNLOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=41 op=LOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=42 op=LOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=42 op=UNLOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=43 op=LOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=41 op=UNLOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=43 op=UNLOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=44 op=LOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=24 op=UNLOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=45 op=LOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=46 op=LOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=25 op=UNLOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=26 op=UNLOAD
Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-ask-password-plymouth comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 audit: BPF prog-id=44 op=UNLOAD
Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=plymouth-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 audit: BPF prog-id=47 op=LOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=48 op=LOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=49 op=LOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=45 op=UNLOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=46 op=UNLOAD
Jul 08 16:12:42 dom0 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 res=1
Jul 08 16:12:42 dom0 systemd[1]: Started systemd-journald.service - Journal Service.
Jul 08 16:12:42 dom0 audit[1311]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=4 a1=7ffd68f54d40 a2=4000 a3=7ffd68f54dcc items=0 ppid=1 pid=1311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" key=(null)
Jul 08 16:12:42 dom0 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald"
Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 systemd[1]: Queued start job for default target graphical.target.
Jul 08 16:12:42 dom0 systemd[1]: systemd-journald.service: Deactivated successfully.
Jul 08 16:12:42 dom0 systemd-modules-load[1312]: Module 'msr' is built in
Jul 08 16:12:42 dom0 systemd[1]: Finished systemd-modules-load.service - Load Kernel Modules.
Jul 08 16:12:42 dom0 systemd[1]: Finished systemd-network-generator.service - Generate network units from Kernel command line.
Jul 08 16:12:42 dom0 systemd[1]: Reached target network-pre.target - Preparation for Network.
Jul 08 16:12:42 dom0 systemd[1]: Reached target swap.target - Swaps.
Jul 08 16:12:42 dom0 systemd[1]: Mounting sys-fs-fuse-connections.mount - FUSE Control File System...
Jul 08 16:12:42 dom0 systemd[1]: Mounting tmp.mount - Temporary Directory /tmp...
Jul 08 16:12:42 dom0 systemd[1]: systemd-repart.service - Repartition Root Disk was skipped because all trigger condition checks failed.
Jul 08 16:12:42 dom0 systemd[1]: Starting systemd-sysctl.service - Apply Kernel Variables...
Jul 08 16:12:42 dom0 systemd[1]: Mounted sys-fs-fuse-connections.mount - FUSE Control File System.
Jul 08 16:12:42 dom0 systemd[1]: Mounted tmp.mount - Temporary Directory /tmp.
Jul 08 16:12:42 dom0 systemd[1]: Finished systemd-sysctl.service - Apply Kernel Variables.
Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 kernel: EXT4-fs (dm-4): re-mounted 0ac75727-2814-43da-9fd8-825bf56de02d r/w. Quota mode: none.
Jul 08 16:12:42 dom0 systemd[1]: Finished systemd-remount-fs.service - Remount Root and Kernel File Systems.
Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 systemd[1]: systemd-firstboot.service - First Boot Wizard was skipped because of a failed condition check (ConditionFirstBoot=yes).
Jul 08 16:12:42 dom0 systemd[1]: systemd-hwdb-update.service - Rebuild Hardware Database was skipped because of a failed condition check (ConditionNeedsUpdate=/etc).
Jul 08 16:12:42 dom0 systemd[1]: Starting systemd-journal-flush.service - Flush Journal to Persistent Storage...
Jul 08 16:12:42 dom0 systemd[1]: systemd-pstore.service - Platform Persistent Storage Archival was skipped because of a failed condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore).
Jul 08 16:12:42 dom0 systemd[1]: Starting systemd-random-seed.service - Load/Save Random Seed...
Jul 08 16:12:42 dom0 systemd[1]: systemd-sysusers.service - Create System Users was skipped because of a failed condition check (ConditionNeedsUpdate=/etc).
Jul 08 16:12:42 dom0 systemd[1]: Starting systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev...
Jul 08 16:12:42 dom0 systemd[1]: Finished systemd-udev-trigger.service - Coldplug All udev Devices.
Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 systemd-journald[1311]: Time spent on flushing to /var/log/journal/0c67c932d86e4cf398b860f50e4aef19 is 143.026ms for 1716 entries.
Jul 08 16:12:42 dom0 systemd-journald[1311]: System Journal (/var/log/journal/0c67c932d86e4cf398b860f50e4aef19) is 610.6M, max 4.0G, 3.4G free.
Jul 08 16:12:42 dom0 systemd-journald[1311]: Received client request to flush runtime journal.
Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 audit: BPF prog-id=50 op=LOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=51 op=LOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=22 op=UNLOAD
Jul 08 16:12:42 dom0 audit: BPF prog-id=23 op=UNLOAD
Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 systemd[1]: Finished systemd-random-seed.service - Load/Save Random Seed.
Jul 08 16:12:42 dom0 systemd[1]: first-boot-complete.target - First Boot Complete was skipped because of a failed condition check (ConditionFirstBoot=yes).
Jul 08 16:12:42 dom0 systemd[1]: Finished systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev.
Jul 08 16:12:42 dom0 systemd[1]: Starting systemd-udevd.service - Rule-based Manager for Device Events and Files...
Jul 08 16:12:42 dom0 systemd-udevd[1324]: Using default interface naming scheme 'v251'.
Jul 08 16:12:42 dom0 systemd[1]: Started systemd-udevd.service - Rule-based Manager for Device Events and Files.
Jul 08 16:12:42 dom0 systemd[1]: Starting modprobe@configfs.service - Load Kernel Module configfs...
Jul 08 16:12:42 dom0 systemd[1]: modprobe@configfs.service: Deactivated successfully.
Jul 08 16:12:42 dom0 systemd[1]: Finished modprobe@configfs.service - Load Kernel Module configfs.
Jul 08 16:12:42 dom0 systemd[1]: Condition check resulted in dev-hvc0.device - /dev/hvc0 being skipped.
Jul 08 16:12:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:42 dom0 systemd[1]: Finished systemd-journal-flush.service - Flush Journal to Persistent Storage.
Jul 08 16:12:42 dom0 kernel: amd-tee driver: tee not present
Jul 08 16:12:43 dom0 kernel: piix4_smbus 0000:00:14.0: SMBus Host Controller at 0xb00, revision 0
Jul 08 16:12:43 dom0 kernel: piix4_smbus 0000:00:14.0: Using register 0x02 for SMBus port selection
Jul 08 16:12:43 dom0 kernel: i2c i2c-20: Successfully instantiated SPD at 0x50
Jul 08 16:12:43 dom0 kernel: i2c i2c-20: Successfully instantiated SPD at 0x51
Jul 08 16:12:43 dom0 kernel: piix4_smbus 0000:00:14.0: Auxiliary SMBus Host Controller at 0xb20
Jul 08 16:12:43 dom0 kernel: i2c i2c-22: Successfully instantiated SPD at 0x50
Jul 08 16:12:43 dom0 kernel: cfg80211: Loading compiled-in X.509 certificates for regulatory database
Jul 08 16:12:43 dom0 kernel: Loaded X.509 cert 'sforshee: 00b28ddf47aef9cea7'
Jul 08 16:12:43 dom0 kernel: Loaded X.509 cert 'wens: 61c038651aabdcf94bd0ac7ff06c7248db18c600'
Jul 08 16:12:43 dom0 kernel: platform regulatory.0: Direct firmware load for regulatory.db failed with error -2
Jul 08 16:12:43 dom0 kernel: cfg80211: failed to load regulatory.db
Jul 08 16:12:43 dom0 kernel: i2c i2c-22: Successfully instantiated SPD at 0x51
Jul 08 16:12:43 dom0 systemd[1]: Created slice system-systemd\x2dbacklight.slice - Slice /system/systemd-backlight.
Jul 08 16:12:43 dom0 systemd[1]: Starting systemd-backlight@backlight:amdgpu_bl0.service - Load/Save Screen Backlight Brightness of backlight:amdgpu_bl0...
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-backlight@backlight:amdgpu_bl0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 systemd[1]: Finished systemd-backlight@backlight:amdgpu_bl0.service - Load/Save Screen Backlight Brightness of backlight:amdgpu_bl0.
Jul 08 16:12:43 dom0 systemd[1]: Reached target smartcard.target - Smart Card.
Jul 08 16:12:43 dom0 kernel: ACPI: bus type thunderbolt registered
Jul 08 16:12:43 dom0 kernel: xen: registering gsi 44 triggering 0 polarity 1
Jul 08 16:12:43 dom0 kernel: xen: --> pirq=44 -> irq=44 (gsi=44)
Jul 08 16:12:43 dom0 kernel: amd-pmf AMDI0102:00: Failed to open TEE context
Jul 08 16:12:43 dom0 kernel: amd-pmf AMDI0102:00: registered PMF device successfully
Jul 08 16:12:43 dom0 systemd[1]: Started dm-event.service - Device-mapper event daemon.
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dm-event comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 dmeventd[2209]: dmeventd ready for processing.
Jul 08 16:12:43 dom0 lvm[2209]: Monitoring thin pool qubes_dom0-pool00-tpool.
Jul 08 16:12:43 dom0 lvm[1305]: 5 logical volume(s) in volume group "qubes_dom0" monitored
Jul 08 16:12:43 dom0 kernel: input: PC Speaker as /devices/platform/pcspkr/input/input12
Jul 08 16:12:43 dom0 systemd[1]: Finished lvm2-monitor.service - Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling.
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=lvm2-monitor comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 systemd[1]: Reached target local-fs-pre.target - Preparation for Local File Systems.
Jul 08 16:12:43 dom0 kernel: xen: registering gsi 45 triggering 0 polarity 1
Jul 08 16:12:43 dom0 kernel: xen: --> pirq=45 -> irq=45 (gsi=45)
Jul 08 16:12:43 dom0 systemd[1]: Starting systemd-fsck@dev-disk-by\x2duuid-498e4b33\x2d4544\x2d4195\x2db627\x2dcd3391190a2d.service - File System Check on /dev/disk/by-uuid/498e4b33-4544-4195-b627-cd3391190a2d...
Jul 08 16:12:43 dom0 systemd-fsck[2492]: boot: clean, 44/131072 files, 87247/523520 blocks
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-fsck@dev-disk-by\x2duuid-498e4b33\x2d4544\x2d4195\x2db627\x2dcd3391190a2d comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 systemd[1]: Finished systemd-fsck@dev-disk-by\x2duuid-498e4b33\x2d4544\x2d4195\x2db627\x2dcd3391190a2d.service - File System Check on /dev/disk/by-uuid/498e4b33-4544-4195-b627-cd3391190a2d.
Jul 08 16:12:43 dom0 systemd[1]: Mounting boot.mount - /boot...
Jul 08 16:12:43 dom0 kernel: xen: registering gsi 39 triggering 0 polarity 1
Jul 08 16:12:43 dom0 systemd[1]: Condition check resulted in dev-disk-by\x2duuid-1A18\x2dD569.device - WD_BLACK SN770M 500GB EFI being skipped.
Jul 08 16:12:43 dom0 kernel: EXT4-fs (md126): mounted filesystem 498e4b33-4544-4195-b627-cd3391190a2d r/w with ordered data mode. Quota mode: none.
Jul 08 16:12:43 dom0 kernel: xen: --> pirq=39 -> irq=39 (gsi=39)
Jul 08 16:12:43 dom0 kernel: snd_hda_intel 0000:c2:00.1: Handle vga_switcheroo audio client
Jul 08 16:12:43 dom0 systemd[1]: Mounted boot.mount - /boot.
Jul 08 16:12:43 dom0 kernel: xen: registering gsi 36 triggering 0 polarity 1
Jul 08 16:12:43 dom0 kernel: Already setup the GSI :36
Jul 08 16:12:43 dom0 systemd[1]: Starting systemd-fsck@dev-disk-by\x2duuid-1A18\x2dD569.service - File System Check on /dev/disk/by-uuid/1A18-D569...
Jul 08 16:12:43 dom0 systemd[1]: Condition check resulted in dev-disk-by\x2duuid-1836\x2dE84A.device - WD_BLACK SN770 500GB EFI being skipped.
Jul 08 16:12:43 dom0 kernel: snd_hda_intel 0000:c2:00.1: bound 0000:c2:00.0 (ops amdgpu_dm_audio_component_bind_ops [amdgpu])
Jul 08 16:12:43 dom0 kernel: amd_atl: AMD Address Translation Library initialized
Jul 08 16:12:43 dom0 systemd[1]: Starting systemd-fsck@dev-disk-by\x2duuid-1836\x2dE84A.service - File System Check on /dev/disk/by-uuid/1836-E84A...
Jul 08 16:12:43 dom0 kernel: input: HD-Audio Generic HDMI/DP,pcm=3 as /devices/pci0000:00/0000:00:08.1/0000:c2:00.1/sound/card0/input13
Jul 08 16:12:43 dom0 kernel: input: HD-Audio Generic HDMI/DP,pcm=7 as /devices/pci0000:00/0000:00:08.1/0000:c2:00.1/sound/card0/input14
Jul 08 16:12:43 dom0 kernel: input: HD-Audio Generic HDMI/DP,pcm=8 as /devices/pci0000:00/0000:00:08.1/0000:c2:00.1/sound/card0/input15
Jul 08 16:12:43 dom0 systemd-fsck[2694]: fsck.fat 4.2 (2021-01-31)
Jul 08 16:12:43 dom0 systemd-fsck[2694]: /dev/nvme0n1p1: 13 files, 14899/261628 clusters
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-fsck@dev-disk-by\x2duuid-1A18\x2dD569 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 systemd[1]: Finished systemd-fsck@dev-disk-by\x2duuid-1A18\x2dD569.service - File System Check on /dev/disk/by-uuid/1A18-D569.
Jul 08 16:12:43 dom0 kernel: snd_hda_codec_realtek hdaudioC1D0: autoconfig for ALC295: line_outs=2 (0x17/0x14/0x0/0x0/0x0) type:speaker
Jul 08 16:12:44 dom0 kernel: snd_hda_codec_realtek hdaudioC1D0: speaker_outs=0 (0x0/0x0/0x0/0x0/0x0)
Jul 08 16:12:44 dom0 kernel: snd_hda_codec_realtek hdaudioC1D0: hp_outs=0 (0x0/0x0/0x0/0x0/0x0)
Jul 08 16:12:44 dom0 kernel: snd_hda_codec_realtek hdaudioC1D0: mono: mono_out=0x0
Jul 08 16:12:44 dom0 kernel: snd_hda_codec_realtek hdaudioC1D0: inputs:
Jul 08 16:12:44 dom0 kernel: snd_hda_codec_realtek hdaudioC1D0: Mic=0x12
Jul 08 16:12:44 dom0 kernel: cros_ec_lpcs cros_ec_lpcs.0: loaded with quirks 00000001
Jul 08 16:12:44 dom0 kernel: xen: registering gsi 39 triggering 0 polarity 1
Jul 08 16:12:44 dom0 kernel: Already setup the GSI :39
Jul 08 16:12:44 dom0 kernel: cros_ec_lpcs cros_ec_lpcs.0: Chrome EC device registered
Jul 08 16:12:44 dom0 kernel: spd5118 20-0050: DDR5 temperature sensor: vendor 0x06:0x32 revision 1.6
Jul 08 16:12:44 dom0 kernel: spd5118 20-0051: DDR5 temperature sensor: vendor 0x06:0x32 revision 1.6
Jul 08 16:12:44 dom0 kernel: cros-usbpd-charger cros-usbpd-charger.5.auto: No USB PD charging ports found
Jul 08 16:12:44 dom0 kernel: cros-charge-control cros-charge-control.4.auto: Framework charge control detected, preventing load
Jul 08 16:12:44 dom0 kernel: cros-usbpd-charger cros-usbpd-charger.5.auto: Unexpected number of charge port count
Jul 08 16:12:44 dom0 kernel: cros-usbpd-charger cros-usbpd-charger.5.auto: Failing probe (err:0xffffffb9)
Jul 08 16:12:44 dom0 kernel: cros-usbpd-charger cros-usbpd-charger.5.auto: probe with driver cros-usbpd-charger failed with error -71
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-fsck@dev-disk-by\x2duuid-1836\x2dE84A comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=plymouth-read-write comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit: BPF prog-id=52 op=LOAD
Jul 08 16:12:43 dom0 audit: BPF prog-id=53 op=LOAD
Jul 08 16:12:43 dom0 audit: BPF prog-id=54 op=LOAD
Jul 08 16:12:43 dom0 audit: BPF prog-id=28 op=UNLOAD
Jul 08 16:12:43 dom0 audit: BPF prog-id=29 op=UNLOAD
Jul 08 16:12:43 dom0 audit[3133]: SYSTEM_BOOT pid=3133 uid=0 auid=4294967295 ses=4294967295 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=usbguard comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1" device_rule=616C6C6F7720696420316436623A30303032206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362312220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1" target="allow" device_rule=616C6C6F7720696420316436623A30303032206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362312220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb2" device_rule=616C6C6F7720696420316436623A30303033206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362322220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb2" target="allow" device_rule=616C6C6F7720696420316436623A30303033206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362322220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.4/usb3" device_rule=616C6C6F7720696420316436623A30303032206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362332220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.4/usb3" target="allow" device_rule=616C6C6F7720696420316436623A30303032206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362332220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.4/usb4" device_rule=616C6C6F7720696420316436623A30303033206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362342220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.4/usb4" target="allow" device_rule=616C6C6F7720696420316436623A30303033206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362342220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:08.3/0000:c4:00.3/usb5" device_rule=616C6C6F7720696420316436623A30303032206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362352220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.3/0000:c4:00.3/usb5" target="allow" device_rule=616C6C6F7720696420316436623A30303032206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362352220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:08.3/0000:c4:00.3/usb6" device_rule=616C6C6F7720696420316436623A30303033206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362362220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.3/0000:c4:00.3/usb6" target="allow" device_rule=616C6C6F7720696420316436623A30303033206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362362220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:08.3/0000:c4:00.4/usb7" device_rule=616C6C6F7720696420316436623A30303032206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362372220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.3/0000:c4:00.4/usb7" target="allow" device_rule=616C6C6F7720696420316436623A30303032206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362372220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit: BPF prog-id=55 op=LOAD
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:08.3/0000:c4:00.4/usb8" device_rule=616C6C6F7720696420316436623A30303033206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362382220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.3/0000:c4:00.4/usb8" target="allow" device_rule=616C6C6F7720696420316436623A30303033206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362382220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-2" device_rule=616C6C6F7720696420303565333A30363130206E616D652022555342322E312048756222207669612D706F72742022312D322220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-2" target="allow" device_rule=616C6C6F7720696420303565333A30363130206E616D652022555342322E312048756222207669612D706F72742022312D322220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-3" device_rule=616C6C6F7720696420303565333A30363130206E616D652022555342322E302048756222207669612D706F72742022312D332220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-3" target="allow" device_rule=616C6C6F7720696420303565333A30363130206E616D652022555342322E302048756222207669612D706F72742022312D332220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-4" device_rule=616C6C6F7720696420303565333A30363130206E616D652022555342322E302048756222207669612D706F72742022312D342220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-4" target="allow" device_rule=616C6C6F7720696420303565333A30363130206E616D652022555342322E302048756222207669612D706F72742022312D342220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-5" device_rule=626C6F636B20696420306538643A65363136206E616D652022576972656C6573735F44657669636522207669612D706F72742022312D352220776974682D696E74657266616365207B2065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A3031207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-5" target="block" device_rule=626C6F636B20696420306538643A65363136206E616D652022576972656C6573735F44657669636522207669612D706F72742022312D352220776974682D696E74657266616365207B2065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A3031207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb2/2-2" device_rule=616C6C6F7720696420303565333A30363235206E616D652022555342332E322048756222207669612D706F72742022322D322220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb2/2-2" target="allow" device_rule=616C6C6F7720696420303565333A30363235206E616D652022555342332E322048756222207669612D706F72742022322D322220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.4/usb3/3-1" device_rule=626C6F636B20696420306264613A35363334206E616D6520224C6170746F702043616D65726122207669612D706F72742022332D312220776974682D696E74657266616365207B2030653A30313A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A3030207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.4/usb3/3-1" target="block" device_rule=626C6F636B20696420306264613A35363334206E616D6520224C6170746F702043616D65726122207669612D706F72742022332D312220776974682D696E74657266616365207B2030653A30313A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A3030207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-2/1-2.3" device_rule=626C6F636B20696420313035303A30343034206E616D652022597562696B65792034204343494422207669612D706F72742022312D322E332220776974682D696E746572666163652030623A30303A303020776974682D636F6E6E6563742D747970652022756E6B6E6F776E22 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-2/1-2.3" target="block" device_rule=626C6F636B20696420313035303A30343034206E616D652022597562696B65792034204343494422207669612D706F72742022312D322E332220776974682D696E746572666163652030623A30303A303020776974682D636F6E6E6563742D747970652022756E6B6E6F776E22 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-4/1-4.1" device_rule=626C6F636B20696420323763363A36303963206E616D652022476F6F64697820555342322E30204D49534322207669612D706F72742022312D342E312220776974682D696E746572666163652066663A30303A303020776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-4/1-4.1" target="block" device_rule=626C6F636B20696420323763363A36303963206E616D652022476F6F64697820555342322E30204D49534322207669612D706F72742022312D342E312220776974682D696E746572666163652066663A30303A303020776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-4/1-4.3" device_rule=616C6C6F7720696420333261633A30303132206E616D6520224C6170746F70203136204B6579626F617264204D6F64756C65202D20414E534922207669612D706F72742022312D342E332220776974682D696E74657266616365207B2030333A30313A30312030333A30303A30302030333A30303A30302030333A30303A3030207D20776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-4/1-4.3" target="allow" device_rule=616C6C6F7720696420333261633A30303132206E616D6520224C6170746F70203136204B6579626F617264204D6F64756C65202D20414E534922207669612D706F72742022312D342E332220776974682D696E74657266616365207B2030333A30313A30312030333A30303A30302030333A30303A30302030333A30303A3030207D20776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb2/2-2/2-2.2" device_rule=626C6F636B20696420306264613A38313536206E616D6520225553422031302F3130302F31472F322E3547204C414E22207669612D706F72742022322D322E322220776974682D696E74657266616365207B2066663A66663A30302030323A30643A30302030613A30303A30312030613A30303A30312030323A30363A30302030613A30303A30302030613A30303A3030207D20776974682D636F6E6E6563742D747970652022756E6B6E6F776E22 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb2/2-2/2-2.2" target="block" device_rule=626C6F636B20696420306264613A38313536206E616D6520225553422031302F3130302F31472F322E3547204C414E22207669612D706F72742022322D322E322220776974682D696E74657266616365207B2066663A66663A30302030323A30643A30302030613A30303A30312030613A30303A30312030323A30363A30302030613A30303A30302030613A30303A3030207D20776974682D636F6E6E6563742D747970652022756E6B6E6F776E22 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit: BPF prog-id=56 op=LOAD
Jul 08 16:12:43 dom0 audit: BPF prog-id=57 op=LOAD
Jul 08 16:12:43 dom0 audit: BPF prog-id=58 op=LOAD
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dbus-broker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=alsa-state comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event5 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event6 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event7 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event8 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event9 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit: BPF prog-id=59 op=LOAD
Jul 08 16:12:43 dom0 audit: BPF prog-id=60 op=LOAD
Jul 08 16:12:43 dom0 audit: BPF prog-id=61 op=LOAD
Jul 08 16:12:43 dom0 audit: BPF prog-id=62 op=LOAD
Jul 08 16:12:43 dom0 audit: BPF prog-id=63 op=LOAD
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-db-dom0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dracut-shutdown comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=mdmonitor comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event5 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event6 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event7 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event8 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event9 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=xenstored comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-logind comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=xenconsoled comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=xen-init-dom0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=libvirtd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=upower comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=polkit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=iio-sensor-proxy comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:44 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=udisks2 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:44 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-qmemman comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:43 dom0 systemd[1]: Finished systemd-fsck@dev-disk-by\x2duuid-1836\x2dE84A.service - File System Check on /dev/disk/by-uuid/1836-E84A.
Jul 08 16:12:44 dom0 systemd-fsck[2713]: fsck.fat 4.2 (2021-01-31)
Jul 08 16:12:44 dom0 systemd-fsck[2713]: /dev/nvme1n1p1: 1 files, 1/261628 clusters
Jul 08 16:12:43 dom0 alsactl[3258]: alsactl 1.2.9 daemon started
Jul 08 16:12:43 dom0 systemd[1]: Created slice system-qubes\x2dinput\x2dsender\x2dkeyboard.slice - Slice /system/qubes-input-sender-keyboard.
Jul 08 16:12:43 dom0 xenstored[3342]: Checking store ...
Jul 08 16:12:43 dom0 systemd[1]: systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch was skipped because of a failed condition check (ConditionPathExists=!/run/plymouth/pid).
Jul 08 16:12:43 dom0 xenstored[3342]: Checking store complete.
Jul 08 16:12:43 dom0 systemd[1]: Listening on systemd-rfkill.socket - Load/Save RF Kill Switch Status /dev/rfkill Watch.
Jul 08 16:12:44 dom0 lvm[2832]: pvscan[2832] PV /dev/mapper/luks-c4157ae0-c1c9-4d2e-8ee9-9aecc2d9966d online, VG qubes_dom0 is complete.
Jul 08 16:12:44 dom0 lvm[2832]: pvscan[2832] VG qubes_dom0 run autoactivation.
Jul 08 16:12:43 dom0 polkitd[3327]: Started polkitd version 121
Jul 08 16:12:43 dom0 systemd[1]: dev-hugepages.mount - Huge Pages File System was skipped because of a failed condition check (ConditionPathExists=/sys/kernel/mm/hugepages).
Jul 08 16:12:43 dom0 polkitd[3327]: Loading rules from directory /etc/polkit-1/rules.d
Jul 08 16:12:43 dom0 systemd[1]: Starting modprobe@dm_mod.service - Load Kernel Module dm_mod...
Jul 08 16:12:43 dom0 polkitd[3327]: Loading rules from directory /usr/share/polkit-1/rules.d
Jul 08 16:12:43 dom0 systemd[1]: Starting modprobe@loop.service - Load Kernel Module loop...
Jul 08 16:12:43 dom0 polkitd[3327]: Finished loading, compiling and executing 9 rules
Jul 08 16:12:43 dom0 systemd[1]: systemd-firstboot.service - First Boot Wizard was skipped because of a failed condition check (ConditionFirstBoot=yes).
Jul 08 16:12:43 dom0 polkitd[3327]: Acquired the name org.freedesktop.PolicyKit1 on the system bus
Jul 08 16:12:43 dom0 systemd[1]: first-boot-complete.target - First Boot Complete was skipped because of a failed condition check (ConditionFirstBoot=yes).
Jul 08 16:12:43 dom0 systemd[1]: systemd-hwdb-update.service - Rebuild Hardware Database was skipped because of a failed condition check (ConditionNeedsUpdate=/etc).
Jul 08 16:12:43 dom0 systemd[1]: systemd-pstore.service - Platform Persistent Storage Archival was skipped because of a failed condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore).
Jul 08 16:12:43 dom0 systemd[1]: systemd-sysusers.service - Create System Users was skipped because of a failed condition check (ConditionNeedsUpdate=/etc).
Jul 08 16:12:43 dom0 systemd[1]: modprobe@dm_mod.service: Deactivated successfully.
Jul 08 16:12:43 dom0 systemd[1]: Finished modprobe@dm_mod.service - Load Kernel Module dm_mod.
Jul 08 16:12:44 dom0 usbguard-daemon[3143]: [1752009163.750] (W) PERMISSIONS CHECK ON POLICY FILE ARE TURNED OFF!
Jul 08 16:12:43 dom0 systemd[1]: modprobe@loop.service: Deactivated successfully.
Jul 08 16:12:44 dom0 dbus-broker-launch[3185]: Looking up NSS user entry for 'geoclue'...
Jul 08 16:12:44 dom0 dbus-broker-launch[3185]: NSS returned no entry for 'geoclue'
Jul 08 16:12:44 dom0 dbus-broker-launch[3185]: Invalid user-name in /etc/dbus-1/system.d/net.hadess.SensorProxy.conf +14: user="geoclue"
Jul 08 16:12:43 dom0 systemd[1]: Finished modprobe@loop.service - Load Kernel Module loop.
Jul 08 16:12:43 dom0 systemd[1]: Condition check resulted in dev-block-253:0.device - /dev/block/253:0 being skipped.
Jul 08 16:12:43 dom0 systemd[1]: Created slice system-lvm2\x2dpvscan.slice - Slice /system/lvm2-pvscan.
Jul 08 16:12:43 dom0 systemd[1]: systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch was skipped because of a failed condition check (ConditionPathExists=!/run/plymouth/pid).
Jul 08 16:12:43 dom0 systemd[1]: dev-hugepages.mount - Huge Pages File System was skipped because of a failed condition check (ConditionPathExists=/sys/kernel/mm/hugepages).
Jul 08 16:12:43 dom0 systemd[1]: Starting lvm2-pvscan@253:0.service - LVM event activation on device 253:0...
Jul 08 16:12:43 dom0 systemd[1]: Starting modprobe@dm_mod.service - Load Kernel Module dm_mod...
Jul 08 16:12:44 dom0 qubes-input-sender[3274]: Device /dev/input/event5 is already in dom0
Jul 08 16:12:43 dom0 systemd[1]: Starting modprobe@loop.service - Load Kernel Module loop...
Jul 08 16:12:44 dom0 qubes-input-sender[3278]: Device /dev/input/event6 is already in dom0
Jul 08 16:12:43 dom0 systemd[1]: systemd-firstboot.service - First Boot Wizard was skipped because of a failed condition check (ConditionFirstBoot=yes).
Jul 08 16:12:44 dom0 qubes-input-sender[3280]: Device /dev/input/event7 is already in dom0
Jul 08 16:12:43 dom0 systemd[1]: first-boot-complete.target - First Boot Complete was skipped because of a failed condition check (ConditionFirstBoot=yes).
Jul 08 16:12:44 dom0 qubes-input-sender[3286]: Device /dev/input/event8 is already in dom0
Jul 08 16:12:43 dom0 systemd[1]: systemd-hwdb-update.service - Rebuild Hardware Database was skipped because of a failed condition check (ConditionNeedsUpdate=/etc).
Jul 08 16:12:44 dom0 qubes-input-sender[3288]: Device /dev/input/event9 is already in dom0
Jul 08 16:12:43 dom0 systemd[1]: systemd-pstore.service - Platform Persistent Storage Archival was skipped because of a failed condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore).
Jul 08 16:12:43 dom0 systemd[1]: systemd-sysusers.service - Create System Users was skipped because of a failed condition check (ConditionNeedsUpdate=/etc).
Jul 08 16:12:43 dom0 systemd[1]: modprobe@dm_mod.service: Deactivated successfully.
Jul 08 16:12:43 dom0 systemd[1]: Finished modprobe@dm_mod.service - Load Kernel Module dm_mod.
Jul 08 16:12:43 dom0 systemd[1]: modprobe@loop.service: Deactivated successfully.
Jul 08 16:12:43 dom0 systemd[1]: Finished modprobe@loop.service - Load Kernel Module loop.
Jul 08 16:12:43 dom0 systemd[1]: systemd-repart.service - Repartition Root Disk was skipped because all trigger condition checks failed.
Jul 08 16:12:44 dom0 launch-xenstore[3311]: Starting /usr/sbin/xenstored...
Jul 08 16:12:43 dom0 systemd[1]: systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch was skipped because of a failed condition check (ConditionPathExists=!/run/plymouth/pid).
Jul 08 16:12:43 dom0 systemd[1]: dev-hugepages.mount - Huge Pages File System was skipped because of a failed condition check (ConditionPathExists=/sys/kernel/mm/hugepages).
Jul 08 16:12:43 dom0 systemd[1]: Starting modprobe@dm_mod.service - Load Kernel Module dm_mod...
Jul 08 16:12:43 dom0 systemd[1]: Starting modprobe@loop.service - Load Kernel Module loop...
Jul 08 16:12:44 dom0 xen-init-dom0[3356]: Done setting up Dom0
Jul 08 16:12:43 dom0 systemd[1]: systemd-firstboot.service - First Boot Wizard was skipped because of a failed condition check (ConditionFirstBoot=yes).
Jul 08 16:12:43 dom0 systemd[1]: first-boot-complete.target - First Boot Complete was skipped because of a failed condition check (ConditionFirstBoot=yes).
Jul 08 16:12:43 dom0 systemd[1]: systemd-hwdb-update.service - Rebuild Hardware Database was skipped because of a failed condition check (ConditionNeedsUpdate=/etc).
Jul 08 16:12:43 dom0 systemd[1]: systemd-pstore.service - Platform Persistent Storage Archival was skipped because of a failed condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore).
Jul 08 16:12:43 dom0 systemd[1]: systemd-sysusers.service - Create System Users was skipped because of a failed condition check (ConditionNeedsUpdate=/etc).
Jul 08 16:12:43 dom0 systemd[1]: modprobe@dm_mod.service: Deactivated successfully.
Jul 08 16:12:43 dom0 systemd[1]: Finished modprobe@dm_mod.service - Load Kernel Module dm_mod.
Jul 08 16:12:43 dom0 systemd[1]: modprobe@loop.service: Deactivated successfully.
Jul 08 16:12:43 dom0 systemd[1]: Finished modprobe@loop.service - Load Kernel Module loop.
Jul 08 16:12:43 dom0 systemd[1]: systemd-repart.service - Repartition Root Disk was skipped because all trigger condition checks failed.
Jul 08 16:12:43 dom0 systemd[1]: Mounting boot-efi.mount - /boot/efi...
Jul 08 16:12:43 dom0 systemd[1]: Mounting boot-efi2.mount - /boot/efi2...
Jul 08 16:12:43 dom0 systemd[1]: Mounted boot-efi.mount - /boot/efi.
Jul 08 16:12:43 dom0 systemd[1]: Mounted boot-efi2.mount - /boot/efi2.
Jul 08 16:12:43 dom0 systemd[1]: Reached target local-fs.target - Local File Systems.
Jul 08 16:12:43 dom0 systemd[1]: ldconfig.service - Rebuild Dynamic Linker Cache was skipped because all trigger condition checks failed.
Jul 08 16:12:43 dom0 systemd[1]: Starting plymouth-read-write.service - Tell Plymouth To Write Out Runtime Data...
Jul 08 16:12:43 dom0 systemd[1]: systemd-binfmt.service - Set Up Additional Binary Formats was skipped because all trigger condition checks failed.
Jul 08 16:12:43 dom0 systemd[1]: systemd-boot-system-token.service - Store a System Token in an EFI Variable was skipped because of a failed condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f).
Jul 08 16:12:43 dom0 systemd[1]: systemd-machine-id-commit.service - Commit a transient machine-id on disk was skipped because of a failed condition check (ConditionPathIsMountPoint=/etc/machine-id).
Jul 08 16:12:43 dom0 systemd[1]: Starting systemd-tmpfiles-setup.service - Create Volatile Files and Directories...
Jul 08 16:12:43 dom0 systemd[1]: Received SIGRTMIN+20 from PID 670 (plymouthd).
Jul 08 16:12:43 dom0 systemd[1]: Finished plymouth-read-write.service - Tell Plymouth To Write Out Runtime Data.
Jul 08 16:12:43 dom0 systemd[1]: Finished systemd-tmpfiles-setup.service - Create Volatile Files and Directories.
Jul 08 16:12:43 dom0 systemd[1]: systemd-journal-catalog-update.service - Rebuild Journal Catalog was skipped because of a failed condition check (ConditionNeedsUpdate=/var).
Jul 08 16:12:43 dom0 systemd[1]: systemd-update-done.service - Update is Completed was skipped because all trigger condition checks failed.
Jul 08 16:12:43 dom0 systemd[1]: Starting systemd-update-utmp.service - Record System Boot/Shutdown in UTMP...
Jul 08 16:12:43 dom0 systemd[1]: Starting usbguard.service - USBGuard daemon...
Jul 08 16:12:43 dom0 systemd[1]: Finished systemd-update-utmp.service - Record System Boot/Shutdown in UTMP.
Jul 08 16:12:43 dom0 systemd[1]: Started usbguard.service - USBGuard daemon.
Jul 08 16:12:43 dom0 systemd[1]: Started systemd-ask-password-wall.path - Forward Password Requests to Wall Directory Watch.
Jul 08 16:12:43 dom0 systemd[1]: Reached target cryptsetup.target - Local Encrypted Volumes.
Jul 08 16:12:43 dom0 systemd[1]: Reached target paths.target - Path Units.
Jul 08 16:12:43 dom0 systemd[1]: Reached target sysinit.target - System Initialization.
Jul 08 16:12:43 dom0 systemd[1]: Started fstrim.timer - Discard unused blocks once a week.
Jul 08 16:12:43 dom0 systemd[1]: Started logrotate.timer - Daily rotation of log files.
Jul 08 16:12:43 dom0 systemd[1]: Started systemd-tmpfiles-clean.timer - Daily Cleanup of Temporary Directories.
Jul 08 16:12:43 dom0 systemd[1]: Reached target timers.target - Timer Units.
Jul 08 16:12:43 dom0 systemd[1]: Listening on dbus.socket - D-Bus System Message Bus Socket.
Jul 08 16:12:43 dom0 systemd[1]: Listening on libvirtd.socket - Libvirt local socket.
Jul 08 16:12:43 dom0 systemd[1]: Listening on libvirtd-admin.socket - Libvirt admin socket.
Jul 08 16:12:43 dom0 systemd[1]: Listening on libvirtd-ro.socket - Libvirt local read-only socket.
Jul 08 16:12:43 dom0 systemd[1]: Listening on virtlockd.socket - Virtual machine lock manager socket.
Jul 08 16:12:43 dom0 systemd[1]: Listening on virtlogd.socket - Virtual machine log manager socket.
Jul 08 16:12:43 dom0 systemd[1]: Reached target sockets.target - Socket Units.
Jul 08 16:12:43 dom0 systemd[1]: Starting dbus-broker.service - D-Bus System Message Bus...
Jul 08 16:12:43 dom0 systemd[1]: rpmdb-migrate.service - RPM database migration to /usr was skipped because of a failed condition check (ConditionPathExists=/var/lib/rpm/.migratedb).
Jul 08 16:12:43 dom0 systemd[1]: rpmdb-rebuild.service - RPM database rebuild was skipped because of a failed condition check (ConditionPathExists=/usr/lib/sysimage/rpm/.rebuilddb).
Jul 08 16:12:43 dom0 systemd[1]: Starting systemd-userdbd.service - User Database Manager...
Jul 08 16:12:43 dom0 systemd[1]: Started systemd-userdbd.service - User Database Manager.
Jul 08 16:12:43 dom0 systemd[1]: Started dbus-broker.service - D-Bus System Message Bus.
Jul 08 16:12:43 dom0 systemd[1]: Reached target basic.target - Basic System.
Jul 08 16:12:43 dom0 systemd[1]: alsa-restore.service - Save/Restore Sound Card State was skipped because of a failed condition check (ConditionPathExists=!/etc/alsa/state-daemon.conf).
Jul 08 16:12:43 dom0 systemd[1]: Started alsa-state.service - Manage Sound Card State (restore and store).
Jul 08 16:12:43 dom0 systemd[1]: Reached target sound.target - Sound Card.
Jul 08 16:12:43 dom0 dbus-broker-launch[3185]: Ready
Jul 08 16:12:43 dom0 systemd[1]: Starting dracut-shutdown.service - Restore /run/initramfs on shutdown...
Jul 08 16:12:43 dom0 systemd[1]: Starting iio-sensor-proxy.service - IIO Sensor Proxy service...
Jul 08 16:12:43 dom0 systemd[1]: Starting mdmonitor.service - Software RAID monitoring and management...
Jul 08 16:12:43 dom0 systemd[1]: Starting qubes-db-dom0.service - Qubes DB agent...
Jul 08 16:12:43 dom0 systemd[1]: Started qubes-input-sender-keyboard@event5.service - Qubes input proxy sender (keyboard).
Jul 08 16:12:43 dom0 systemd[1]: Started qubes-input-sender-keyboard@event6.service - Qubes input proxy sender (keyboard).
Jul 08 16:12:43 dom0 systemd[1]: Started qubes-input-sender-keyboard@event7.service - Qubes input proxy sender (keyboard).
Jul 08 16:12:43 dom0 systemd[1]: Started qubes-input-sender-keyboard@event8.service - Qubes input proxy sender (keyboard).
Jul 08 16:12:43 dom0 systemd[1]: Started qubes-input-sender-keyboard@event9.service - Qubes input proxy sender (keyboard).
Jul 08 16:12:43 dom0 systemd[1]: Starting qubes-qmemman.service - Qubes memory management daemon...
Jul 08 16:12:43 dom0 systemd[1]: Starting systemd-logind.service - User Login Management...
Jul 08 16:12:43 dom0 systemd[1]: Starting udisks2.service - Disk Manager...
Jul 08 16:12:43 dom0 systemd[1]: Starting upower.service - Daemon for power management...
Jul 08 16:12:43 dom0 systemd[1]: Starting xenstored.service - The Xen xenstore...
Jul 08 16:12:43 dom0 systemd[1]: Started qubes-db-dom0.service - Qubes DB agent.
Jul 08 16:12:43 dom0 systemd[1]: Finished dracut-shutdown.service - Restore /run/initramfs on shutdown.
Jul 08 16:12:43 dom0 systemd[1]: Started mdmonitor.service - Software RAID monitoring and management.
Jul 08 16:12:43 dom0 systemd[1]: qubes-input-sender-keyboard@event5.service: Deactivated successfully.
Jul 08 16:12:43 dom0 systemd[1]: qubes-input-sender-keyboard@event6.service: Deactivated successfully.
Jul 08 16:12:43 dom0 systemd[1]: qubes-input-sender-keyboard@event7.service: Deactivated successfully.
Jul 08 16:12:43 dom0 systemd[1]: qubes-input-sender-keyboard@event8.service: Deactivated successfully.
Jul 08 16:12:43 dom0 systemd[1]: qubes-input-sender-keyboard@event9.service: Deactivated successfully.
Jul 08 16:12:43 dom0 udisksd[3300]: udisks daemon version 2.9.4 starting
Jul 08 16:12:43 dom0 systemd[1]: Starting polkit.service - Authorization Manager...
Jul 08 16:12:43 dom0 systemd-logind[3298]: New seat seat0.
Jul 08 16:12:43 dom0 systemd[1]: Starting modprobe@drm.service - Load Kernel Module drm...
Jul 08 16:12:43 dom0 systemd[1]: Started xenstored.service - The Xen xenstore.
Jul 08 16:12:43 dom0 systemd[1]: modprobe@drm.service: Deactivated successfully.
Jul 08 16:12:43 dom0 systemd[1]: Finished modprobe@drm.service - Load Kernel Module drm.
Jul 08 16:12:43 dom0 systemd-logind[3298]: Watching system buttons on /dev/input/event0 (Lid Switch)
Jul 08 16:12:43 dom0 systemd-logind[3298]: Watching system buttons on /dev/input/event1 (Power Button)
Jul 08 16:12:43 dom0 systemd-logind[3298]: Watching system buttons on /dev/input/event5 (Framework Laptop 16 Keyboard Module - ANSI)
Jul 08 16:12:43 dom0 systemd[1]: Starting xen-init-dom0.service - xen-init-dom0, initialise Dom0 configuration (xenstore nodes, JSON configuration stub)...
Jul 08 16:12:43 dom0 systemd-logind[3298]: Watching system buttons on /dev/input/event9 (Framework Laptop 16 Keyboard Module - ANSI Keyboard)
Jul 08 16:12:43 dom0 systemd-logind[3298]: Watching system buttons on /dev/input/event6 (Framework Laptop 16 Keyboard Module - ANSI System Control)
Jul 08 16:12:43 dom0 systemd-logind[3298]: Watching system buttons on /dev/input/event7 (Framework Laptop 16 Keyboard Module - ANSI Consumer Control)
Jul 08 16:12:43 dom0 systemd[1]: Starting xenconsoled.service - Xenconsoled - handles logging from guest consoles and hypervisor...
Jul 08 16:12:43 dom0 systemd[1]: Started systemd-logind.service - User Login Management.
Jul 08 16:12:43 dom0 systemd[1]: Starting libvirtd.service - Virtualization daemon...
Jul 08 16:12:43 dom0 systemd[1]: Started xenconsoled.service - Xenconsoled - handles logging from guest consoles and hypervisor.
Jul 08 16:12:43 dom0 systemd[1]: Finished xen-init-dom0.service - xen-init-dom0, initialise Dom0 configuration (xenstore nodes, JSON configuration stub).
Jul 08 16:12:43 dom0 systemd-logind[3298]: Failed to probe partition scheme of "/dev/block/9:126": Input/output error
Jul 08 16:12:43 dom0 systemd[1]: Started libvirtd.service - Virtualization daemon.
Jul 08 16:12:43 dom0 systemd[1]: Started upower.service - Daemon for power management.
Jul 08 16:12:43 dom0 systemd[1]: Started polkit.service - Authorization Manager.
Jul 08 16:12:43 dom0 systemd[1]: Started iio-sensor-proxy.service - IIO Sensor Proxy service.
Jul 08 16:12:44 dom0 systemd[1]: Started udisks2.service - Disk Manager.
Jul 08 16:12:44 dom0 udisksd[3300]: Acquired the name org.freedesktop.UDisks2 on the system message bus
Jul 08 16:12:44 dom0 systemd[1]: Started qubes-qmemman.service - Qubes memory management daemon.
Jul 08 16:12:46 dom0 lvm[2832]: 258 logical volume(s) in volume group "qubes_dom0" now active
Jul 08 16:12:46 dom0 systemd[1]: Finished lvm2-pvscan@253:0.service - LVM event activation on device 253:0.
Jul 08 16:12:46 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=lvm2-pvscan@253:0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:46 dom0 kernel: kauditd_printk_skb: 223 callbacks suppressed
Jul 08 16:12:46 dom0 kernel: audit: type=1130 audit(1752009166.978:301): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=lvm2-pvscan@253:0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:46 dom0 systemd[1]: Starting qubesd.service - Qubes OS daemon...
Jul 08 16:12:47 dom0 systemd[1]: Started qubesd.service - Qubes OS daemon.
Jul 08 16:12:47 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubesd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:47 dom0 kernel: audit: type=1130 audit(1752009167.879:302): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubesd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:47 dom0 systemd[1]: Starting qubes-core.service - Qubes Dom0 startup setup...
Jul 08 16:12:47 dom0 systemd[1]: Started qubes-qrexec-policy-daemon.service - Qubes remote exec policy daemon.
Jul 08 16:12:47 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-qrexec-policy-daemon comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:47 dom0 kernel: audit: type=1130 audit(1752009167.892:303): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-qrexec-policy-daemon comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:47 dom0 startup-misc.sh[4358]: libxl: error: libxl_sched.c:232:sched_credit_domain_set: Getting domain sched credit: Invalid argument
Jul 08 16:12:47 dom0 startup-misc.sh[4358]: libxl_domain_sched_params_set failed.
Jul 08 16:12:47 dom0 qrexec-policy-daemon[4334]: warning: !compat-4.0 directive in file /etc/qubes/policy.d/35-compat.policy line 16 is transitional and will be deprecated
Jul 08 16:12:48 dom0 systemd[1]: Finished qubes-core.service - Qubes Dom0 startup setup.
Jul 08 16:12:48 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-core comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:48 dom0 kernel: audit: type=1130 audit(1752009168.139:304): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-core comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:48 dom0 systemd[1]: Started qubes-meminfo-writer-dom0.service - Qubes memory information reporter.
Jul 08 16:12:48 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-meminfo-writer-dom0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:48 dom0 kernel: audit: type=1130 audit(1752009168.149:305): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-meminfo-writer-dom0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:48 dom0 systemd[1]: Starting qubes-vm@sys-firewall-chocolatey.service - Start Qubes VM sys-firewall-chocolatey...
Jul 08 16:12:48 dom0 systemd[1]: Starting qubes-vm@sys-firewall-full-internet.service - Start Qubes VM sys-firewall-full-internet...
Jul 08 16:12:48 dom0 systemd[1]: Starting qubes-vm@sys-firewall-localnet.service - Start Qubes VM sys-firewall-localnet...
Jul 08 16:12:48 dom0 systemd[1]: Starting qubes-vm@sys-firewall.service - Start Qubes VM sys-firewall...
Jul 08 16:12:48 dom0 systemd[1]: Starting qubes-vm@sys-gui.service - Start Qubes VM sys-gui...
Jul 08 16:12:48 dom0 systemd[1]: Starting qubes-vm@sys-net.service - Start Qubes VM sys-net...
Jul 08 16:12:48 dom0 systemd[1]: Starting qubes-vm@sys-usb.service - Start Qubes VM sys-usb...
Jul 08 16:12:48 dom0 qubesd[4330]: vm.sys-firewall-full-internet: Starting sys-firewall-full-internet
Jul 08 16:12:48 dom0 qubesd[4330]: vm.sys-firewall-localnet: Starting sys-firewall-localnet
Jul 08 16:12:48 dom0 qubesd[4330]: vm.sys-net: Starting sys-net
Jul 08 16:12:48 dom0 qubesd[4330]: vm.sys-firewall-chocolatey: Starting sys-firewall-chocolatey
Jul 08 16:12:48 dom0 qubesd[4330]: vm.sys-usb: Starting sys-usb
Jul 08 16:12:48 dom0 kernel: xhci_hcd 0000:c2:00.3: remove, state 1
Jul 08 16:12:48 dom0 kernel: usb usb2: USB disconnect, device number 1
Jul 08 16:12:48 dom0 kernel: usb 2-2: USB disconnect, device number 2
Jul 08 16:12:48 dom0 kernel: usb 2-2.2: USB disconnect, device number 3
Jul 08 16:12:48 dom0 kernel: audit: type=1137 audit(1752009168.386:306): pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb2/2-2/2-2.2" device_rule=626C6F636B20696420306264613A38313536206E616D6520225553422031302F3130302F31472F322E3547204C414E22207669612D706F72742022322D322E322220776974682D696E74657266616365207B2066663A66663A30302030323A30643A30302030613A30303A30312030613A30303A30312030323A30363A30302030613A30303A30302030613A30303A3030207D20776974682D636F6E6E6563742D747970652022756E6B6E6F776E22 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:48 dom0 kernel: audit: type=1137 audit(1752009168.387:307): pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb2/2-2" device_rule=616C6C6F7720696420303565333A30363235206E616D652022555342332E322048756222207669612D706F72742022322D322220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:48 dom0 kernel: xhci_hcd 0000:c2:00.3: USB bus 2 deregistered
Jul 08 16:12:48 dom0 kernel: audit: type=1137 audit(1752009168.402:308): pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb2" device_rule=616C6C6F7720696420316436623A30303033206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362322220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:48 dom0 kernel: xhci_hcd 0000:c2:00.3: remove, state 1
Jul 08 16:12:48 dom0 kernel: usb usb1: USB disconnect, device number 1
Jul 08 16:12:48 dom0 kernel: usb 1-2: USB disconnect, device number 2
Jul 08 16:12:48 dom0 kernel: usb 1-2.3: USB disconnect, device number 6
Jul 08 16:12:48 dom0 kernel: audit: type=1137 audit(1752009168.402:309): pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-2/1-2.3" device_rule=626C6F636B20696420313035303A30343034206E616D652022597562696B65792034204343494422207669612D706F72742022312D322E332220776974682D696E746572666163652030623A30303A303020776974682D636F6E6E6563742D747970652022756E6B6E6F776E22 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:48 dom0 kernel: audit: type=1137 audit(1752009168.403:310): pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-2" device_rule=616C6C6F7720696420303565333A30363130206E616D652022555342322E312048756222207669612D706F72742022312D322220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:48 dom0 kernel: usb 1-3: USB disconnect, device number 3
Jul 08 16:12:48 dom0 kernel: usb 1-4: USB disconnect, device number 4
Jul 08 16:12:48 dom0 kernel: usb 1-4.1: USB disconnect, device number 7
Jul 08 16:12:48 dom0 kernel: usb 1-4.3: USB disconnect, device number 8
Jul 08 16:12:48 dom0 kernel: usb 1-5: USB disconnect, device number 5
Jul 08 16:12:48 dom0 kernel: xhci_hcd 0000:c2:00.3: USB bus 1 deregistered
Jul 08 16:12:48 dom0 kernel: pciback 0000:c2:00.3: xen_pciback: seizing device
Jul 08 16:12:48 dom0 kernel: xen: registering gsi 37 triggering 0 polarity 1
Jul 08 16:12:48 dom0 kernel: Already setup the GSI :37
Jul 08 16:12:48 dom0 kernel: xhci_hcd 0000:c2:00.4: remove, state 4
Jul 08 16:12:48 dom0 kernel: usb usb4: USB disconnect, device number 1
Jul 08 16:12:48 dom0 kernel: xhci_hcd 0000:c2:00.4: USB bus 4 deregistered
Jul 08 16:12:48 dom0 kernel: xhci_hcd 0000:c2:00.4: remove, state 1
Jul 08 16:12:48 dom0 kernel: usb usb3: USB disconnect, device number 1
Jul 08 16:12:48 dom0 kernel: usb 3-1: USB disconnect, device number 2
Jul 08 16:12:48 dom0 kernel: xhci_hcd 0000:c2:00.4: USB bus 3 deregistered
Jul 08 16:12:48 dom0 kernel: pciback 0000:c2:00.4: xen_pciback: seizing device
Jul 08 16:12:48 dom0 kernel: xen: registering gsi 38 triggering 0 polarity 1
Jul 08 16:12:48 dom0 kernel: Already setup the GSI :38
Jul 08 16:12:48 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb2/2-2/2-2.2" device_rule=626C6F636B20696420306264613A38313536206E616D6520225553422031302F3130302F31472F322E3547204C414E22207669612D706F72742022322D322E322220776974682D696E74657266616365207B2066663A66663A30302030323A30643A30302030613A30303A30312030613A30303A30312030323A30363A30302030613A30303A30302030613A30303A3030207D20776974682D636F6E6E6563742D747970652022756E6B6E6F776E22 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:48 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb2/2-2" device_rule=616C6C6F7720696420303565333A30363235206E616D652022555342332E322048756222207669612D706F72742022322D322220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:48 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb2" device_rule=616C6C6F7720696420316436623A30303033206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362322220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:48 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-2/1-2.3" device_rule=626C6F636B20696420313035303A30343034206E616D652022597562696B65792034204343494422207669612D706F72742022312D322E332220776974682D696E746572666163652030623A30303A303020776974682D636F6E6E6563742D747970652022756E6B6E6F776E22 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:48 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-2" device_rule=616C6C6F7720696420303565333A30363130206E616D652022555342322E312048756222207669612D706F72742022312D322220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:48 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-3" device_rule=616C6C6F7720696420303565333A30363130206E616D652022555342322E302048756222207669612D706F72742022312D332220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:48 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-4/1-4.1" device_rule=626C6F636B20696420323763363A36303963206E616D652022476F6F64697820555342322E30204D49534322207669612D706F72742022312D342E312220776974682D696E746572666163652066663A30303A303020776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:48 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-4/1-4.3" device_rule=616C6C6F7720696420333261633A30303132206E616D6520224C6170746F70203136204B6579626F617264204D6F64756C65202D20414E534922207669612D706F72742022312D342E332220776974682D696E74657266616365207B2030333A30313A30312030333A30303A30302030333A30303A30302030333A30303A3030207D20776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:48 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-4" device_rule=616C6C6F7720696420303565333A30363130206E616D652022555342322E302048756222207669612D706F72742022312D342220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:48 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1/1-5" device_rule=626C6F636B20696420306538643A65363136206E616D652022576972656C6573735F44657669636522207669612D706F72742022312D352220776974682D696E74657266616365207B2065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A3031207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:48 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.3/usb1" device_rule=616C6C6F7720696420316436623A30303032206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362312220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:48 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.4/usb4" device_rule=616C6C6F7720696420316436623A30303033206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362342220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:48 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.4/usb3/3-1" device_rule=626C6F636B20696420306264613A35363334206E616D6520224C6170746F702043616D65726122207669612D706F72742022332D312220776974682D696E74657266616365207B2030653A30313A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A30302030653A30323A3030207D20776974682D636F6E6E6563742D74797065202268617264776972656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:48 dom0 audit[3176]: USER_DEVICE pid=3176 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:08.1/0000:c2:00.4/usb3" device_rule=616C6C6F7720696420316436623A30303032206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362332220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:48 dom0 systemd[1]: Stopped target smartcard.target - Smart Card.
Jul 08 16:12:48 dom0 kernel: pciback 0000:c4:00.5: xen_pciback: seizing device
Jul 08 16:12:48 dom0 kernel: xen: registering gsi 44 triggering 0 polarity 1
Jul 08 16:12:48 dom0 kernel: Already setup the GSI :44
Jul 08 16:12:48 dom0 kernel: pciback 0000:c4:00.6: xen_pciback: seizing device
Jul 08 16:12:48 dom0 kernel: xen: registering gsi 45 triggering 0 polarity 1
Jul 08 16:12:48 dom0 kernel: Already setup the GSI :45
Jul 08 16:12:48 dom0 qubesd[4330]: vm.sys-firewall: Starting sys-firewall
Jul 08 16:12:48 dom0 qubesd[4330]: vm.sys-gui: Starting sys-gui
Jul 08 16:12:49 dom0 dmeventd[2209]: No longer monitoring thin pool qubes_dom0-pool00-tpool.
Jul 08 16:12:49 dom0 lvm[2209]: Monitoring thin pool qubes_dom0-pool00-tpool.
Jul 08 16:12:49 dom0 dmeventd[2209]: No longer monitoring thin pool qubes_dom0-pool00-tpool.
Jul 08 16:12:49 dom0 lvm[2209]: Monitoring thin pool qubes_dom0-pool00-tpool.
Jul 08 16:12:49 dom0 kernel: loop0: detected capacity change from 0 to 1399816
Jul 08 16:12:49 dom0 kernel: loop1: detected capacity change from 0 to 1399816
Jul 08 16:12:49 dom0 kernel: pciback 0000:02:00.0: xen_pciback: vpci: assign to virtual slot 0
Jul 08 16:12:49 dom0 kernel: pciback 0000:02:00.0: registering for 2
Jul 08 16:12:50 dom0 kernel: xen-blkback: backend/vbd/2/51712: using 1 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:12:50 dom0 kernel: xen: registering gsi 46 triggering 0 polarity 1
Jul 08 16:12:50 dom0 kernel: Already setup the GSI :46
Jul 08 16:12:50 dom0 kernel: xen-blkback: backend/vbd/2/51728: using 1 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:12:50 dom0 kernel: xen: registering gsi 46 triggering 0 polarity 1
Jul 08 16:12:50 dom0 kernel: Already setup the GSI :46
Jul 08 16:12:50 dom0 kernel: xen: registering gsi 46 triggering 0 polarity 1
Jul 08 16:12:50 dom0 kernel: Already setup the GSI :46
Jul 08 16:12:50 dom0 kernel: xen: registering gsi 46 triggering 0 polarity 1
Jul 08 16:12:50 dom0 kernel: Already setup the GSI :46
Jul 08 16:12:50 dom0 kernel: xen: registering gsi 46 triggering 0 polarity 1
Jul 08 16:12:50 dom0 kernel: Already setup the GSI :46
Jul 08 16:12:50 dom0 kernel: xen: registering gsi 46 triggering 0 polarity 1
Jul 08 16:12:50 dom0 kernel: Already setup the GSI :46
Jul 08 16:12:50 dom0 kernel: xen-blkback: backend/vbd/2/51744: using 1 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:12:50 dom0 kernel: xen-blkback: backend/vbd/2/51760: using 1 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:12:51 dom0 qubesd[4330]: vm.sys-net: Setting Qubes DB info for the VM
Jul 08 16:12:51 dom0 qubesd[4330]: vm.sys-net: Starting Qubes DB
Jul 08 16:12:51 dom0 audit[6413]: CRED_ACQ pid=6413 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:51 dom0 runuser[6413]: pam_unix(runuser:session): session opened for user admin(uid=1000) by (uid=0)
Jul 08 16:12:51 dom0 audit[6413]: USER_START pid=6413 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:51 dom0 runuser[6413]: pam_unix(runuser:session): session closed for user admin
Jul 08 16:12:51 dom0 audit[6413]: USER_END pid=6413 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:51 dom0 audit[6413]: CRED_DISP pid=6413 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:51 dom0 qubesd[4330]: vm.sys-net: Activating the sys-net VM
Jul 08 16:12:51 dom0 audit[6423]: CRED_ACQ pid=6423 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:51 dom0 runuser[6423]: pam_unix(runuser:session): session opened for user admin(uid=1000) by (uid=0)
Jul 08 16:12:51 dom0 audit[6423]: USER_START pid=6423 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:51 dom0 dmeventd[2209]: No longer monitoring thin pool qubes_dom0-pool00-tpool.
Jul 08 16:12:51 dom0 lvm[2209]: Monitoring thin pool qubes_dom0-pool00-tpool.
Jul 08 16:12:51 dom0 dmeventd[2209]: No longer monitoring thin pool qubes_dom0-pool00-tpool.
Jul 08 16:12:51 dom0 lvm[2209]: Monitoring thin pool qubes_dom0-pool00-tpool.
Jul 08 16:12:51 dom0 kernel: loop2: detected capacity change from 0 to 1399816
Jul 08 16:12:52 dom0 kernel: loop3: detected capacity change from 0 to 1399816
Jul 08 16:12:52 dom0 kernel: pciback 0000:c2:00.3: xen_pciback: vpci: assign to virtual slot 0
Jul 08 16:12:52 dom0 kernel: pciback 0000:c2:00.3: registering for 4
Jul 08 16:12:52 dom0 kernel: pciback 0000:c2:00.4: xen_pciback: vpci: assign to virtual slot 0 func 4
Jul 08 16:12:52 dom0 kernel: pciback 0000:c2:00.4: registering for 4
Jul 08 16:12:52 dom0 kernel: pciback 0000:c4:00.5: xen_pciback: vpci: assign to virtual slot 1
Jul 08 16:12:52 dom0 kernel: pciback 0000:c4:00.5: registering for 4
Jul 08 16:12:52 dom0 kernel: pciback 0000:c4:00.6: xen_pciback: vpci: assign to virtual slot 1 func 6
Jul 08 16:12:52 dom0 kernel: pciback 0000:c4:00.6: registering for 4
Jul 08 16:12:52 dom0 kernel: xen-blkback: backend/vbd/4/51712: using 1 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:12:52 dom0 kernel: xen-blkback: backend/vbd/4/51728: using 1 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:12:52 dom0 kernel: xen: registering gsi 37 triggering 0 polarity 1
Jul 08 16:12:52 dom0 kernel: Already setup the GSI :37
Jul 08 16:12:52 dom0 kernel: xen: registering gsi 37 triggering 0 polarity 1
Jul 08 16:12:52 dom0 kernel: Already setup the GSI :37
Jul 08 16:12:52 dom0 kernel: xen: registering gsi 37 triggering 0 polarity 1
Jul 08 16:12:52 dom0 kernel: Already setup the GSI :37
Jul 08 16:12:52 dom0 kernel: xen: registering gsi 37 triggering 0 polarity 1
Jul 08 16:12:52 dom0 kernel: xen-blkback: backend/vbd/4/51744: using 1 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:12:52 dom0 kernel: Already setup the GSI :37
Jul 08 16:12:52 dom0 kernel: xen: registering gsi 37 triggering 0 polarity 1
Jul 08 16:12:52 dom0 kernel: Already setup the GSI :37
Jul 08 16:12:52 dom0 kernel: xen: registering gsi 37 triggering 0 polarity 1
Jul 08 16:12:52 dom0 kernel: Already setup the GSI :37
Jul 08 16:12:52 dom0 kernel: xen: registering gsi 37 triggering 0 polarity 1
Jul 08 16:12:52 dom0 kernel: Already setup the GSI :37
Jul 08 16:12:52 dom0 kernel: pciback 0000:c2:00.3: xen-pciback: Driver tried to write to a read-only configuration space field at offset 0x2a6, size 2. This may be harmless, but if you have problems with your device:
Jul 08 16:12:52 dom0 kernel: xen: registering gsi 38 triggering 0 polarity 1
Jul 08 16:12:52 dom0 kernel: Already setup the GSI :38
Jul 08 16:12:52 dom0 kernel: xen: registering gsi 38 triggering 0 polarity 1
Jul 08 16:12:52 dom0 kernel: Already setup the GSI :38
Jul 08 16:12:52 dom0 kernel: xen: registering gsi 38 triggering 0 polarity 1
Jul 08 16:12:52 dom0 kernel: Already setup the GSI :38
Jul 08 16:12:52 dom0 kernel: xen: registering gsi 38 triggering 0 polarity 1
Jul 08 16:12:52 dom0 kernel: Already setup the GSI :38
Jul 08 16:12:52 dom0 kernel: xen: registering gsi 38 triggering 0 polarity 1
Jul 08 16:12:52 dom0 kernel: Already setup the GSI :38
Jul 08 16:12:52 dom0 kernel: xen: registering gsi 38 triggering 0 polarity 1
Jul 08 16:12:52 dom0 kernel: Already setup the GSI :38
Jul 08 16:12:52 dom0 kernel: xen: registering gsi 38 triggering 0 polarity 1
Jul 08 16:12:52 dom0 kernel: Already setup the GSI :38
Jul 08 16:12:52 dom0 kernel: pciback 0000:c2:00.4: xen-pciback: Driver tried to write to a read-only configuration space field at offset 0x2a6, size 2. This may be harmless, but if you have problems with your device:
Jul 08 16:12:52 dom0 kernel: xen: registering gsi 44 triggering 0 polarity 1
Jul 08 16:12:52 dom0 kernel: Already setup the GSI :44
Jul 08 16:12:52 dom0 kernel: xen: registering gsi 44 triggering 0 polarity 1
Jul 08 16:12:52 dom0 kernel: Already setup the GSI :44
Jul 08 16:12:52 dom0 kernel: xen: registering gsi 44 triggering 0 polarity 1
Jul 08 16:12:52 dom0 kernel: Already setup the GSI :44
Jul 08 16:12:52 dom0 kernel: xen: registering gsi 44 triggering 0 polarity 1
Jul 08 16:12:52 dom0 kernel: Already setup the GSI :44
Jul 08 16:12:52 dom0 kernel: xen: registering gsi 44 triggering 0 polarity 1
Jul 08 16:12:52 dom0 kernel: Already setup the GSI :44
Jul 08 16:12:52 dom0 kernel: xen: registering gsi 44 triggering 0 polarity 1
Jul 08 16:12:52 dom0 kernel: Already setup the GSI :44
Jul 08 16:12:52 dom0 kernel: xen: registering gsi 44 triggering 0 polarity 1
Jul 08 16:12:52 dom0 kernel: Already setup the GSI :44
Jul 08 16:12:52 dom0 kernel: pciback 0000:c4:00.5: xen-pciback: Driver tried to write to a read-only configuration space field at offset 0x2a6, size 2. This may be harmless, but if you have problems with your device:
Jul 08 16:12:52 dom0 kernel: xen: registering gsi 45 triggering 0 polarity 1
Jul 08 16:12:52 dom0 kernel: Already setup the GSI :45
Jul 08 16:12:52 dom0 kernel: xen: registering gsi 45 triggering 0 polarity 1
Jul 08 16:12:52 dom0 kernel: Already setup the GSI :45
Jul 08 16:12:52 dom0 kernel: xen: registering gsi 45 triggering 0 polarity 1
Jul 08 16:12:52 dom0 kernel: Already setup the GSI :45
Jul 08 16:12:52 dom0 kernel: xen: registering gsi 45 triggering 0 polarity 1
Jul 08 16:12:52 dom0 kernel: Already setup the GSI :45
Jul 08 16:12:52 dom0 kernel: xen: registering gsi 45 triggering 0 polarity 1
Jul 08 16:12:52 dom0 kernel: Already setup the GSI :45
Jul 08 16:12:52 dom0 kernel: xen: registering gsi 45 triggering 0 polarity 1
Jul 08 16:12:52 dom0 kernel: Already setup the GSI :45
Jul 08 16:12:52 dom0 kernel: xen: registering gsi 45 triggering 0 polarity 1
Jul 08 16:12:52 dom0 kernel: Already setup the GSI :45
Jul 08 16:12:52 dom0 kernel: pciback 0000:c4:00.6: xen-pciback: Driver tried to write to a read-only configuration space field at offset 0x2a6, size 2. This may be harmless, but if you have problems with your device:
Jul 08 16:12:52 dom0 kernel: xen-blkback: backend/vbd/4/51760: using 1 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:12:53 dom0 kernel: xen-blkback: backend/vbd/1/51712: using 2 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:12:53 dom0 kernel: xen-blkback: backend/vbd/1/51728: using 2 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:12:53 dom0 kernel: xen-blkback: backend/vbd/1/51744: using 2 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:12:53 dom0 kernel: xen-blkback: backend/vbd/1/51760: using 2 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:12:54 dom0 qubesd[4330]: vm.sys-usb: Setting Qubes DB info for the VM
Jul 08 16:12:54 dom0 qubesd[4330]: vm.sys-usb: Starting Qubes DB
Jul 08 16:12:54 dom0 audit[6838]: CRED_ACQ pid=6838 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:54 dom0 kernel: kauditd_printk_skb: 15 callbacks suppressed
Jul 08 16:12:54 dom0 kernel: audit: type=1103 audit(1752009174.067:326): pid=6838 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:54 dom0 runuser[6838]: pam_unix(runuser:session): session opened for user admin(uid=1000) by (uid=0)
Jul 08 16:12:54 dom0 audit[6838]: USER_START pid=6838 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:54 dom0 kernel: audit: type=1105 audit(1752009174.069:327): pid=6838 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:54 dom0 runuser[6838]: pam_unix(runuser:session): session closed for user admin
Jul 08 16:12:54 dom0 audit[6838]: USER_END pid=6838 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:54 dom0 audit[6838]: CRED_DISP pid=6838 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:54 dom0 kernel: audit: type=1106 audit(1752009174.074:328): pid=6838 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:54 dom0 kernel: audit: type=1104 audit(1752009174.074:329): pid=6838 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:54 dom0 qubesd[4330]: vm.sys-usb: Activating the sys-usb VM
Jul 08 16:12:54 dom0 audit[6848]: CRED_ACQ pid=6848 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:54 dom0 kernel: audit: type=1103 audit(1752009174.083:330): pid=6848 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:54 dom0 runuser[6848]: pam_unix(runuser:session): session opened for user admin(uid=1000) by (uid=0)
Jul 08 16:12:54 dom0 kernel: audit: type=1105 audit(1752009174.084:331): pid=6848 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:54 dom0 audit[6848]: USER_START pid=6848 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:54 dom0 dmeventd[2209]: No longer monitoring thin pool qubes_dom0-pool00-tpool.
Jul 08 16:12:54 dom0 lvm[2209]: Monitoring thin pool qubes_dom0-pool00-tpool.
Jul 08 16:12:54 dom0 dmeventd[2209]: No longer monitoring thin pool qubes_dom0-pool00-tpool.
Jul 08 16:12:54 dom0 lvm[2209]: Monitoring thin pool qubes_dom0-pool00-tpool.
Jul 08 16:12:55 dom0 kernel: loop4: detected capacity change from 0 to 1399816
Jul 08 16:12:55 dom0 qubesd[4330]: vm.sys-gui: Setting Qubes DB info for the VM
Jul 08 16:12:55 dom0 qubesd[4330]: vm.sys-gui: Starting Qubes DB
Jul 08 16:12:55 dom0 audit[7169]: CRED_ACQ pid=7169 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:55 dom0 kernel: audit: type=1103 audit(1752009175.677:332): pid=7169 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:55 dom0 runuser[7169]: pam_unix(runuser:session): session opened for user admin(uid=1000) by (uid=0)
Jul 08 16:12:55 dom0 audit[7169]: USER_START pid=7169 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:55 dom0 kernel: audit: type=1105 audit(1752009175.679:333): pid=7169 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:55 dom0 runuser[7169]: pam_unix(runuser:session): session closed for user admin
Jul 08 16:12:55 dom0 audit[7169]: USER_END pid=7169 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:55 dom0 audit[7169]: CRED_DISP pid=7169 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:55 dom0 kernel: audit: type=1106 audit(1752009175.684:334): pid=7169 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:55 dom0 kernel: audit: type=1104 audit(1752009175.684:335): pid=7169 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:55 dom0 qubesd[4330]: vm.sys-gui: Activating the sys-gui VM
Jul 08 16:12:55 dom0 audit[7185]: CRED_ACQ pid=7185 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:55 dom0 runuser[7185]: pam_unix(runuser:session): session opened for user admin(uid=1000) by (uid=0)
Jul 08 16:12:55 dom0 audit[7185]: USER_START pid=7185 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:56 dom0 audit[6423]: USER_END pid=6423 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:56 dom0 audit[6423]: CRED_DISP pid=6423 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:56 dom0 runuser[6423]: pam_unix(runuser:session): session closed for user admin
Jul 08 16:12:56 dom0 systemd[1]: Finished qubes-vm@sys-net.service - Start Qubes VM sys-net.
Jul 08 16:12:56 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-vm@sys-net comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:56 dom0 dmeventd[2209]: No longer monitoring thin pool qubes_dom0-pool00-tpool.
Jul 08 16:12:56 dom0 lvm[2209]: Monitoring thin pool qubes_dom0-pool00-tpool.
Jul 08 16:12:56 dom0 dmeventd[2209]: No longer monitoring thin pool qubes_dom0-pool00-tpool.
Jul 08 16:12:56 dom0 lvm[2209]: Monitoring thin pool qubes_dom0-pool00-tpool.
Jul 08 16:12:56 dom0 kernel: xen-blkback: backend/vbd/5/51712: using 2 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:12:56 dom0 kernel: xen-blkback: backend/vbd/5/51728: using 2 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:12:56 dom0 kernel: xen-blkback: backend/vbd/5/51744: using 2 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:12:56 dom0 kernel: xen-blkback: backend/vbd/5/51760: using 2 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:12:56 dom0 kernel: xen-blkback: backend/vbd/3/51712: using 2 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:12:56 dom0 kernel: xen-blkback: backend/vbd/3/51728: using 2 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:12:56 dom0 kernel: xen-blkback: backend/vbd/3/51744: using 2 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:12:56 dom0 kernel: xen-blkback: backend/vbd/3/51760: using 2 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:12:57 dom0 kernel: loop5: detected capacity change from 0 to 1399816
Jul 08 16:12:57 dom0 qubesd[4330]: vm.sys-firewall-full-internet: Setting Qubes DB info for the VM
Jul 08 16:12:57 dom0 qubesd[4330]: vm.sys-firewall-full-internet: Starting Qubes DB
Jul 08 16:12:57 dom0 audit[7555]: CRED_ACQ pid=7555 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:57 dom0 runuser[7555]: pam_unix(runuser:session): session opened for user admin(uid=1000) by (uid=0)
Jul 08 16:12:57 dom0 audit[7555]: USER_START pid=7555 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:57 dom0 runuser[7555]: pam_unix(runuser:session): session closed for user admin
Jul 08 16:12:57 dom0 audit[7555]: USER_END pid=7555 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:57 dom0 audit[7555]: CRED_DISP pid=7555 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:57 dom0 qubesd[4330]: vm.sys-firewall-full-internet: Activating the sys-firewall-full-internet VM
Jul 08 16:12:57 dom0 audit[7580]: CRED_ACQ pid=7580 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:57 dom0 runuser[7580]: pam_unix(runuser:session): session opened for user admin(uid=1000) by (uid=0)
Jul 08 16:12:57 dom0 audit[7580]: USER_START pid=7580 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:57 dom0 dmeventd[2209]: No longer monitoring thin pool qubes_dom0-pool00-tpool.
Jul 08 16:12:57 dom0 lvm[2209]: Monitoring thin pool qubes_dom0-pool00-tpool.
Jul 08 16:12:58 dom0 dmeventd[2209]: No longer monitoring thin pool qubes_dom0-pool00-tpool.
Jul 08 16:12:58 dom0 lvm[2209]: Monitoring thin pool qubes_dom0-pool00-tpool.
Jul 08 16:12:58 dom0 kernel: xen-blkback: backend/vbd/6/51712: using 2 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:12:58 dom0 kernel: xen-blkback: backend/vbd/6/51728: using 2 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:12:58 dom0 kernel: xen-blkback: backend/vbd/6/51744: using 2 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:12:58 dom0 kernel: xen-blkback: backend/vbd/6/51760: using 2 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:12:59 dom0 runuser[7185]: pam_unix(runuser:session): session closed for user admin
Jul 08 16:12:59 dom0 kernel: kauditd_printk_skb: 11 callbacks suppressed
Jul 08 16:12:59 dom0 kernel: audit: type=1106 audit(1752009179.293:347): pid=7185 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:59 dom0 kernel: audit: type=1104 audit(1752009179.293:348): pid=7185 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:59 dom0 audit[7185]: USER_END pid=7185 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:59 dom0 audit[7185]: CRED_DISP pid=7185 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:59 dom0 kernel: loop6: detected capacity change from 0 to 1399816
Jul 08 16:12:59 dom0 qubesd[4330]: vm.sys-firewall-chocolatey: Setting Qubes DB info for the VM
Jul 08 16:12:59 dom0 qubesd[4330]: vm.sys-firewall-chocolatey: Starting Qubes DB
Jul 08 16:12:59 dom0 audit[7923]: CRED_ACQ pid=7923 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:59 dom0 kernel: audit: type=1103 audit(1752009179.461:349): pid=7923 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:59 dom0 runuser[7923]: pam_unix(runuser:session): session opened for user admin(uid=1000) by (uid=0)
Jul 08 16:12:59 dom0 kernel: audit: type=1105 audit(1752009179.462:350): pid=7923 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:59 dom0 audit[7923]: USER_START pid=7923 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:59 dom0 runuser[7923]: pam_unix(runuser:session): session closed for user admin
Jul 08 16:12:59 dom0 audit[7923]: USER_END pid=7923 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:59 dom0 audit[7923]: CRED_DISP pid=7923 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:59 dom0 kernel: audit: type=1106 audit(1752009179.469:351): pid=7923 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:59 dom0 kernel: audit: type=1104 audit(1752009179.469:352): pid=7923 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:59 dom0 runuser[6848]: pam_unix(runuser:session): session closed for user admin
Jul 08 16:12:59 dom0 audit[6848]: USER_END pid=6848 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:59 dom0 audit[6848]: CRED_DISP pid=6848 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:59 dom0 kernel: audit: type=1106 audit(1752009179.484:353): pid=6848 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:59 dom0 kernel: audit: type=1104 audit(1752009179.484:354): pid=6848 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:59 dom0 qubesd[4330]: vm.sys-firewall-chocolatey: Activating the sys-firewall-chocolatey VM
Jul 08 16:12:59 dom0 audit[7956]: CRED_ACQ pid=7956 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:59 dom0 kernel: audit: type=1103 audit(1752009179.580:355): pid=7956 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:59 dom0 runuser[7956]: pam_unix(runuser:session): session opened for user admin(uid=1000) by (uid=0)
Jul 08 16:12:59 dom0 audit[7956]: USER_START pid=7956 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:59 dom0 kernel: audit: type=1105 audit(1752009179.581:356): pid=7956 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:59 dom0 systemd[1]: Finished qubes-vm@sys-gui.service - Start Qubes VM sys-gui.
Jul 08 16:12:59 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-vm@sys-gui comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:59 dom0 systemd[1]: Finished qubes-vm@sys-usb.service - Start Qubes VM sys-usb.
Jul 08 16:12:59 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-vm@sys-usb comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:59 dom0 systemd[1]: Starting systemd-user-sessions.service - Permit User Sessions...
Jul 08 16:12:59 dom0 systemd[1]: Finished systemd-user-sessions.service - Permit User Sessions.
Jul 08 16:12:59 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-user-sessions comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:59 dom0 systemd[1]: Started crond.service - Command Scheduler.
Jul 08 16:12:59 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=crond comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:59 dom0 systemd[1]: Starting lightdm.service - Light Display Manager...
Jul 08 16:12:59 dom0 systemd[1]: Starting plymouth-quit-wait.service - Hold until boot process finishes up...
Jul 08 16:12:59 dom0 crond[7962]: (CRON) STARTUP (1.6.1)
Jul 08 16:12:59 dom0 crond[7962]: (CRON) INFO (Syslog will be used instead of sendmail.)
Jul 08 16:12:59 dom0 crond[7962]: (CRON) INFO (RANDOM_DELAY will be scaled with factor 23% if used.)
Jul 08 16:12:59 dom0 crond[7962]: (CRON) INFO (running with inotify support)
Jul 08 16:12:59 dom0 systemd[1]: Received SIGRTMIN+21 from PID 670 (plymouthd).
Jul 08 16:12:59 dom0 systemd[1]: Started lightdm.service - Light Display Manager.
Jul 08 16:12:59 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=lightdm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:59 dom0 systemd[1]: Reached target nss-user-lookup.target - User and Group Name Lookups.
Jul 08 16:12:59 dom0 audit: BPF prog-id=64 op=LOAD
Jul 08 16:12:59 dom0 systemd[1]: Starting accounts-daemon.service - Accounts Service...
Jul 08 16:12:59 dom0 dmeventd[2209]: No longer monitoring thin pool qubes_dom0-pool00-tpool.
Jul 08 16:12:59 dom0 accounts-daemon[7976]: started daemon version 22.39.0
Jul 08 16:12:59 dom0 systemd[1]: Started accounts-daemon.service - Accounts Service.
Jul 08 16:12:59 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=accounts-daemon comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:12:59 dom0 lvm[2209]: Monitoring thin pool qubes_dom0-pool00-tpool.
Jul 08 16:12:59 dom0 dmeventd[2209]: No longer monitoring thin pool qubes_dom0-pool00-tpool.
Jul 08 16:12:59 dom0 lvm[2209]: Monitoring thin pool qubes_dom0-pool00-tpool.
Jul 08 16:13:00 dom0 systemd[1]: Received SIGRTMIN+21 from PID 670 (plymouthd).
Jul 08 16:13:00 dom0 systemd[1]: Finished plymouth-quit-wait.service - Hold until boot process finishes up.
Jul 08 16:13:00 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=plymouth-quit-wait comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:00 dom0 systemd[1]: Started serial-getty@hvc0.service - Serial Getty on hvc0.
Jul 08 16:13:00 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=serial-getty@hvc0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:00 dom0 systemd[1]: Reached target getty.target - Login Prompts.
Jul 08 16:13:00 dom0 audit[8295]: CRED_ACQ pid=8295 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_env,pam_permit acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:13:00 dom0 lightdm[8295]: pam_unix(lightdm-greeter:session): session opened for user lightdm(uid=992) by (uid=0)
Jul 08 16:13:00 dom0 systemd[1]: Created slice user-992.slice - User Slice of UID 992.
Jul 08 16:13:00 dom0 systemd[1]: Starting user-runtime-dir@992.service - User Runtime Directory /run/user/992...
Jul 08 16:13:00 dom0 systemd-logind[3298]: New session c1 of user lightdm.
Jul 08 16:13:00 dom0 systemd[1]: Finished user-runtime-dir@992.service - User Runtime Directory /run/user/992.
Jul 08 16:13:00 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:00 dom0 systemd[1]: Starting user@992.service - User Manager for UID 992...
Jul 08 16:13:00 dom0 (systemd)[8300]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory
Jul 08 16:13:00 dom0 (systemd)[8300]: PAM adding faulty module: /usr/lib64/security/pam_sss.so
Jul 08 16:13:00 dom0 dbus-broker-launch[3185]: Activation request for 'org.freedesktop.home1' failed: The systemd unit 'dbus-org.freedesktop.home1.service' could not be found.
Jul 08 16:13:00 dom0 (systemd)[8300]: pam_systemd_home(systemd-user:account): systemd-homed is not available: Could not activate remote peer: activation request failed: unknown unit.
Jul 08 16:13:00 dom0 audit[8300]: USER_ACCT pid=8300 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_unix acct="lightdm" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:00 dom0 audit[8300]: CRED_ACQ pid=8300 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=? acct="lightdm" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
Jul 08 16:13:00 dom0 audit[8300]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=8 a1=7fff893bb3a0 a2=3 a3=7fff893bb0b5 items=0 ppid=1 pid=8300 auid=992 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=1 comm="(systemd)" exe="/usr/lib/systemd/systemd" key=(null)
Jul 08 16:13:00 dom0 audit: PROCTITLE proctitle="(systemd)"
Jul 08 16:13:00 dom0 (systemd)[8300]: pam_unix(systemd-user:session): session opened for user lightdm(uid=992) by (uid=0)
Jul 08 16:13:00 dom0 audit[8300]: USER_START pid=8300 uid=0 auid=992 ses=1 msg='op=PAM:session_open grantors=pam_selinux,pam_selinux,pam_loginuid,pam_namespace,pam_systemd_home,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="lightdm" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:00 dom0 kernel: xen-blkback: backend/vbd/7/51712: using 2 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:13:00 dom0 kernel: xen-blkback: backend/vbd/7/51728: using 2 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:13:00 dom0 kernel: xen-blkback: backend/vbd/7/51744: using 2 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:13:00 dom0 kernel: xen-blkback: backend/vbd/7/51760: using 2 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:13:01 dom0 systemd[8300]: Queued start job for default target default.target.
Jul 08 16:13:01 dom0 systemd[8300]: Created slice app.slice - User Application Slice.
Jul 08 16:13:01 dom0 systemd[8300]: Created slice session.slice - User Core Session Slice.
Jul 08 16:13:01 dom0 systemd[8300]: grub-boot-success.timer - Mark boot as successful after the user session has run 2 minutes was skipped because of a failed condition check (ConditionUser=!@system).
Jul 08 16:13:01 dom0 systemd[8300]: Started systemd-tmpfiles-clean.timer - Daily Cleanup of User's Temporary Directories.
Jul 08 16:13:01 dom0 systemd[8300]: Reached target paths.target - Paths.
Jul 08 16:13:01 dom0 systemd[8300]: Reached target timers.target - Timers.
Jul 08 16:13:01 dom0 systemd[8300]: Starting dbus.socket - D-Bus User Message Bus Socket...
Jul 08 16:13:01 dom0 systemd[8300]: Listening on pipewire-pulse.socket - PipeWire PulseAudio.
Jul 08 16:13:01 dom0 systemd[8300]: Listening on pipewire.socket - PipeWire Multimedia System Sockets.
Jul 08 16:13:01 dom0 systemd[8300]: Listening on ssh-agent.socket - OpenSSH key agent.
Jul 08 16:13:01 dom0 systemd[8300]: Starting systemd-tmpfiles-setup.service - Create User's Volatile Files and Directories...
Jul 08 16:13:01 dom0 systemd[8300]: Listening on dbus.socket - D-Bus User Message Bus Socket.
Jul 08 16:13:01 dom0 systemd[8300]: Reached target sockets.target - Sockets.
Jul 08 16:13:01 dom0 systemd[8300]: Finished systemd-tmpfiles-setup.service - Create User's Volatile Files and Directories.
Jul 08 16:13:01 dom0 systemd[8300]: Reached target basic.target - Basic System.
Jul 08 16:13:01 dom0 systemd[1]: Started user@992.service - User Manager for UID 992.
Jul 08 16:13:01 dom0 systemd[1]: Started session-c1.scope - Session c1 of User lightdm.
Jul 08 16:13:01 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user@992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:01 dom0 systemd[8300]: Started pipewire.service - PipeWire Multimedia Service.
Jul 08 16:13:01 dom0 systemd[8300]: Started wireplumber.service - Multimedia Service Session Manager.
Jul 08 16:13:01 dom0 systemd[8300]: Started pipewire-pulse.service - PipeWire PulseAudio.
Jul 08 16:13:01 dom0 systemd[8300]: Reached target default.target - Main User Target.
Jul 08 16:13:01 dom0 systemd[8300]: Startup finished in 846ms.
Jul 08 16:13:01 dom0 audit[8295]: USER_START pid=8295 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_unix,pam_systemd acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:13:01 dom0 systemd[8300]: Started dbus-daemon.service - D-Bus User Message Bus.
Jul 08 16:13:01 dom0 systemd[1]: Starting rtkit-daemon.service - RealtimeKit Scheduling Policy Service...
Jul 08 16:13:01 dom0 rtkit-daemon[8325]: Successfully called chroot.
Jul 08 16:13:01 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=rtkit-daemon comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:01 dom0 systemd[1]: Started rtkit-daemon.service - RealtimeKit Scheduling Policy Service.
Jul 08 16:13:01 dom0 rtkit-daemon[8325]: Successfully dropped privileges.
Jul 08 16:13:01 dom0 rtkit-daemon[8325]: Successfully limited resources.
Jul 08 16:13:01 dom0 rtkit-daemon[8325]: Canary thread running.
Jul 08 16:13:01 dom0 rtkit-daemon[8325]: Running.
Jul 08 16:13:01 dom0 rtkit-daemon[8325]: Watchdog thread running.
Jul 08 16:13:01 dom0 rtkit-daemon[8325]: Successfully made thread 8317 of process 8317 (/usr/bin/wireplumber) owned by '992' high priority at nice level -11.
Jul 08 16:13:01 dom0 rtkit-daemon[8325]: Successfully made thread 8326 of process 8317 (/usr/bin/wireplumber) owned by '992' RT at priority 20.
Jul 08 16:13:01 dom0 rtkit-daemon[8325]: Successfully made thread 8318 of process 8318 (/usr/bin/pipewire) owned by '992' high priority at nice level -11.
Jul 08 16:13:01 dom0 rtkit-daemon[8325]: Successfully made thread 8331 of process 8318 (/usr/bin/pipewire) owned by '992' RT at priority 20.
Jul 08 16:13:01 dom0 rtkit-daemon[8325]: Successfully made thread 8316 of process 8316 (/usr/bin/pipewire) owned by '992' high priority at nice level -11.
Jul 08 16:13:01 dom0 rtkit-daemon[8325]: Successfully made thread 8328 of process 8316 (/usr/bin/pipewire) owned by '992' RT at priority 20.
Jul 08 16:13:01 dom0 wireplumber[8317]: Failed to set scheduler settings: Operation not permitted
Jul 08 16:13:01 dom0 wireplumber[8317]: SPA handle 'api.libcamera.enum.manager' could not be loaded; is it installed?
Jul 08 16:13:01 dom0 wireplumber[8317]: PipeWire's libcamera SPA missing or broken. libcamera not supported.
Jul 08 16:13:01 dom0 wireplumber[8317]: GetManagedObjects() failed: org.freedesktop.DBus.Error.NameHasNoOwner
Jul 08 16:13:01 dom0 runuser[7580]: pam_unix(runuser:session): session closed for user admin
Jul 08 16:13:01 dom0 audit[7580]: USER_END pid=7580 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:01 dom0 audit[7580]: CRED_DISP pid=7580 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:01 dom0 dbus-daemon[8320]: [session uid=992 pid=8320] Activating via systemd: service name='org.a11y.Bus' unit='at-spi-dbus-bus.service' requested by ':1.7' (uid=992 pid=8319 comm="/usr/sbin/lightdm-gtk-greeter")
Jul 08 16:13:01 dom0 systemd[8300]: Starting at-spi-dbus-bus.service - Accessibility services bus...
Jul 08 16:13:01 dom0 dbus-daemon[8320]: [session uid=992 pid=8320] Successfully activated service 'org.a11y.Bus'
Jul 08 16:13:01 dom0 systemd[8300]: Started at-spi-dbus-bus.service - Accessibility services bus.
Jul 08 16:13:01 dom0 at-spi-bus-launcher[8350]: Policy to allow eavesdropping in /usr/share/defaults/at-spi2/accessibility.conf +15: Eavesdropping is deprecated and ignored
Jul 08 16:13:01 dom0 at-spi-bus-launcher[8350]: Policy to allow eavesdropping in /usr/share/defaults/at-spi2/accessibility.conf +17: Eavesdropping is deprecated and ignored
Jul 08 16:13:01 dom0 dbus-broker-launch[8350]: Ready
Jul 08 16:13:01 dom0 dbus-daemon[8320]: [session uid=992 pid=8320] Activating via systemd: service name='org.gtk.vfs.Daemon' unit='gvfs-daemon.service' requested by ':1.10' (uid=992 pid=8319 comm="/usr/sbin/lightdm-gtk-greeter")
Jul 08 16:13:01 dom0 systemd[8300]: Starting gvfs-daemon.service - Virtual filesystem service...
Jul 08 16:13:01 dom0 dbus-daemon[8320]: [session uid=992 pid=8320] Successfully activated service 'org.gtk.vfs.Daemon'
Jul 08 16:13:01 dom0 systemd[8300]: Started gvfs-daemon.service - Virtual filesystem service.
Jul 08 16:13:01 dom0 kernel: loop7: detected capacity change from 0 to 1399816
Jul 08 16:13:02 dom0 qubesd[4330]: vm.sys-firewall-localnet: Setting Qubes DB info for the VM
Jul 08 16:13:02 dom0 qubesd[4330]: vm.sys-firewall-localnet: Starting Qubes DB
Jul 08 16:13:02 dom0 audit[8377]: CRED_ACQ pid=8377 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:02 dom0 audit[8377]: USER_START pid=8377 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:02 dom0 runuser[8377]: pam_unix(runuser:session): session opened for user admin(uid=1000) by (uid=0)
Jul 08 16:13:02 dom0 runuser[8377]: pam_unix(runuser:session): session closed for user admin
Jul 08 16:13:02 dom0 audit[8377]: USER_END pid=8377 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:02 dom0 audit[8377]: CRED_DISP pid=8377 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:02 dom0 systemd[8300]: Created slice app-dbus\x2d:1.9\x2dorg.a11y.atspi.Registry.slice - Slice /app/dbus-:1.9-org.a11y.atspi.Registry.
Jul 08 16:13:02 dom0 lightdm[8424]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory
Jul 08 16:13:02 dom0 lightdm[8424]: PAM adding faulty module: /usr/lib64/security/pam_sss.so
Jul 08 16:13:02 dom0 systemd[8300]: Started dbus-:1.9-org.a11y.atspi.Registry@0.service.
Jul 08 16:13:02 dom0 at-spi2-registryd[8425]: SpiRegistry daemon is running with well-known name - org.a11y.atspi.Registry
Jul 08 16:13:02 dom0 dmeventd[2209]: No longer monitoring thin pool qubes_dom0-pool00-tpool.
Jul 08 16:13:02 dom0 lvm[2209]: Monitoring thin pool qubes_dom0-pool00-tpool.
Jul 08 16:13:02 dom0 qubesd[4330]: vm.sys-firewall-localnet: Activating the sys-firewall-localnet VM
Jul 08 16:13:02 dom0 audit[8468]: CRED_ACQ pid=8468 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:02 dom0 runuser[8468]: pam_unix(runuser:session): session opened for user admin(uid=1000) by (uid=0)
Jul 08 16:13:02 dom0 audit[8468]: USER_START pid=8468 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:02 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.InputKeyboard+: sys-usb -> @adminvm: allowed to dom0
Jul 08 16:13:02 dom0 systemd[1]: Finished qubes-vm@sys-firewall-full-internet.service - Start Qubes VM sys-firewall-full-internet.
Jul 08 16:13:02 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-vm@sys-firewall-full-internet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:02 dom0 audit: BPF prog-id=65 op=LOAD
Jul 08 16:13:02 dom0 audit: BPF prog-id=66 op=LOAD
Jul 08 16:13:02 dom0 audit: BPF prog-id=67 op=LOAD
Jul 08 16:13:02 dom0 systemd[1]: Starting systemd-hostnamed.service - Hostname Service...
Jul 08 16:13:02 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.InputKeyboard+: sys-usb -> @adminvm: allowed to dom0
Jul 08 16:13:02 dom0 dmeventd[2209]: No longer monitoring thin pool qubes_dom0-pool00-tpool.
Jul 08 16:13:02 dom0 systemd[1]: Started systemd-hostnamed.service - Hostname Service.
Jul 08 16:13:02 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:02 dom0 lvm[2209]: Monitoring thin pool qubes_dom0-pool00-tpool.
Jul 08 16:13:02 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.InputKeyboard+: sys-usb -> @adminvm: allowed to dom0
Jul 08 16:13:02 dom0 kernel: input: sys-usb: Framework Laptop 16 Keyboard Module - ANSI as /devices/virtual/input/input16
Jul 08 16:13:02 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.InputKeyboard+: sys-usb -> @adminvm: allowed to dom0
Jul 08 16:13:03 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.InputKeyboard+: sys-usb -> @adminvm: allowed to dom0
Jul 08 16:13:03 dom0 kernel: input: sys-usb: Framework Laptop 16 Keyboard Module - ANSI Keyboard as /devices/virtual/input/input17
Jul 08 16:13:03 dom0 systemd-logind[3298]: Watching system buttons on /dev/input/event5 (sys-usb: Framework Laptop 16 Keyboard Module - ANSI)
Jul 08 16:13:03 dom0 kernel: input: sys-usb: Framework Laptop 16 Keyboard Module - ANSI System Control as /devices/virtual/input/input19
Jul 08 16:13:03 dom0 kernel: input: sys-usb: Framework Laptop 16 Keyboard Module - ANSI Consumer Control as /devices/virtual/input/input18
Jul 08 16:13:03 dom0 kernel: input: sys-usb: Framework Laptop 16 Keyboard Module - ANSI Wireless Radio Control as /devices/virtual/input/input20
Jul 08 16:13:03 dom0 systemd-logind[3298]: Watching system buttons on /dev/input/event7 (sys-usb: Framework Laptop 16 Keyboard Module - ANSI System Control)
Jul 08 16:13:03 dom0 systemd-logind[3298]: Watching system buttons on /dev/input/event8 (sys-usb: Framework Laptop 16 Keyboard Module - ANSI Consumer Control)
Jul 08 16:13:03 dom0 systemd-logind[3298]: Watching system buttons on /dev/input/event6 (sys-usb: Framework Laptop 16 Keyboard Module - ANSI Keyboard)
Jul 08 16:13:03 dom0 runuser[7956]: pam_unix(runuser:session): session closed for user admin
Jul 08 16:13:03 dom0 audit[7956]: USER_END pid=7956 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:03 dom0 audit[7956]: CRED_DISP pid=7956 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:03 dom0 kernel: xen-blkback: backend/vbd/8/51712: using 2 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:13:03 dom0 kernel: xen-blkback: backend/vbd/8/51728: using 2 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:13:03 dom0 kernel: xen-blkback: backend/vbd/8/51744: using 2 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:13:03 dom0 kernel: xen-blkback: backend/vbd/8/51760: using 2 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:13:04 dom0 kernel: loop8: detected capacity change from 0 to 1399816
Jul 08 16:13:04 dom0 qubesd[4330]: vm.sys-firewall: Setting Qubes DB info for the VM
Jul 08 16:13:04 dom0 qubesd[4330]: vm.sys-firewall: Starting Qubes DB
Jul 08 16:13:04 dom0 audit[8919]: CRED_ACQ pid=8919 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:04 dom0 runuser[8919]: pam_unix(runuser:session): session opened for user admin(uid=1000) by (uid=0)
Jul 08 16:13:04 dom0 audit[8919]: USER_START pid=8919 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:04 dom0 runuser[8919]: pam_unix(runuser:session): session closed for user admin
Jul 08 16:13:04 dom0 audit[8919]: USER_END pid=8919 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:04 dom0 audit[8919]: CRED_DISP pid=8919 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:04 dom0 qubesd[4330]: vm.sys-firewall: Activating the sys-firewall VM
Jul 08 16:13:04 dom0 systemd[1]: Finished qubes-vm@sys-firewall-chocolatey.service - Start Qubes VM sys-firewall-chocolatey.
Jul 08 16:13:04 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-vm@sys-firewall-chocolatey comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:04 dom0 audit[8947]: CRED_ACQ pid=8947 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:04 dom0 runuser[8947]: pam_unix(runuser:session): session opened for user admin(uid=1000) by (uid=0)
Jul 08 16:13:04 dom0 audit[8947]: USER_START pid=8947 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:05 dom0 kernel: xen-blkback: backend/vbd/9/51712: using 2 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:13:05 dom0 kernel: xen-blkback: backend/vbd/9/51728: using 2 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:13:05 dom0 kernel: xen-blkback: backend/vbd/9/51744: using 2 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:13:05 dom0 kernel: xen-blkback: backend/vbd/9/51760: using 2 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:13:05 dom0 runuser[8468]: pam_unix(runuser:session): session closed for user admin
Jul 08 16:13:05 dom0 audit[8468]: USER_END pid=8468 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:05 dom0 audit[8468]: CRED_DISP pid=8468 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:05 dom0 kernel: kauditd_printk_skb: 42 callbacks suppressed
Jul 08 16:13:05 dom0 kernel: audit: type=1106 audit(1752009185.703:397): pid=8468 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:05 dom0 kernel: audit: type=1104 audit(1752009185.703:398): pid=8468 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:05 dom0 systemd[1]: Finished qubes-vm@sys-firewall-localnet.service - Start Qubes VM sys-firewall-localnet.
Jul 08 16:13:05 dom0 kernel: audit: type=1130 audit(1752009185.748:399): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-vm@sys-firewall-localnet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:05 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-vm@sys-firewall-localnet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:06 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.GetDate+nanoseconds: sys-gui -> @default: allowed to dom0
Jul 08 16:13:07 dom0 runuser[8947]: pam_unix(runuser:session): session closed for user admin
Jul 08 16:13:07 dom0 audit[8947]: USER_END pid=8947 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:07 dom0 audit[8947]: CRED_DISP pid=8947 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:07 dom0 kernel: audit: type=1106 audit(1752009187.516:400): pid=8947 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:07 dom0 kernel: audit: type=1104 audit(1752009187.516:401): pid=8947 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:07 dom0 systemd[1]: Finished qubes-vm@sys-firewall.service - Start Qubes VM sys-firewall.
Jul 08 16:13:07 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-vm@sys-firewall comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:07 dom0 systemd[1]: Reached target multi-user.target - Multi-User System.
Jul 08 16:13:07 dom0 systemd[1]: Reached target graphical.target - Graphical Interface.
Jul 08 16:13:07 dom0 kernel: audit: type=1130 audit(1752009187.557:402): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-vm@sys-firewall comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:07 dom0 systemd[1]: Starting systemd-update-utmp-runlevel.service - Record Runlevel Change in UTMP...
Jul 08 16:13:07 dom0 audit[8990]: SYSTEM_RUNLEVEL pid=8990 uid=0 auid=4294967295 ses=4294967295 msg='old-level=N new-level=5 comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:07 dom0 kernel: audit: type=1129 audit(1752009187.582:403): pid=8990 uid=0 auid=4294967295 ses=4294967295 msg='old-level=N new-level=5 comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:07 dom0 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully.
Jul 08 16:13:07 dom0 systemd[1]: Finished systemd-update-utmp-runlevel.service - Record Runlevel Change in UTMP.
Jul 08 16:13:07 dom0 systemd[1]: Startup finished in 9.652s (firmware) + 6.773s (loader) + 1.337s (kernel) + 18.647s (initrd) + 25.292s (userspace) = 1min 1.703s.
Jul 08 16:13:07 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-update-utmp-runlevel comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:07 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-update-utmp-runlevel comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:07 dom0 kernel: audit: type=1130 audit(1752009187.585:404): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-update-utmp-runlevel comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:07 dom0 kernel: audit: type=1131 audit(1752009187.585:405): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-update-utmp-runlevel comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:15 dom0 audit[8424]: USER_AUTH pid=8424 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:authentication grantors=pam_usertype,pam_localuser,pam_unix acct="admin" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:13:15 dom0 audit[8424]: USER_ACCT pid=8424 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="admin" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:13:15 dom0 kernel: audit: type=1100 audit(1752009195.607:406): pid=8424 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:authentication grantors=pam_usertype,pam_localuser,pam_unix acct="admin" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:13:15 dom0 kernel: audit: type=1101 audit(1752009195.607:407): pid=8424 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="admin" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:13:15 dom0 systemd[1]: Stopping session-c1.scope - Session c1 of User lightdm...
Jul 08 16:13:15 dom0 lightdm[8295]: pam_unix(lightdm-greeter:session): session closed for user lightdm
Jul 08 16:13:15 dom0 audit[8295]: USER_END pid=8295 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_unix,pam_systemd acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:13:15 dom0 audit[8295]: CRED_DISP pid=8295 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_env,pam_permit acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:13:15 dom0 kernel: audit: type=1106 audit(1752009195.669:408): pid=8295 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_unix,pam_systemd acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:13:15 dom0 kernel: audit: type=1104 audit(1752009195.669:409): pid=8295 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_env,pam_permit acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:13:15 dom0 systemd[1]: session-c1.scope: Deactivated successfully.
Jul 08 16:13:15 dom0 systemd[1]: Stopped session-c1.scope - Session c1 of User lightdm.
Jul 08 16:13:15 dom0 systemd-logind[3298]: Removed session c1.
Jul 08 16:13:15 dom0 audit[8424]: CRED_ACQ pid=8424 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_localuser,pam_unix acct="admin" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:13:15 dom0 audit[8424]: SYSCALL arch=c000003e syscall=1 success=yes exit=4 a0=8 a1=7ffe2e54c580 a2=4 a3=7ffe2e54c294 items=0 ppid=7963 pid=8424 auid=1000 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=2 comm="lightdm" exe="/usr/sbin/lightdm" key=(null)
Jul 08 16:13:15 dom0 audit: PROCTITLE proctitle=6C69676874646D002D2D73657373696F6E2D6368696C64003133003230
Jul 08 16:13:15 dom0 kernel: audit: type=1103 audit(1752009195.674:410): pid=8424 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_localuser,pam_unix acct="admin" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:13:15 dom0 kernel: audit: type=1006 audit(1752009195.674:411): pid=8424 uid=0 old-auid=4294967295 auid=1000 tty=(none) old-ses=4294967295 ses=2 res=1
Jul 08 16:13:15 dom0 kernel: audit: type=1300 audit(1752009195.674:411): arch=c000003e syscall=1 success=yes exit=4 a0=8 a1=7ffe2e54c580 a2=4 a3=7ffe2e54c294 items=0 ppid=7963 pid=8424 auid=1000 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=2 comm="lightdm" exe="/usr/sbin/lightdm" key=(null)
Jul 08 16:13:15 dom0 kernel: audit: type=1327 audit(1752009195.674:411): proctitle=6C69676874646D002D2D73657373696F6E2D6368696C64003133003230
Jul 08 16:13:15 dom0 systemd[1]: Created slice user-1000.slice - User Slice of UID 1000.
Jul 08 16:13:15 dom0 systemd[1]: Starting user-runtime-dir@1000.service - User Runtime Directory /run/user/1000...
Jul 08 16:13:15 dom0 systemd-logind[3298]: New session 2 of user admin.
Jul 08 16:13:15 dom0 systemd[1]: Finished user-runtime-dir@1000.service - User Runtime Directory /run/user/1000.
Jul 08 16:13:15 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@1000 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:15 dom0 kernel: audit: type=1130 audit(1752009195.695:412): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@1000 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:15 dom0 systemd[1]: Starting user@1000.service - User Manager for UID 1000...
Jul 08 16:13:15 dom0 (systemd)[8996]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory
Jul 08 16:13:15 dom0 (systemd)[8996]: PAM adding faulty module: /usr/lib64/security/pam_sss.so
Jul 08 16:13:15 dom0 (systemd)[8996]: pam_systemd_home(systemd-user:account): systemd-homed is not available: Could not activate remote peer: activation request failed: unknown unit.
Jul 08 16:13:15 dom0 audit[8996]: USER_ACCT pid=8996 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_unix acct="admin" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:15 dom0 audit[8996]: CRED_ACQ pid=8996 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=? acct="admin" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
Jul 08 16:13:15 dom0 audit[8996]: SYSCALL arch=c000003e syscall=1 success=yes exit=4 a0=8 a1=7fff893bb3a0 a2=4 a3=7fff893bb0b4 items=0 ppid=1 pid=8996 auid=1000 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=3 comm="(systemd)" exe="/usr/lib/systemd/systemd" key=(null)
Jul 08 16:13:15 dom0 audit: PROCTITLE proctitle="(systemd)"
Jul 08 16:13:15 dom0 kernel: audit: type=1101 audit(1752009195.703:413): pid=8996 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_unix acct="admin" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:15 dom0 (systemd)[8996]: pam_unix(systemd-user:session): session opened for user admin(uid=1000) by (uid=0)
Jul 08 16:13:15 dom0 audit[8996]: USER_START pid=8996 uid=0 auid=1000 ses=3 msg='op=PAM:session_open grantors=pam_selinux,pam_selinux,pam_loginuid,pam_namespace,pam_systemd_home,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="admin" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:16 dom0 systemd[8996]: Queued start job for default target default.target.
Jul 08 16:13:16 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user@1000 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:16 dom0 systemd[8996]: Created slice app.slice - User Application Slice.
Jul 08 16:13:16 dom0 lightdm[8424]: pam_unix(lightdm:session): session opened for user admin(uid=1000) by (uid=0)
Jul 08 16:13:16 dom0 systemd[8996]: Created slice session.slice - User Core Session Slice.
Jul 08 16:13:16 dom0 audit[8424]: USER_START pid=8424 uid=0 auid=1000 ses=2 msg='op=PAM:session_open grantors=pam_selinux,pam_loginuid,pam_selinux,pam_keyinit,pam_namespace,pam_keyinit,pam_limits,pam_systemd,pam_unix,pam_lastlog,pam_umask,pam_lastlog acct="admin" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:13:16 dom0 systemd[8996]: Started grub-boot-success.timer - Mark boot as successful after the user session has run 2 minutes.
Jul 08 16:13:16 dom0 systemd[8996]: Started systemd-tmpfiles-clean.timer - Daily Cleanup of User's Temporary Directories.
Jul 08 16:13:16 dom0 audit[8424]: USER_LOGIN pid=8424 uid=0 auid=1000 ses=2 msg='op=login id=1000 exe="/usr/sbin/lightdm" hostname=dom0 addr=? terminal=/dev/tty1 res=success'
Jul 08 16:13:16 dom0 systemd[8996]: Reached target paths.target - Paths.
Jul 08 16:13:16 dom0 systemd[8996]: Reached target timers.target - Timers.
Jul 08 16:13:16 dom0 systemd[8996]: Starting dbus.socket - D-Bus User Message Bus Socket...
Jul 08 16:13:16 dom0 systemd[8996]: Listening on pipewire-pulse.socket - PipeWire PulseAudio.
Jul 08 16:13:16 dom0 systemd[8996]: Listening on pipewire.socket - PipeWire Multimedia System Sockets.
Jul 08 16:13:16 dom0 systemd[8996]: Listening on ssh-agent.socket - OpenSSH key agent.
Jul 08 16:13:16 dom0 systemd[8996]: Starting systemd-tmpfiles-setup.service - Create User's Volatile Files and Directories...
Jul 08 16:13:16 dom0 systemd[8996]: Finished systemd-tmpfiles-setup.service - Create User's Volatile Files and Directories.
Jul 08 16:13:16 dom0 systemd[8996]: Listening on dbus.socket - D-Bus User Message Bus Socket.
Jul 08 16:13:16 dom0 systemd[8996]: Reached target sockets.target - Sockets.
Jul 08 16:13:16 dom0 systemd[8996]: Reached target basic.target - Basic System.
Jul 08 16:13:16 dom0 systemd[1]: Started user@1000.service - User Manager for UID 1000.
Jul 08 16:13:16 dom0 systemd[1]: Started session-2.scope - Session 2 of User admin.
Jul 08 16:13:16 dom0 systemd[8996]: Started pipewire.service - PipeWire Multimedia Service.
Jul 08 16:13:16 dom0 systemd[8996]: Started wireplumber.service - Multimedia Service Session Manager.
Jul 08 16:13:16 dom0 systemd[8996]: Started pipewire-pulse.service - PipeWire PulseAudio.
Jul 08 16:13:16 dom0 systemd[8996]: Reached target default.target - Main User Target.
Jul 08 16:13:16 dom0 systemd[8996]: Startup finished in 655ms.
Jul 08 16:13:16 dom0 systemd[8996]: Started dbus-daemon.service - D-Bus User Message Bus.
Jul 08 16:13:16 dom0 rtkit-daemon[8325]: Successfully made thread 9004 of process 9004 (/usr/bin/pipewire) owned by '1000' high priority at nice level -11.
Jul 08 16:13:16 dom0 rtkit-daemon[8325]: Successfully made thread 9005 of process 9005 (/usr/bin/wireplumber) owned by '1000' high priority at nice level -11.
Jul 08 16:13:16 dom0 rtkit-daemon[8325]: Successfully made thread 9017 of process 9005 (/usr/bin/wireplumber) owned by '1000' RT at priority 20.
Jul 08 16:13:16 dom0 rtkit-daemon[8325]: Successfully made thread 9022 of process 9004 (/usr/bin/pipewire) owned by '1000' RT at priority 20.
Jul 08 16:13:16 dom0 wireplumber[9005]: Failed to set scheduler settings: Operation not permitted
Jul 08 16:13:16 dom0 rtkit-daemon[8325]: Successfully made thread 9006 of process 9006 (/usr/bin/pipewire) owned by '1000' high priority at nice level -11.
Jul 08 16:13:16 dom0 rtkit-daemon[8325]: Successfully made thread 9025 of process 9006 (/usr/bin/pipewire) owned by '1000' RT at priority 20.
Jul 08 16:13:16 dom0 wireplumber[9005]: SPA handle 'api.libcamera.enum.manager' could not be loaded; is it installed?
Jul 08 16:13:16 dom0 wireplumber[9005]: PipeWire's libcamera SPA missing or broken. libcamera not supported.
Jul 08 16:13:16 dom0 wireplumber[9005]: GetManagedObjects() failed: org.freedesktop.DBus.Error.NameHasNoOwner
Jul 08 16:13:16 dom0 dbus-daemon[9011]: [session uid=1000 pid=9011] Activating via systemd: service name='org.a11y.Bus' unit='at-spi-dbus-bus.service' requested by ':1.9' (uid=1000 pid=9007 comm="xfce4-session")
Jul 08 16:13:16 dom0 systemd[8996]: Starting at-spi-dbus-bus.service - Accessibility services bus...
Jul 08 16:13:16 dom0 dbus-daemon[9011]: [session uid=1000 pid=9011] Successfully activated service 'org.a11y.Bus'
Jul 08 16:13:16 dom0 systemd[8996]: Started at-spi-dbus-bus.service - Accessibility services bus.
Jul 08 16:13:16 dom0 at-spi-bus-launcher[9074]: Policy to allow eavesdropping in /usr/share/defaults/at-spi2/accessibility.conf +15: Eavesdropping is deprecated and ignored
Jul 08 16:13:16 dom0 at-spi-bus-launcher[9074]: Policy to allow eavesdropping in /usr/share/defaults/at-spi2/accessibility.conf +17: Eavesdropping is deprecated and ignored
Jul 08 16:13:16 dom0 dbus-broker-launch[9074]: Ready
Jul 08 16:13:16 dom0 dbus-daemon[9011]: [session uid=1000 pid=9011] Activating service name='org.xfce.Xfconf' requested by ':1.12' (uid=1000 pid=9007 comm="xfce4-session")
Jul 08 16:13:16 dom0 dbus-daemon[9011]: [session uid=1000 pid=9011] Successfully activated service 'org.xfce.Xfconf'
Jul 08 16:13:16 dom0 systemd[8996]: Created slice app-dbus\x2d:1.11\x2dorg.a11y.atspi.Registry.slice - Slice /app/dbus-:1.11-org.a11y.atspi.Registry.
Jul 08 16:13:16 dom0 systemd[8996]: Started dbus-:1.11-org.a11y.atspi.Registry@0.service.
Jul 08 16:13:16 dom0 at-spi2-registryd[9084]: SpiRegistry daemon is running with well-known name - org.a11y.atspi.Registry
Jul 08 16:13:16 dom0 dbus-daemon[9011]: [session uid=1000 pid=9011] Activating via systemd: service name='org.gtk.vfs.Daemon' unit='gvfs-daemon.service' requested by ':1.15' (uid=1000 pid=9092 comm="xfwm4 --display :0.0 --sm-client-id 2f1b1da50-4881")
Jul 08 16:13:16 dom0 systemd[8996]: Starting gvfs-daemon.service - Virtual filesystem service...
Jul 08 16:13:16 dom0 dbus-daemon[9011]: [session uid=1000 pid=9011] Successfully activated service 'org.gtk.vfs.Daemon'
Jul 08 16:13:16 dom0 systemd[8996]: Started gvfs-daemon.service - Virtual filesystem service.
Jul 08 16:13:16 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.GetDate+nanoseconds: sys-firewall-localnet -> @default: allowed to dom0
Jul 08 16:13:18 dom0 systemd[1]: /usr/lib/systemd/system/qubes-suspend.service:9: Standard output type syslog is obsolete, automatically updating to journal. Please update your unit file, and consider removing the setting altogether.
Jul 08 16:13:18 dom0 pkexec[9253]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory
Jul 08 16:13:18 dom0 pkexec[9253]: PAM adding faulty module: /usr/lib64/security/pam_sss.so
Jul 08 16:13:18 dom0 pkexec[9253]: pam_unix(polkit-1:session): session opened for user root(uid=0) by (uid=1000)
Jul 08 16:13:18 dom0 audit[9253]: USER_START pid=9253 uid=1000 auid=1000 ses=2 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/pkexec" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:18 dom0 pkexec[9253]: admin: Executing command [USER=root] [TTY=unknown] [CWD=/home/admin] [COMMAND=/usr/sbin/xfpm-power-backlight-helper --set-brightness-switch 0]
Jul 08 16:13:18 dom0 pkexec[9306]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory
Jul 08 16:13:18 dom0 pkexec[9306]: PAM adding faulty module: /usr/lib64/security/pam_sss.so
Jul 08 16:13:18 dom0 pkexec[9306]: pam_unix(polkit-1:session): session opened for user root(uid=0) by (uid=1000)
Jul 08 16:13:18 dom0 audit[9306]: USER_START pid=9306 uid=1000 auid=1000 ses=2 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/pkexec" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:18 dom0 pkexec[9306]: admin: Executing command [USER=root] [TTY=unknown] [CWD=/home/admin] [COMMAND=/usr/sbin/xfpm-power-backlight-helper --set-brightness-switch 0]
Jul 08 16:13:18 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.GetDate+nanoseconds: sys-firewall -> @default: allowed to dom0
Jul 08 16:13:18 dom0 systemd[8996]: Created slice app-qubes\x2dwidget.slice - Slice /app/qubes-widget.
Jul 08 16:13:18 dom0 systemd[8996]: Started qubes-widget@qui-updates.service - Qubes Widget service.
Jul 08 16:13:18 dom0 systemd[8996]: Started qubes-widget@qui-clipboard.service - Qubes Widget service.
Jul 08 16:13:18 dom0 systemd[8996]: Started qubes-widget@qui-disk-space.service - Qubes Widget service.
Jul 08 16:13:18 dom0 systemd[8996]: Started qubes-widget@qui-domains.service - Qubes Widget service.
Jul 08 16:13:18 dom0 systemd[8996]: Started qubes-widget@qui-devices.service - Qubes Widget service.
Jul 08 16:13:18 dom0 systemd[8996]: Starting qubes-app-menu.service - Qubes Application Menu...
Jul 08 16:13:18 dom0 polkitd[3327]: Registered Authentication Agent for unix-session:2 (system bus name :1.77 [/usr/libexec/xfce-polkit], object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale en_US.utf8)
Jul 08 16:13:18 dom0 sudo[9444]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory
Jul 08 16:13:18 dom0 sudo[9444]: PAM adding faulty module: /usr/lib64/security/pam_sss.so
Jul 08 16:13:18 dom0 audit[9444]: USER_ACCT pid=9444 uid=1000 auid=1000 ses=2 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="admin" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:18 dom0 audit[9444]: USER_CMD pid=9444 uid=1000 auid=1000 ses=2 msg='cwd="/home/admin" cmd=2F62696E2F73797374656D63746C202D2D6E6F2D626C6F636B2073746172742071756265732D696E7075742D73656E6465722D7461626C6574406576656E74342E73657276696365 exe="/usr/bin/sudo" terminal=? res=success'
Jul 08 16:13:18 dom0 sudo[9444]: admin : PWD=/home/admin ; USER=root ; COMMAND=/bin/systemctl --no-block start qubes-input-sender-tablet@event4.service
Jul 08 16:13:18 dom0 audit[9444]: CRED_REFR pid=9444 uid=1000 auid=1000 ses=2 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:18 dom0 sudo[9444]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000)
Jul 08 16:13:18 dom0 audit[9444]: USER_START pid=9444 uid=1000 auid=1000 ses=2 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:18 dom0 systemd[1]: Created slice system-qubes\x2dinput\x2dsender\x2dtablet.slice - Slice /system/qubes-input-sender-tablet.
Jul 08 16:13:18 dom0 sudo[9444]: pam_unix(sudo:session): session closed for user root
Jul 08 16:13:18 dom0 audit[9444]: USER_END pid=9444 uid=1000 auid=1000 ses=2 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:18 dom0 audit[9444]: CRED_DISP pid=9444 uid=1000 auid=1000 ses=2 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:19 dom0 systemd[1]: Started qubes-input-sender-tablet@event4.service - Qubes input proxy sender (tablet/touchscreen).
Jul 08 16:13:19 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-tablet@event4 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:19 dom0 qubes-input-sender[9446]: Device /dev/input/event4 is already in dom0
Jul 08 16:13:19 dom0 systemd[1]: qubes-input-sender-tablet@event4.service: Deactivated successfully.
Jul 08 16:13:19 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-tablet@event4 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:19 dom0 sudo[9459]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory
Jul 08 16:13:19 dom0 sudo[9459]: PAM adding faulty module: /usr/lib64/security/pam_sss.so
Jul 08 16:13:19 dom0 audit[9459]: USER_ACCT pid=9459 uid=1000 auid=1000 ses=2 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="admin" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:19 dom0 sudo[9459]: admin : PWD=/home/admin ; USER=root ; COMMAND=/bin/systemctl --no-block start qubes-input-sender-mouse@event3.service
Jul 08 16:13:19 dom0 audit[9459]: USER_CMD pid=9459 uid=1000 auid=1000 ses=2 msg='cwd="/home/admin" cmd=2F62696E2F73797374656D63746C202D2D6E6F2D626C6F636B2073746172742071756265732D696E7075742D73656E6465722D6D6F757365406576656E74332E73657276696365 exe="/usr/bin/sudo" terminal=? res=success'
Jul 08 16:13:19 dom0 audit[9459]: CRED_REFR pid=9459 uid=1000 auid=1000 ses=2 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:19 dom0 audit[9459]: USER_START pid=9459 uid=1000 auid=1000 ses=2 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:19 dom0 sudo[9459]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000)
Jul 08 16:13:19 dom0 systemd[1]: Created slice system-qubes\x2dinput\x2dsender\x2dmouse.slice - Slice /system/qubes-input-sender-mouse.
Jul 08 16:13:19 dom0 systemd[1]: Started qubes-input-sender-mouse@event3.service - Qubes input proxy sender (mouse).
Jul 08 16:13:19 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-mouse@event3 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:19 dom0 qubes-input-sender[9471]: Device /dev/input/event3 is already in dom0
Jul 08 16:13:19 dom0 systemd[1]: qubes-input-sender-mouse@event3.service: Deactivated successfully.
Jul 08 16:13:19 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-mouse@event3 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:19 dom0 audit[9459]: USER_END pid=9459 uid=1000 auid=1000 ses=2 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:19 dom0 sudo[9459]: pam_unix(sudo:session): session closed for user root
Jul 08 16:13:19 dom0 audit[9459]: CRED_DISP pid=9459 uid=1000 auid=1000 ses=2 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:19 dom0 systemd[8996]: Started qubes-app-menu.service - Qubes Application Menu.
Jul 08 16:13:19 dom0 sudo[9481]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory
Jul 08 16:13:19 dom0 sudo[9481]: PAM adding faulty module: /usr/lib64/security/pam_sss.so
Jul 08 16:13:19 dom0 audit[9481]: USER_ACCT pid=9481 uid=1000 auid=1000 ses=2 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="admin" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:19 dom0 audit[9481]: USER_CMD pid=9481 uid=1000 auid=1000 ses=2 msg='cwd="/home/admin" cmd=2F62696E2F73797374656D63746C202D2D6E6F2D626C6F636B2073746172742071756265732D696E7075742D73656E6465722D6B6579626F617264406576656E74322E73657276696365 exe="/usr/bin/sudo" terminal=? res=success'
Jul 08 16:13:19 dom0 sudo[9481]: admin : PWD=/home/admin ; USER=root ; COMMAND=/bin/systemctl --no-block start qubes-input-sender-keyboard@event2.service
Jul 08 16:13:19 dom0 audit[9481]: CRED_REFR pid=9481 uid=1000 auid=1000 ses=2 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:19 dom0 sudo[9481]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000)
Jul 08 16:13:19 dom0 audit[9481]: USER_START pid=9481 uid=1000 auid=1000 ses=2 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:19 dom0 systemd[1]: Started qubes-input-sender-keyboard@event2.service - Qubes input proxy sender (keyboard).
Jul 08 16:13:19 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event2 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:19 dom0 qubes-input-sender[9486]: Device /dev/input/event2 is already in dom0
Jul 08 16:13:19 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event2 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:19 dom0 systemd[1]: qubes-input-sender-keyboard@event2.service: Deactivated successfully.
Jul 08 16:13:19 dom0 sudo[9481]: pam_unix(sudo:session): session closed for user root
Jul 08 16:13:19 dom0 audit[9481]: USER_END pid=9481 uid=1000 auid=1000 ses=2 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:19 dom0 audit[9481]: CRED_DISP pid=9481 uid=1000 auid=1000 ses=2 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:19 dom0 sudo[9503]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory
Jul 08 16:13:19 dom0 sudo[9503]: PAM adding faulty module: /usr/lib64/security/pam_sss.so
Jul 08 16:13:19 dom0 audit[9503]: USER_ACCT pid=9503 uid=1000 auid=1000 ses=2 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="admin" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:19 dom0 sudo[9503]: admin : PWD=/home/admin ; USER=root ; COMMAND=/bin/systemctl --no-block start qubes-input-sender-keyboard@event1.service
Jul 08 16:13:19 dom0 audit[9503]: USER_CMD pid=9503 uid=1000 auid=1000 ses=2 msg='cwd="/home/admin" cmd=2F62696E2F73797374656D63746C202D2D6E6F2D626C6F636B2073746172742071756265732D696E7075742D73656E6465722D6B6579626F617264406576656E74312E73657276696365 exe="/usr/bin/sudo" terminal=? res=success'
Jul 08 16:13:19 dom0 audit[9503]: CRED_REFR pid=9503 uid=1000 auid=1000 ses=2 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:19 dom0 sudo[9503]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000)
Jul 08 16:13:19 dom0 audit[9503]: USER_START pid=9503 uid=1000 auid=1000 ses=2 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:19 dom0 systemd[1]: Started qubes-input-sender-keyboard@event1.service - Qubes input proxy sender (keyboard).
Jul 08 16:13:19 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event1 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:19 dom0 qubes-input-sender[9505]: Device /dev/input/event1 is already in dom0
Jul 08 16:13:19 dom0 sudo[9503]: pam_unix(sudo:session): session closed for user root
Jul 08 16:13:19 dom0 audit[9503]: USER_END pid=9503 uid=1000 auid=1000 ses=2 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:19 dom0 audit[9503]: CRED_DISP pid=9503 uid=1000 auid=1000 ses=2 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:19 dom0 systemd[1]: qubes-input-sender-keyboard@event1.service: Deactivated successfully.
Jul 08 16:13:19 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event1 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:20 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.GetDate+nanoseconds: sys-firewall-chocolatey -> @default: allowed to dom0
Jul 08 16:13:20 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.GetDate+nanoseconds: sys-firewall-full-internet -> @default: allowed to dom0
Jul 08 16:13:21 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-firewall -> @adminvm: allowed to dom0
Jul 08 16:13:22 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-firewall-chocolatey -> @adminvm: allowed to dom0
Jul 08 16:13:22 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-firewall-localnet -> @adminvm: allowed to dom0
Jul 08 16:13:22 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-firewall-full-internet -> @adminvm: allowed to dom0
Jul 08 16:13:25 dom0 systemd[1]: Stopping user@992.service - User Manager for UID 992...
Jul 08 16:13:25 dom0 systemd[8300]: Activating special unit exit.target...
Jul 08 16:13:25 dom0 systemd[8300]: Stopped target default.target - Main User Target.
Jul 08 16:13:25 dom0 dbus-broker[8351]: Dispatched 22 messages @ 6(±8)μs / message.
Jul 08 16:13:25 dom0 systemd[8300]: Stopping at-spi-dbus-bus.service - Accessibility services bus...
Jul 08 16:13:25 dom0 systemd[8300]: Stopping dbus-:1.9-org.a11y.atspi.Registry@0.service...
Jul 08 16:13:25 dom0 systemd[8300]: Stopping dbus-daemon.service - D-Bus User Message Bus...
Jul 08 16:13:25 dom0 systemd[8300]: Stopping gvfs-daemon.service - Virtual filesystem service...
Jul 08 16:13:25 dom0 systemd[8300]: Stopping pipewire-pulse.service - PipeWire PulseAudio...
Jul 08 16:13:25 dom0 systemd[8300]: Stopped dbus-:1.9-org.a11y.atspi.Registry@0.service.
Jul 08 16:13:25 dom0 systemd[8300]: Stopped gvfs-daemon.service - Virtual filesystem service.
Jul 08 16:13:25 dom0 systemd[8300]: Stopped dbus-daemon.service - D-Bus User Message Bus.
Jul 08 16:13:25 dom0 systemd[8300]: Stopped at-spi-dbus-bus.service - Accessibility services bus.
Jul 08 16:13:25 dom0 systemd[8300]: Stopped pipewire-pulse.service - PipeWire PulseAudio.
Jul 08 16:13:25 dom0 systemd[8300]: Removed slice app-dbus\x2d:1.9\x2dorg.a11y.atspi.Registry.slice - Slice /app/dbus-:1.9-org.a11y.atspi.Registry.
Jul 08 16:13:25 dom0 systemd[8300]: Stopping wireplumber.service - Multimedia Service Session Manager...
Jul 08 16:13:25 dom0 wireplumber[8317]: stopped by signal: Terminated
Jul 08 16:13:25 dom0 wireplumber[8317]: disconnected from pipewire
Jul 08 16:13:25 dom0 systemd[8300]: Stopped wireplumber.service - Multimedia Service Session Manager.
Jul 08 16:13:25 dom0 systemd[8300]: Stopping pipewire.service - PipeWire Multimedia Service...
Jul 08 16:13:25 dom0 systemd[8300]: Stopped pipewire.service - PipeWire Multimedia Service.
Jul 08 16:13:25 dom0 systemd[8300]: Removed slice session.slice - User Core Session Slice.
Jul 08 16:13:25 dom0 systemd[8300]: Stopped target basic.target - Basic System.
Jul 08 16:13:25 dom0 systemd[8300]: Stopped target paths.target - Paths.
Jul 08 16:13:25 dom0 systemd[8300]: Stopped target sockets.target - Sockets.
Jul 08 16:13:25 dom0 systemd[8300]: Stopped target timers.target - Timers.
Jul 08 16:13:25 dom0 systemd[8300]: Stopped systemd-tmpfiles-clean.timer - Daily Cleanup of User's Temporary Directories.
Jul 08 16:13:25 dom0 systemd[8300]: Closed dbus.socket - D-Bus User Message Bus Socket.
Jul 08 16:13:25 dom0 systemd[8300]: Closed pipewire-pulse.socket - PipeWire PulseAudio.
Jul 08 16:13:25 dom0 systemd[8300]: Closed pipewire.socket - PipeWire Multimedia System Sockets.
Jul 08 16:13:25 dom0 systemd[8300]: Closed ssh-agent.socket - OpenSSH key agent.
Jul 08 16:13:25 dom0 systemd[8300]: Stopped systemd-tmpfiles-setup.service - Create User's Volatile Files and Directories.
Jul 08 16:13:25 dom0 systemd[8300]: Removed slice app.slice - User Application Slice.
Jul 08 16:13:25 dom0 systemd[8300]: Reached target shutdown.target - Shutdown.
Jul 08 16:13:25 dom0 systemd[8300]: Finished systemd-exit.service - Exit the Session.
Jul 08 16:13:25 dom0 systemd[8300]: Reached target exit.target - Exit the Session.
Jul 08 16:13:25 dom0 systemd[1]: user@992.service: Deactivated successfully.
Jul 08 16:13:25 dom0 systemd[1]: Stopped user@992.service - User Manager for UID 992.
Jul 08 16:13:25 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user@992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:25 dom0 systemd[1]: user@992.service: Consumed 1.021s CPU time.
Jul 08 16:13:25 dom0 kernel: kauditd_printk_skb: 42 callbacks suppressed
Jul 08 16:13:25 dom0 kernel: audit: type=1131 audit(1752009205.921:454): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user@992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:25 dom0 systemd[1]: Stopping user-runtime-dir@992.service - User Runtime Directory /run/user/992...
Jul 08 16:13:25 dom0 systemd[1]: run-user-992.mount: Deactivated successfully.
Jul 08 16:13:25 dom0 systemd[1]: user-runtime-dir@992.service: Deactivated successfully.
Jul 08 16:13:25 dom0 systemd[1]: Stopped user-runtime-dir@992.service - User Runtime Directory /run/user/992.
Jul 08 16:13:25 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:25 dom0 kernel: audit: type=1131 audit(1752009205.943:455): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:25 dom0 systemd[1]: Removed slice user-992.slice - User Slice of UID 992.
Jul 08 16:13:25 dom0 systemd[1]: user-992.slice: Consumed 1.978s CPU time.
Jul 08 16:13:29 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.GetDate+nanoseconds: sys-usb -> @default: allowed to dom0
Jul 08 16:13:31 dom0 systemd[1]: /usr/lib/systemd/system/qubes-suspend.service:9: Standard output type syslog is obsolete, automatically updating to journal. Please update your unit file, and consider removing the setting altogether.
Jul 08 16:13:32 dom0 systemd[1]: /usr/lib/systemd/system/qubes-suspend.service:9: Standard output type syslog is obsolete, automatically updating to journal. Please update your unit file, and consider removing the setting altogether.
Jul 08 16:13:34 dom0 pkexec[9753]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory
Jul 08 16:13:34 dom0 pkexec[9753]: PAM adding faulty module: /usr/lib64/security/pam_sss.so
Jul 08 16:13:34 dom0 pkexec[9753]: pam_unix(polkit-1:session): session opened for user root(uid=0) by (uid=1000)
Jul 08 16:13:34 dom0 audit[9753]: USER_START pid=9753 uid=1000 auid=1000 ses=2 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/pkexec" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:34 dom0 kernel: audit: type=1105 audit(1752009214.175:456): pid=9753 uid=1000 auid=1000 ses=2 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/pkexec" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:34 dom0 pkexec[9753]: admin: Executing command [USER=root] [TTY=unknown] [CWD=/home/admin] [COMMAND=/usr/sbin/xfpm-power-backlight-helper --set-brightness-switch 1]
Jul 08 16:13:34 dom0 audit[8424]: USER_LOGOUT pid=8424 uid=0 auid=1000 ses=2 msg='op=logout id=1000 exe="/usr/sbin/lightdm" hostname=dom0 addr=? terminal=/dev/tty1 res=success'
Jul 08 16:13:34 dom0 kernel: audit: type=1113 audit(1752009214.184:457): pid=8424 uid=0 auid=1000 ses=2 msg='op=logout id=1000 exe="/usr/sbin/lightdm" hostname=dom0 addr=? terminal=/dev/tty1 res=success'
Jul 08 16:13:34 dom0 lightdm[8424]: pam_unix(lightdm:session): session closed for user admin
Jul 08 16:13:34 dom0 audit[8424]: USER_END pid=8424 uid=0 auid=1000 ses=2 msg='op=PAM:session_close grantors=pam_selinux,pam_loginuid,pam_selinux,pam_keyinit,pam_namespace,pam_keyinit,pam_limits,pam_systemd,pam_unix,pam_lastlog,pam_umask,pam_lastlog acct="admin" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:13:34 dom0 audit[8424]: CRED_DISP pid=8424 uid=0 auid=1000 ses=2 msg='op=PAM:setcred grantors=pam_localuser,pam_unix acct="admin" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:13:34 dom0 kernel: audit: type=1106 audit(1752009214.186:458): pid=8424 uid=0 auid=1000 ses=2 msg='op=PAM:session_close grantors=pam_selinux,pam_loginuid,pam_selinux,pam_keyinit,pam_namespace,pam_keyinit,pam_limits,pam_systemd,pam_unix,pam_lastlog,pam_umask,pam_lastlog acct="admin" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:13:34 dom0 kernel: audit: type=1104 audit(1752009214.186:459): pid=8424 uid=0 auid=1000 ses=2 msg='op=PAM:setcred grantors=pam_localuser,pam_unix acct="admin" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:13:34 dom0 at-spi2-registryd[9084]: X connection to :0 broken (explicit kill or server shutdown).
Jul 08 16:13:34 dom0 systemd-logind[3298]: Session 2 logged out. Waiting for processes to exit.
Jul 08 16:13:34 dom0 systemd[8996]: dbus-:1.11-org.a11y.atspi.Registry@0.service: Main process exited, code=exited, status=1/FAILURE
Jul 08 16:13:34 dom0 systemd[8996]: dbus-:1.11-org.a11y.atspi.Registry@0.service: Failed with result 'exit-code'.
Jul 08 16:13:34 dom0 audit[9407]: ANOM_ABEND auid=1000 uid=1000 gid=1000 ses=2 pid=9407 comm="xss-lock" exe="/usr/bin/xss-lock" sig=5 res=1
Jul 08 16:13:34 dom0 kernel: traps: xss-lock[9407] trap int3 ip:759b37451e71 sp:7fffcadeb470 error:0 in libglib-2.0.so.0.7400.7[5ee71,759b37411000+93000]
Jul 08 16:13:34 dom0 kernel: audit: type=1701 audit(1752009214.191:460): auid=1000 uid=1000 gid=1000 ses=2 pid=9407 comm="xss-lock" exe="/usr/bin/xss-lock" sig=5 res=1
Jul 08 16:13:34 dom0 systemd[1]: Created slice system-systemd\x2dcoredump.slice - Slice /system/systemd-coredump.
Jul 08 16:13:34 dom0 audit: BPF prog-id=68 op=LOAD
Jul 08 16:13:34 dom0 kernel: audit: type=1334 audit(1752009214.214:461): prog-id=68 op=LOAD
Jul 08 16:13:34 dom0 audit: BPF prog-id=69 op=LOAD
Jul 08 16:13:34 dom0 audit: BPF prog-id=70 op=LOAD
Jul 08 16:13:34 dom0 kernel: audit: type=1334 audit(1752009214.215:462): prog-id=69 op=LOAD
Jul 08 16:13:34 dom0 kernel: audit: type=1334 audit(1752009214.215:463): prog-id=70 op=LOAD
Jul 08 16:13:34 dom0 polkitd[3327]: Unregistered Authentication Agent for unix-session:2 (system bus name :1.77, object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale en_US.utf8) (disconnected from bus)
Jul 08 16:13:34 dom0 systemd[8996]: qubes-app-menu.service: Main process exited, code=exited, status=1/FAILURE
Jul 08 16:13:34 dom0 systemd[8996]: qubes-app-menu.service: Failed with result 'exit-code'.
Jul 08 16:13:34 dom0 systemd[8996]: qubes-app-menu.service: Consumed 1.544s CPU time.
Jul 08 16:13:34 dom0 systemd[1]: Started systemd-coredump@0-9764-0.service - Process Core Dump (PID 9764/UID 0).
Jul 08 16:13:34 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-coredump@0-9764-0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:34 dom0 kernel: audit: type=1130 audit(1752009214.224:464): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-coredump@0-9764-0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:34 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-firewall-chocolatey -> @adminvm: allowed to dom0
Jul 08 16:13:34 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-firewall -> @adminvm: allowed to dom0
Jul 08 16:13:34 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-firewall-localnet -> @adminvm: allowed to dom0
Jul 08 16:13:34 dom0 systemd-coredump[9769]: Process 9407 (xss-lock) of user 1000 dumped core.
Jul 08 16:13:34 dom0 systemd[1]: systemd-coredump@0-9764-0.service: Deactivated successfully.
Jul 08 16:13:34 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-coredump@0-9764-0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:34 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-firewall-full-internet -> @adminvm: allowed to dom0
Jul 08 16:13:34 dom0 audit: BPF prog-id=70 op=UNLOAD
Jul 08 16:13:34 dom0 audit: BPF prog-id=69 op=UNLOAD
Jul 08 16:13:34 dom0 audit: BPF prog-id=68 op=UNLOAD
Jul 08 16:13:34 dom0 widget-wrapper[9767]: xhost: unable to open display ":0"
Jul 08 16:13:34 dom0 widget-wrapper[9768]: xhost: unable to open display ":0"
Jul 08 16:13:34 dom0 widget-wrapper[9765]: xhost: unable to open display ":0"
Jul 08 16:13:34 dom0 widget-wrapper[9770]: xhost: unable to open display ":0"
Jul 08 16:13:34 dom0 widget-wrapper[9766]: xhost: unable to open display ":0"
Jul 08 16:13:34 dom0 widget-wrapper[9427]: exiting with 0
Jul 08 16:13:34 dom0 widget-wrapper[9415]: exiting with 0
Jul 08 16:13:34 dom0 widget-wrapper[9417]: exiting with 0
Jul 08 16:13:34 dom0 widget-wrapper[9420]: exiting with 0
Jul 08 16:13:34 dom0 widget-wrapper[9393]: exiting with 0
Jul 08 16:13:35 dom0 systemd[8996]: qubes-app-menu.service: Scheduled restart job, restart counter is at 1.
Jul 08 16:13:35 dom0 systemd[8996]: Stopped qubes-app-menu.service - Qubes Application Menu.
Jul 08 16:13:35 dom0 systemd[8996]: qubes-app-menu.service: Consumed 1.544s CPU time.
Jul 08 16:13:35 dom0 systemd[8996]: Starting qubes-app-menu.service - Qubes Application Menu...
Jul 08 16:13:35 dom0 qubes-app-menu[9815]: No protocol specified
Jul 08 16:13:35 dom0 audit[9818]: CRED_ACQ pid=9818 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_env,pam_permit acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:13:35 dom0 lightdm[9818]: pam_unix(lightdm-greeter:session): session opened for user lightdm(uid=992) by (uid=0)
Jul 08 16:13:35 dom0 qubes-app-menu[9815]: No protocol specified
Jul 08 16:13:35 dom0 systemd[1]: Created slice user-992.slice - User Slice of UID 992.
Jul 08 16:13:35 dom0 qubes-app-menu[9815]: No protocol specified
Jul 08 16:13:35 dom0 systemd[8996]: qubes-app-menu.service: Main process exited, code=exited, status=6/NOTCONFIGURED
Jul 08 16:13:35 dom0 systemd[8996]: qubes-app-menu.service: Failed with result 'exit-code'.
Jul 08 16:13:35 dom0 systemd[8996]: Failed to start qubes-app-menu.service - Qubes Application Menu.
Jul 08 16:13:35 dom0 systemd[1]: Starting user-runtime-dir@992.service - User Runtime Directory /run/user/992...
Jul 08 16:13:35 dom0 systemd-logind[3298]: New session c2 of user lightdm.
Jul 08 16:13:35 dom0 systemd[1]: Finished user-runtime-dir@992.service - User Runtime Directory /run/user/992.
Jul 08 16:13:35 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:35 dom0 systemd[1]: Starting user@992.service - User Manager for UID 992...
Jul 08 16:13:35 dom0 (systemd)[9822]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory
Jul 08 16:13:35 dom0 (systemd)[9822]: PAM adding faulty module: /usr/lib64/security/pam_sss.so
Jul 08 16:13:35 dom0 (systemd)[9822]: pam_systemd_home(systemd-user:account): systemd-homed is not available: Could not activate remote peer: activation request failed: unknown unit.
Jul 08 16:13:35 dom0 audit[9822]: USER_ACCT pid=9822 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_unix acct="lightdm" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:35 dom0 audit[9822]: CRED_ACQ pid=9822 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=? acct="lightdm" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
Jul 08 16:13:35 dom0 audit[9822]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=8 a1=7fff893bb3a0 a2=3 a3=7fff893bb0b5 items=0 ppid=1 pid=9822 auid=992 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4 comm="(systemd)" exe="/usr/lib/systemd/systemd" key=(null)
Jul 08 16:13:35 dom0 audit: PROCTITLE proctitle="(systemd)"
Jul 08 16:13:35 dom0 (systemd)[9822]: pam_unix(systemd-user:session): session opened for user lightdm(uid=992) by (uid=0)
Jul 08 16:13:35 dom0 audit[9822]: USER_START pid=9822 uid=0 auid=992 ses=4 msg='op=PAM:session_open grantors=pam_selinux,pam_selinux,pam_loginuid,pam_namespace,pam_systemd_home,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="lightdm" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:35 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:13:36 dom0 systemd[9822]: Queued start job for default target default.target.
Jul 08 16:13:36 dom0 systemd[9822]: Created slice app.slice - User Application Slice.
Jul 08 16:13:36 dom0 systemd[9822]: Created slice session.slice - User Core Session Slice.
Jul 08 16:13:36 dom0 systemd[9822]: grub-boot-success.timer - Mark boot as successful after the user session has run 2 minutes was skipped because of a failed condition check (ConditionUser=!@system).
Jul 08 16:13:36 dom0 systemd[9822]: Started systemd-tmpfiles-clean.timer - Daily Cleanup of User's Temporary Directories.
Jul 08 16:13:36 dom0 systemd[9822]: Reached target paths.target - Paths.
Jul 08 16:13:36 dom0 systemd[9822]: Reached target timers.target - Timers.
Jul 08 16:13:36 dom0 systemd[9822]: Starting dbus.socket - D-Bus User Message Bus Socket...
Jul 08 16:13:36 dom0 systemd[9822]: Listening on pipewire-pulse.socket - PipeWire PulseAudio.
Jul 08 16:13:36 dom0 systemd[9822]: Listening on pipewire.socket - PipeWire Multimedia System Sockets.
Jul 08 16:13:36 dom0 systemd[9822]: Listening on ssh-agent.socket - OpenSSH key agent.
Jul 08 16:13:36 dom0 systemd[9822]: Starting systemd-tmpfiles-setup.service - Create User's Volatile Files and Directories...
Jul 08 16:13:36 dom0 systemd[9822]: Finished systemd-tmpfiles-setup.service - Create User's Volatile Files and Directories.
Jul 08 16:13:36 dom0 systemd[9822]: Listening on dbus.socket - D-Bus User Message Bus Socket.
Jul 08 16:13:36 dom0 systemd[9822]: Reached target sockets.target - Sockets.
Jul 08 16:13:36 dom0 systemd[9822]: Reached target basic.target - Basic System.
Jul 08 16:13:36 dom0 systemd[1]: Started user@992.service - User Manager for UID 992.
Jul 08 16:13:36 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user@992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:36 dom0 systemd[1]: Started session-c2.scope - Session c2 of User lightdm.
Jul 08 16:13:36 dom0 systemd[9822]: Started pipewire.service - PipeWire Multimedia Service.
Jul 08 16:13:36 dom0 systemd[9822]: Started wireplumber.service - Multimedia Service Session Manager.
Jul 08 16:13:36 dom0 audit[9818]: USER_START pid=9818 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_unix,pam_systemd acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:13:36 dom0 systemd[9822]: Started pipewire-pulse.service - PipeWire PulseAudio.
Jul 08 16:13:36 dom0 systemd[9822]: Reached target default.target - Main User Target.
Jul 08 16:13:36 dom0 systemd[9822]: Startup finished in 644ms.
Jul 08 16:13:36 dom0 systemd[9822]: Started dbus-daemon.service - D-Bus User Message Bus.
Jul 08 16:13:36 dom0 rtkit-daemon[8325]: Successfully made thread 9839 of process 9839 (/usr/bin/wireplumber) owned by '992' high priority at nice level -11.
Jul 08 16:13:36 dom0 rtkit-daemon[8325]: Successfully made thread 9838 of process 9838 (/usr/bin/pipewire) owned by '992' high priority at nice level -11.
Jul 08 16:13:36 dom0 rtkit-daemon[8325]: Successfully made thread 9847 of process 9839 (/usr/bin/wireplumber) owned by '992' RT at priority 20.
Jul 08 16:13:36 dom0 wireplumber[9839]: Failed to set scheduler settings: Operation not permitted
Jul 08 16:13:36 dom0 rtkit-daemon[8325]: Successfully made thread 9849 of process 9838 (/usr/bin/pipewire) owned by '992' RT at priority 20.
Jul 08 16:13:36 dom0 rtkit-daemon[8325]: Successfully made thread 9840 of process 9840 (/usr/bin/pipewire) owned by '992' high priority at nice level -11.
Jul 08 16:13:36 dom0 rtkit-daemon[8325]: Successfully made thread 9850 of process 9840 (/usr/bin/pipewire) owned by '992' RT at priority 20.
Jul 08 16:13:36 dom0 wireplumber[9839]: SPA handle 'api.libcamera.enum.manager' could not be loaded; is it installed?
Jul 08 16:13:36 dom0 wireplumber[9839]: PipeWire's libcamera SPA missing or broken. libcamera not supported.
Jul 08 16:13:36 dom0 dbus-daemon[9842]: [session uid=992 pid=9842] Activating via systemd: service name='org.a11y.Bus' unit='at-spi-dbus-bus.service' requested by ':1.7' (uid=992 pid=9841 comm="/usr/sbin/lightdm-gtk-greeter")
Jul 08 16:13:36 dom0 systemd[9822]: Starting at-spi-dbus-bus.service - Accessibility services bus...
Jul 08 16:13:36 dom0 dbus-daemon[9842]: [session uid=992 pid=9842] Successfully activated service 'org.a11y.Bus'
Jul 08 16:13:36 dom0 systemd[9822]: Started at-spi-dbus-bus.service - Accessibility services bus.
Jul 08 16:13:36 dom0 at-spi-bus-launcher[9862]: Policy to allow eavesdropping in /usr/share/defaults/at-spi2/accessibility.conf +15: Eavesdropping is deprecated and ignored
Jul 08 16:13:36 dom0 at-spi-bus-launcher[9862]: Policy to allow eavesdropping in /usr/share/defaults/at-spi2/accessibility.conf +17: Eavesdropping is deprecated and ignored
Jul 08 16:13:36 dom0 dbus-broker-launch[9862]: Ready
Jul 08 16:13:36 dom0 dbus-daemon[9842]: [session uid=992 pid=9842] Activating via systemd: service name='org.gtk.vfs.Daemon' unit='gvfs-daemon.service' requested by ':1.10' (uid=992 pid=9841 comm="/usr/sbin/lightdm-gtk-greeter")
Jul 08 16:13:36 dom0 systemd[9822]: Starting gvfs-daemon.service - Virtual filesystem service...
Jul 08 16:13:36 dom0 dbus-daemon[9842]: [session uid=992 pid=9842] Successfully activated service 'org.gtk.vfs.Daemon'
Jul 08 16:13:36 dom0 systemd[9822]: Started gvfs-daemon.service - Virtual filesystem service.
Jul 08 16:13:36 dom0 systemd[9822]: Created slice app-dbus\x2d:1.9\x2dorg.a11y.atspi.Registry.slice - Slice /app/dbus-:1.9-org.a11y.atspi.Registry.
Jul 08 16:13:36 dom0 lightdm[9892]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory
Jul 08 16:13:36 dom0 lightdm[9892]: PAM adding faulty module: /usr/lib64/security/pam_sss.so
Jul 08 16:13:36 dom0 systemd[9822]: Started dbus-:1.9-org.a11y.atspi.Registry@0.service.
Jul 08 16:13:36 dom0 wireplumber[9839]: GetManagedObjects() failed: org.freedesktop.DBus.Error.NameHasNoOwner
Jul 08 16:13:36 dom0 at-spi2-registryd[9893]: SpiRegistry daemon is running with well-known name - org.a11y.atspi.Registry
Jul 08 16:13:59 dom0 systemd[1]: systemd-hostnamed.service: Deactivated successfully.
Jul 08 16:13:59 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:59 dom0 kernel: kauditd_printk_skb: 14 callbacks suppressed
Jul 08 16:13:59 dom0 kernel: audit: type=1131 audit(1752009239.458:477): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:13:59 dom0 audit: BPF prog-id=67 op=UNLOAD
Jul 08 16:13:59 dom0 audit: BPF prog-id=66 op=UNLOAD
Jul 08 16:13:59 dom0 audit: BPF prog-id=65 op=UNLOAD
Jul 08 16:13:59 dom0 kernel: audit: type=1334 audit(1752009239.484:478): prog-id=67 op=UNLOAD
Jul 08 16:13:59 dom0 kernel: audit: type=1334 audit(1752009239.484:479): prog-id=66 op=UNLOAD
Jul 08 16:13:59 dom0 kernel: audit: type=1334 audit(1752009239.484:480): prog-id=65 op=UNLOAD
Jul 08 16:15:01 dom0 crond[7962]: (user) ERROR (getpwnam() failed - user unknown)
Jul 08 16:15:01 dom0 crond[7962]: (user) ERROR (getpwnam() failed - user unknown)
Jul 08 16:15:01 dom0 crond[7962]: (user) ERROR (getpwnam() failed - user unknown)
Jul 08 16:15:03 dom0 lightdm[10600]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory
Jul 08 16:15:03 dom0 lightdm[10600]: PAM adding faulty module: /usr/lib64/security/pam_sss.so
Jul 08 16:15:11 dom0 audit[10600]: USER_AUTH pid=10600 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:authentication grantors=pam_usertype,pam_localuser,pam_unix acct="engineer" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:15:11 dom0 audit[10600]: USER_ACCT pid=10600 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="engineer" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:15:11 dom0 kernel: audit: type=1100 audit(1752009311.008:481): pid=10600 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:authentication grantors=pam_usertype,pam_localuser,pam_unix acct="engineer" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:15:11 dom0 kernel: audit: type=1101 audit(1752009311.008:482): pid=10600 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="engineer" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:15:11 dom0 systemd[1]: Stopping session-c2.scope - Session c2 of User lightdm...
Jul 08 16:15:11 dom0 lightdm[9818]: pam_unix(lightdm-greeter:session): session closed for user lightdm
Jul 08 16:15:11 dom0 audit[9818]: USER_END pid=9818 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_unix,pam_systemd acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:15:11 dom0 kernel: audit: type=1106 audit(1752009311.059:483): pid=9818 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_unix,pam_systemd acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:15:11 dom0 kernel: audit: type=1104 audit(1752009311.059:484): pid=9818 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_env,pam_permit acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:15:11 dom0 audit[9818]: CRED_DISP pid=9818 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_env,pam_permit acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:15:11 dom0 systemd[1]: session-c2.scope: Deactivated successfully.
Jul 08 16:15:11 dom0 systemd[1]: Stopped session-c2.scope - Session c2 of User lightdm.
Jul 08 16:15:11 dom0 systemd[1]: session-c2.scope: Consumed 1.791s CPU time.
Jul 08 16:15:11 dom0 systemd-logind[3298]: Removed session c2.
Jul 08 16:15:11 dom0 audit[10600]: CRED_ACQ pid=10600 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_localuser,pam_unix acct="engineer" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:15:11 dom0 audit[10600]: SYSCALL arch=c000003e syscall=1 success=yes exit=4 a0=8 a1=7ffc0df86cd0 a2=4 a3=7ffc0df869e4 items=0 ppid=7963 pid=10600 auid=1001 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=5 comm="lightdm" exe="/usr/sbin/lightdm" key=(null)
Jul 08 16:15:11 dom0 audit: PROCTITLE proctitle=6C69676874646D002D2D73657373696F6E2D6368696C64003132003234
Jul 08 16:15:11 dom0 kernel: audit: type=1103 audit(1752009311.065:485): pid=10600 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_localuser,pam_unix acct="engineer" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:15:11 dom0 kernel: audit: type=1006 audit(1752009311.065:486): pid=10600 uid=0 old-auid=4294967295 auid=1001 tty=(none) old-ses=4294967295 ses=5 res=1
Jul 08 16:15:11 dom0 kernel: audit: type=1300 audit(1752009311.065:486): arch=c000003e syscall=1 success=yes exit=4 a0=8 a1=7ffc0df86cd0 a2=4 a3=7ffc0df869e4 items=0 ppid=7963 pid=10600 auid=1001 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=5 comm="lightdm" exe="/usr/sbin/lightdm" key=(null)
Jul 08 16:15:11 dom0 kernel: audit: type=1327 audit(1752009311.065:486): proctitle=6C69676874646D002D2D73657373696F6E2D6368696C64003132003234
Jul 08 16:15:11 dom0 systemd[1]: Created slice user-1001.slice - User Slice of UID 1001.
Jul 08 16:15:11 dom0 systemd[1]: Starting user-runtime-dir@1001.service - User Runtime Directory /run/user/1001...
Jul 08 16:15:11 dom0 systemd-logind[3298]: New session 5 of user engineer.
Jul 08 16:15:11 dom0 systemd[1]: Finished user-runtime-dir@1001.service - User Runtime Directory /run/user/1001.
Jul 08 16:15:11 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@1001 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:15:11 dom0 kernel: audit: type=1130 audit(1752009311.087:487): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@1001 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:15:11 dom0 systemd[1]: Starting user@1001.service - User Manager for UID 1001...
Jul 08 16:15:11 dom0 (systemd)[10663]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory
Jul 08 16:15:11 dom0 (systemd)[10663]: PAM adding faulty module: /usr/lib64/security/pam_sss.so
Jul 08 16:15:11 dom0 (systemd)[10663]: pam_systemd_home(systemd-user:account): systemd-homed is not available: Could not activate remote peer: activation request failed: unknown unit.
Jul 08 16:15:11 dom0 audit[10663]: USER_ACCT pid=10663 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_unix acct="engineer" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:15:11 dom0 audit[10663]: CRED_ACQ pid=10663 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=? acct="engineer" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
Jul 08 16:15:11 dom0 audit[10663]: SYSCALL arch=c000003e syscall=1 success=yes exit=4 a0=8 a1=7fff893bb3a0 a2=4 a3=7fff893bb0b4 items=0 ppid=1 pid=10663 auid=1001 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=6 comm="(systemd)" exe="/usr/lib/systemd/systemd" key=(null)
Jul 08 16:15:11 dom0 kernel: audit: type=1101 audit(1752009311.095:488): pid=10663 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_unix acct="engineer" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:15:11 dom0 audit: PROCTITLE proctitle="(systemd)"
Jul 08 16:15:11 dom0 audit[10663]: USER_START pid=10663 uid=0 auid=1001 ses=6 msg='op=PAM:session_open grantors=pam_selinux,pam_selinux,pam_loginuid,pam_namespace,pam_systemd_home,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="engineer" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:15:11 dom0 (systemd)[10663]: pam_unix(systemd-user:session): session opened for user engineer(uid=1001) by (uid=0)
Jul 08 16:15:11 dom0 systemd[10663]: Queued start job for default target default.target.
Jul 08 16:15:11 dom0 systemd[10663]: Created slice app.slice - User Application Slice.
Jul 08 16:15:11 dom0 systemd[10663]: Created slice session.slice - User Core Session Slice.
Jul 08 16:15:11 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user@1001 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:15:11 dom0 systemd[10663]: Started grub-boot-success.timer - Mark boot as successful after the user session has run 2 minutes.
Jul 08 16:15:11 dom0 systemd[10663]: Started systemd-tmpfiles-clean.timer - Daily Cleanup of User's Temporary Directories.
Jul 08 16:15:11 dom0 systemd[10663]: Reached target paths.target - Paths.
Jul 08 16:15:11 dom0 systemd[10663]: Reached target timers.target - Timers.
Jul 08 16:15:11 dom0 systemd[10663]: Starting dbus.socket - D-Bus User Message Bus Socket...
Jul 08 16:15:11 dom0 systemd[10663]: Listening on pipewire-pulse.socket - PipeWire PulseAudio.
Jul 08 16:15:11 dom0 audit[10600]: USER_START pid=10600 uid=0 auid=1001 ses=5 msg='op=PAM:session_open grantors=pam_selinux,pam_loginuid,pam_selinux,pam_keyinit,pam_namespace,pam_keyinit,pam_limits,pam_systemd,pam_unix,pam_lastlog,pam_umask,pam_lastlog acct="engineer" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:15:11 dom0 lightdm[10600]: pam_unix(lightdm:session): session opened for user engineer(uid=1001) by (uid=0)
Jul 08 16:15:11 dom0 audit[10600]: USER_LOGIN pid=10600 uid=0 auid=1001 ses=5 msg='op=login id=1001 exe="/usr/sbin/lightdm" hostname=dom0 addr=? terminal=/dev/tty1 res=success'
Jul 08 16:15:11 dom0 systemd[10663]: Listening on pipewire.socket - PipeWire Multimedia System Sockets.
Jul 08 16:15:11 dom0 systemd[10663]: Listening on ssh-agent.socket - OpenSSH key agent.
Jul 08 16:15:11 dom0 systemd[10663]: Starting systemd-tmpfiles-setup.service - Create User's Volatile Files and Directories...
Jul 08 16:15:11 dom0 systemd[10663]: Finished systemd-tmpfiles-setup.service - Create User's Volatile Files and Directories.
Jul 08 16:15:11 dom0 systemd[10663]: Listening on dbus.socket - D-Bus User Message Bus Socket.
Jul 08 16:15:11 dom0 systemd[10663]: Reached target sockets.target - Sockets.
Jul 08 16:15:11 dom0 systemd[10663]: Reached target basic.target - Basic System.
Jul 08 16:15:11 dom0 systemd[1]: Started user@1001.service - User Manager for UID 1001.
Jul 08 16:15:11 dom0 systemd[1]: Started session-5.scope - Session 5 of User engineer.
Jul 08 16:15:11 dom0 systemd[10663]: Started pipewire.service - PipeWire Multimedia Service.
Jul 08 16:15:11 dom0 systemd[10663]: Started wireplumber.service - Multimedia Service Session Manager.
Jul 08 16:15:11 dom0 systemd[10663]: Started pipewire-pulse.service - PipeWire PulseAudio.
Jul 08 16:15:11 dom0 systemd[10663]: Reached target default.target - Main User Target.
Jul 08 16:15:11 dom0 systemd[10663]: Startup finished in 638ms.
Jul 08 16:15:11 dom0 systemd[10663]: Started dbus-daemon.service - D-Bus User Message Bus.
Jul 08 16:15:11 dom0 rtkit-daemon[8325]: Successfully made thread 10676 of process 10676 (/usr/bin/wireplumber) owned by '1001' high priority at nice level -11.
Jul 08 16:15:11 dom0 rtkit-daemon[8325]: Successfully made thread 10677 of process 10677 (/usr/bin/pipewire) owned by '1001' high priority at nice level -11.
Jul 08 16:15:11 dom0 rtkit-daemon[8325]: Successfully made thread 10693 of process 10676 (/usr/bin/wireplumber) owned by '1001' RT at priority 20.
Jul 08 16:15:11 dom0 rtkit-daemon[8325]: Successfully made thread 10696 of process 10677 (/usr/bin/pipewire) owned by '1001' RT at priority 20.
Jul 08 16:15:11 dom0 wireplumber[10676]: Failed to set scheduler settings: Operation not permitted
Jul 08 16:15:11 dom0 rtkit-daemon[8325]: Successfully made thread 10675 of process 10675 (/usr/bin/pipewire) owned by '1001' high priority at nice level -11.
Jul 08 16:15:11 dom0 rtkit-daemon[8325]: Successfully made thread 10695 of process 10675 (/usr/bin/pipewire) owned by '1001' RT at priority 20.
Jul 08 16:15:11 dom0 wireplumber[10676]: SPA handle 'api.libcamera.enum.manager' could not be loaded; is it installed?
Jul 08 16:15:11 dom0 wireplumber[10676]: PipeWire's libcamera SPA missing or broken. libcamera not supported.
Jul 08 16:15:11 dom0 audit: BPF prog-id=71 op=LOAD
Jul 08 16:15:11 dom0 audit: BPF prog-id=72 op=LOAD
Jul 08 16:15:11 dom0 audit: BPF prog-id=73 op=LOAD
Jul 08 16:15:11 dom0 systemd[1]: Starting systemd-hostnamed.service - Hostname Service...
Jul 08 16:15:12 dom0 systemd[1]: Started systemd-hostnamed.service - Hostname Service.
Jul 08 16:15:12 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:15:12 dom0 wireplumber[10676]: GetManagedObjects() failed: org.freedesktop.DBus.Error.NameHasNoOwner
Jul 08 16:15:12 dom0 sudo[10743]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory
Jul 08 16:15:12 dom0 sudo[10743]: PAM adding faulty module: /usr/lib64/security/pam_sss.so
Jul 08 16:15:12 dom0 audit[10743]: USER_ACCT pid=10743 uid=1001 auid=1001 ses=5 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="engineer" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Jul 08 16:15:12 dom0 audit[10743]: USER_CMD pid=10743 uid=1001 auid=1001 ses=5 msg='cwd="/home/engineer" cmd=67726570205E7379732D6775693A202F6574632F71756265732D7379732D6775692D757365722D70617373776F726473 exe="/usr/bin/sudo" terminal=? res=success'
Jul 08 16:15:12 dom0 sudo[10743]: engineer : PWD=/home/engineer ; USER=root ; COMMAND=/usr/bin/grep ^sys-gui: /etc/qubes-sys-gui-user-passwords
Jul 08 16:15:12 dom0 audit[10743]: CRED_REFR pid=10743 uid=1001 auid=1001 ses=5 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Jul 08 16:15:12 dom0 sudo[10743]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1001)
Jul 08 16:15:12 dom0 audit[10743]: USER_START pid=10743 uid=1001 auid=1001 ses=5 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Jul 08 16:15:12 dom0 sudo[10743]: pam_unix(sudo:session): session closed for user root
Jul 08 16:15:12 dom0 audit[10743]: USER_END pid=10743 uid=1001 auid=1001 ses=5 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Jul 08 16:15:12 dom0 audit[10743]: CRED_DISP pid=10743 uid=1001 auid=1001 ses=5 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Jul 08 16:15:15 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:15 dom0 qubesd[4330]: warning: !compat-4.0 directive in file /etc/qubes/policy.d/35-compat.policy line 16 is transitional and will be deprecated
Jul 08 16:15:15 dom0 qubesd[4330]: ignoring /etc/qubes-rpc/policy/include (not a file)
Jul 08 16:15:15 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:15 dom0 qrexec-policy-daemon[4334]: qrexec: admin.Events+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:15 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:15 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:15 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:15 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll: sys-gui -> dom0: denied: no matching rule found
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: resolution = policy.evaluate(request)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: rule = self.find_matching_rule(request)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: raise AccessDenied("no matching rule found")
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred:
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: await call_socket_service(guivm, service, source_domain, params)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: reader, writer = await asyncio.open_unix_connection(path)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: transport, _ = await loop.create_unix_connection(
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: await self.sock_connect(sock, path)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: return await fut
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: sock.connect(address)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.List+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-secure-copy-sequence: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+template_for_dispvms: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+linux-kernel: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll: sys-gui -> dom0: denied: no matching rule found
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: resolution = policy.evaluate(request)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: rule = self.find_matching_rule(request)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: raise AccessDenied("no matching rule found")
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred:
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: await call_socket_service(guivm, service, source_domain, params)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: reader, writer = await asyncio.open_unix_connection(path)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: transport, _ = await loop.create_unix_connection(
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: await self.sock_connect(sock, path)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: return await fut
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: sock.connect(address)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+updates-available: sys-gui -> dom0: denied: no matching rule found
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: resolution = policy.evaluate(request)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: rule = self.find_matching_rule(request)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: raise AccessDenied("no matching rule found")
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred:
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: await call_socket_service(guivm, service, source_domain, params)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: reader, writer = await asyncio.open_unix_connection(path)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: transport, _ = await loop.create_unix_connection(
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: await self.sock_connect(sock, path)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: return await fut
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: sock.connect(address)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-secure-paste-sequence: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+updateable: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+os-eol: sys-gui -> dom0: denied: no matching rule found
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: resolution = policy.evaluate(request)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: rule = self.find_matching_rule(request)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: raise AccessDenied("no matching rule found")
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred:
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: await call_socket_service(guivm, service, source_domain, params)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: reader, writer = await asyncio.open_unix_connection(path)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: transport, _ = await loop.create_unix_connection(
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: await self.sock_connect(sock, path)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: return await fut
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: sock.connect(address)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+linux-kernel: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.Events+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+updates-available: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.Info+linux-kernel: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+updates-available: sys-gui -> dom0: denied: no matching rule found
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: resolution = policy.evaluate(request)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: rule = self.find_matching_rule(request)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: raise AccessDenied("no matching rule found")
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred:
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: await call_socket_service(guivm, service, source_domain, params)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: reader, writer = await asyncio.open_unix_connection(path)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: transport, _ = await loop.create_unix_connection(
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: await self.sock_connect(sock, path)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: return await fut
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: sock.connect(address)
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+os-eol: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+linux-kernel: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+servicevm: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:17 dom0 xenstored[3342]: write rate limit: domain 5 is affected
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.List+: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+template-name: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll: sys-gui -> dom0: denied: no matching rule found
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: resolution = policy.evaluate(request)
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: rule = self.find_matching_rule(request)
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: raise AccessDenied("no matching rule found")
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred:
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: await call_socket_service(guivm, service, source_domain, params)
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: reader, writer = await asyncio.open_unix_connection(path)
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: transport, _ = await loop.create_unix_connection(
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: await self.sock_connect(sock, path)
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: return await fut
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: sock.connect(address)
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+pool00: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+root: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+template_for_dispvms: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+pool00: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+updates-available: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll: sys-gui -> dom0: denied: no matching rule found
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: resolution = policy.evaluate(request)
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: rule = self.find_matching_rule(request)
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: raise AccessDenied("no matching rule found")
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred:
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: await call_socket_service(guivm, service, source_domain, params)
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: reader, writer = await asyncio.open_unix_connection(path)
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: transport, _ = await loop.create_unix_connection(
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: await self.sock_connect(sock, path)
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: return await fut
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: sock.connect(address)
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.Info+pool00: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+os-eol: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.CheckWithTemplate+gui-emulated: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+volatile: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+label: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+pool00: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.Available: sys-gui -> dom0: denied: no matching rule found
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: resolution = policy.evaluate(request)
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: rule = self.find_matching_rule(request)
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: raise AccessDenied("no matching rule found")
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred:
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: await call_socket_service(guivm, service, source_domain, params)
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: reader, writer = await asyncio.open_unix_connection(path)
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: transport, _ = await loop.create_unix_connection(
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: await self.sock_connect(sock, path)
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: return await fut
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: sock.connect(address)
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+updates-available: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.CheckWithTemplate+gui: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+kernel: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.Available: sys-gui -> dom0: denied: no matching rule found
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: resolution = policy.evaluate(request)
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: rule = self.find_matching_rule(request)
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: raise AccessDenied("no matching rule found")
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred:
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: await call_socket_service(guivm, service, source_domain, params)
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: reader, writer = await asyncio.open_unix_connection(path)
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: transport, _ = await loop.create_unix_connection(
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: await self.sock_connect(sock, path)
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: return await fut
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: sock.connect(address)
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+icon: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+varlibqubes: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.CheckWithTemplate+gui: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.Available+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+varlibqubes: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+appmenus-dispvm: sys-gui -> dom0: denied: no matching rule found
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: resolution = policy.evaluate(request)
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: rule = self.find_matching_rule(request)
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: raise AccessDenied("no matching rule found")
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred:
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: await call_socket_service(guivm, service, source_domain, params)
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: reader, writer = await asyncio.open_unix_connection(path)
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: transport, _ = await loop.create_unix_connection(
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: await self.sock_connect(sock, path)
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: return await fut
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: sock.connect(address)
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+os-eol: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.label.Get+red: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+updates-available: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll: sys-gui -> dom0: denied: no matching rule found
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: resolution = policy.evaluate(request)
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: rule = self.find_matching_rule(request)
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: raise AccessDenied("no matching rule found")
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred:
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: await call_socket_service(guivm, service, source_domain, params)
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: reader, writer = await asyncio.open_unix_connection(path)
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: transport, _ = await loop.create_unix_connection(
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: await self.sock_connect(sock, path)
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: return await fut
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: sock.connect(address)
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.Info+varlibqubes: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.label.Index+red: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+label: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+os-eol: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+varlibqubes: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+servicevm: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.CheckWithTemplate+rpc-clipboard: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.List+: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+icon: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+template-name: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+root: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-allow-fullscreen: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+updates-available: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+appmenus-dispvm: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.Available+: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-allow-fullscreen: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+template: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.Available+: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+os-eol: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-override-redirect-protection: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+volatile: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+servicevm: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.Available+: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.List+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+template-name: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+kernel: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-override-redirect-protection: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.Available+: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+updates-available: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-override-redirect: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+appmenus-dispvm: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+template: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+os-eol: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.Available+: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+updates-available: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-override-redirect: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.List+: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.Available+: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+template-name: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-allow-utf8-titles: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.Available+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+servicevm: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.Events+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-allow-utf8-titles: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.List+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+appmenus-dispvm: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.Available+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+root: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-secure-copy-sequence: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.Available+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-secure-copy-sequence: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+servicevm: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.Available+: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-secure-paste-sequence: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+volatile: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.Available+: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+kernel: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-secure-paste-sequence: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+template: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+appmenus-dispvm: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.Available+: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-windows-count-limit: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.Available+: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.List+: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-windows-count-limit: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+updates-available: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.Available+: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-trayicon-mode: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:21 dom0 systemd[1]: Stopping user@992.service - User Manager for UID 992...
Jul 08 16:15:21 dom0 systemd[9822]: Activating special unit exit.target...
Jul 08 16:15:21 dom0 systemd[9822]: Stopped target default.target - Main User Target.
Jul 08 16:15:21 dom0 dbus-broker[9863]: Dispatched 22 messages @ 6(±7)μs / message.
Jul 08 16:15:21 dom0 systemd[9822]: Stopping at-spi-dbus-bus.service - Accessibility services bus...
Jul 08 16:15:21 dom0 systemd[9822]: Stopping dbus-:1.9-org.a11y.atspi.Registry@0.service...
Jul 08 16:15:21 dom0 gvfsd[9865]: A connection to the bus can't be made
Jul 08 16:15:21 dom0 systemd[9822]: Stopping dbus-daemon.service - D-Bus User Message Bus...
Jul 08 16:15:21 dom0 systemd[9822]: Stopping gvfs-daemon.service - Virtual filesystem service...
Jul 08 16:15:21 dom0 systemd[9822]: Stopping pipewire-pulse.service - PipeWire PulseAudio...
Jul 08 16:15:21 dom0 systemd[9822]: Stopped dbus-daemon.service - D-Bus User Message Bus.
Jul 08 16:15:21 dom0 systemd[9822]: Stopped at-spi-dbus-bus.service - Accessibility services bus.
Jul 08 16:15:21 dom0 systemd[9822]: Stopped gvfs-daemon.service - Virtual filesystem service.
Jul 08 16:15:21 dom0 systemd[9822]: Stopped dbus-:1.9-org.a11y.atspi.Registry@0.service.
Jul 08 16:15:21 dom0 systemd[9822]: Stopped pipewire-pulse.service - PipeWire PulseAudio.
Jul 08 16:15:21 dom0 systemd[9822]: Removed slice app-dbus\x2d:1.9\x2dorg.a11y.atspi.Registry.slice - Slice /app/dbus-:1.9-org.a11y.atspi.Registry.
Jul 08 16:15:21 dom0 systemd[9822]: Stopping wireplumber.service - Multimedia Service Session Manager...
Jul 08 16:15:21 dom0 wireplumber[9839]: stopped by signal: Terminated
Jul 08 16:15:21 dom0 wireplumber[9839]: disconnected from pipewire
Jul 08 16:15:21 dom0 systemd[9822]: Stopped wireplumber.service - Multimedia Service Session Manager.
Jul 08 16:15:21 dom0 systemd[9822]: Stopping pipewire.service - PipeWire Multimedia Service...
Jul 08 16:15:21 dom0 systemd[9822]: Stopped pipewire.service - PipeWire Multimedia Service.
Jul 08 16:15:21 dom0 systemd[9822]: Removed slice session.slice - User Core Session Slice.
Jul 08 16:15:21 dom0 systemd[9822]: Stopped target basic.target - Basic System.
Jul 08 16:15:21 dom0 systemd[9822]: Stopped target paths.target - Paths.
Jul 08 16:15:21 dom0 systemd[9822]: Stopped target sockets.target - Sockets.
Jul 08 16:15:21 dom0 systemd[9822]: Stopped target timers.target - Timers.
Jul 08 16:15:21 dom0 systemd[9822]: Stopped systemd-tmpfiles-clean.timer - Daily Cleanup of User's Temporary Directories.
Jul 08 16:15:21 dom0 systemd[9822]: Closed dbus.socket - D-Bus User Message Bus Socket.
Jul 08 16:15:21 dom0 systemd[9822]: Closed pipewire-pulse.socket - PipeWire PulseAudio.
Jul 08 16:15:21 dom0 systemd[9822]: Closed pipewire.socket - PipeWire Multimedia System Sockets.
Jul 08 16:15:21 dom0 systemd[9822]: Closed ssh-agent.socket - OpenSSH key agent.
Jul 08 16:15:21 dom0 systemd[9822]: Stopped systemd-tmpfiles-setup.service - Create User's Volatile Files and Directories.
Jul 08 16:15:21 dom0 systemd[9822]: Removed slice app.slice - User Application Slice.
Jul 08 16:15:21 dom0 systemd[9822]: Reached target shutdown.target - Shutdown.
Jul 08 16:15:21 dom0 systemd[9822]: Finished systemd-exit.service - Exit the Session.
Jul 08 16:15:21 dom0 systemd[9822]: Reached target exit.target - Exit the Session.
Jul 08 16:15:21 dom0 systemd[1]: user@992.service: Deactivated successfully.
Jul 08 16:15:21 dom0 systemd[1]: Stopped user@992.service - User Manager for UID 992.
Jul 08 16:15:21 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user@992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:15:21 dom0 kernel: kauditd_printk_skb: 18 callbacks suppressed
Jul 08 16:15:21 dom0 kernel: audit: type=1131 audit(1752009321.174:505): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user@992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:15:21 dom0 systemd[1]: Stopping user-runtime-dir@992.service - User Runtime Directory /run/user/992...
Jul 08 16:15:21 dom0 systemd[1]: run-user-992.mount: Deactivated successfully.
Jul 08 16:15:21 dom0 systemd[1]: user-runtime-dir@992.service: Deactivated successfully.
Jul 08 16:15:21 dom0 systemd[1]: Stopped user-runtime-dir@992.service - User Runtime Directory /run/user/992.
Jul 08 16:15:21 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:15:21 dom0 kernel: audit: type=1131 audit(1752009321.197:506): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:15:21 dom0 systemd[1]: Removed slice user-992.slice - User Slice of UID 992.
Jul 08 16:15:21 dom0 systemd[1]: user-992.slice: Consumed 2.751s CPU time.
Jul 08 16:15:21 dom0 systemd[8996]: Starting grub-boot-success.service - Mark boot as successful...
Jul 08 16:15:21 dom0 systemd[8996]: Finished grub-boot-success.service - Mark boot as successful.
Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.Available+: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+servicevm: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-trayicon-mode: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.List+: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.Available+: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+appmenus-dispvm: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-startup-timeout: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+root: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.Available+: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+template: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-startup-timeout: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+servicevm: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.List+: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.Available+: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+volatile: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.CheckWithTemplate+gui-emulated: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+appmenus-dispvm: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.List: sys-gui -> dom0: denied: no matching rule found
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: resolution = policy.evaluate(request)
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: rule = self.find_matching_rule(request)
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: raise AccessDenied("no matching rule found")
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred:
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: await call_socket_service(guivm, service, source_domain, params)
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: reader, writer = await asyncio.open_unix_connection(path)
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: transport, _ = await loop.create_unix_connection(
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: await self.sock_connect(sock, path)
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: return await fut
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: sock.connect(address)
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+kernel: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.CheckWithTemplate+gui: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.List: sys-gui -> dom0: denied: no matching rule found
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: resolution = policy.evaluate(request)
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: rule = self.find_matching_rule(request)
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: raise AccessDenied("no matching rule found")
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred:
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: await call_socket_service(guivm, service, source_domain, params)
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: reader, writer = await asyncio.open_unix_connection(path)
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: transport, _ = await loop.create_unix_connection(
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: await self.sock_connect(sock, path)
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: return await fut
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: sock.connect(address)
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.CheckWithTemplate+gui: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.List: sys-gui -> dom0: denied: no matching rule found
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: resolution = policy.evaluate(request)
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: rule = self.find_matching_rule(request)
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: raise AccessDenied("no matching rule found")
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred:
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: await call_socket_service(guivm, service, source_domain, params)
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: reader, writer = await asyncio.open_unix_connection(path)
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: transport, _ = await loop.create_unix_connection(
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: await self.sock_connect(sock, path)
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: return await fut
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: sock.connect(address)
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.CheckWithTemplate+rpc-clipboard: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.List+: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-allow-fullscreen: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.List+: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-allow-fullscreen: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.List+: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-override-redirect-protection: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.List+: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+root: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-override-redirect-protection: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.List+: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-override-redirect: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.List+: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+volatile: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.List+: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-override-redirect: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+kernel: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-allow-utf8-titles: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.List+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-allow-utf8-titles: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.List+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-net -> @adminvm: allowed to sys-gui
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.List+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-secure-copy-sequence: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+label: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-secure-copy-sequence: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.List+: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.List+: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.List+: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.label.Get+red: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-secure-paste-sequence: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+root: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.List+: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-secure-paste-sequence: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-windows-count-limit: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.List+: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+volatile: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.List+: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-windows-count-limit: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+kernel: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.List+: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-trayicon-mode: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.List+: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-trayicon-mode: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+root: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.List+: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-startup-timeout: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-startup-timeout: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.List+: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+volatile: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.CheckWithTemplate+no-monitor-layout: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.Events+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+kernel: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.CheckWithTemplate+no-monitor-layout: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.SetMonitorLayout+: sys-gui -> sys-net: allowed to sys-net
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.SetMonitorLayout+: sys-gui -> sys-usb: allowed to sys-usb
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+root: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+volatile: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+kernel: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+root: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+volatile: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+kernel: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.Stats+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.Events+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:26 dom0 systemd[8996]: Started dbus-:1.11-org.a11y.atspi.Registry@1.service.
Jul 08 16:15:26 dom0 at-spi2-registryd[11516]: No protocol specified
Jul 08 16:15:26 dom0 at-spi2-registr[11516]: Could not open X display
Jul 08 16:15:26 dom0 at-spi2-registryd[11516]: SpiRegistry daemon is running with well-known name - org.a11y.atspi.Registry
Jul 08 16:15:26 dom0 at-spi2-registryd[11516]: No protocol specified
Jul 08 16:15:26 dom0 at-spi2-registr[11516]: AT-SPI: Cannot open default display
Jul 08 16:15:26 dom0 systemd[8996]: dbus-:1.11-org.a11y.atspi.Registry@1.service: Main process exited, code=exited, status=1/FAILURE
Jul 08 16:15:26 dom0 systemd[8996]: dbus-:1.11-org.a11y.atspi.Registry@1.service: Failed with result 'exit-code'.
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-usb -> @adminvm: allowed to sys-gui
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-net: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+label: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-initial-page: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-sort-running: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.Events+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:15:34 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-firewall-localnet -> @adminvm: allowed to dom0
Jul 08 16:15:34 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-firewall-chocolatey -> @adminvm: allowed to dom0
Jul 08 16:15:34 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-firewall -> @adminvm: allowed to dom0
Jul 08 16:15:34 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-firewall-full-internet -> @adminvm: allowed to dom0
Jul 08 16:15:42 dom0 systemd[1]: systemd-hostnamed.service: Deactivated successfully.
Jul 08 16:15:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:15:42 dom0 kernel: audit: type=1131 audit(1752009342.054:507): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:15:42 dom0 audit: BPF prog-id=73 op=UNLOAD
Jul 08 16:15:42 dom0 audit: BPF prog-id=72 op=UNLOAD
Jul 08 16:15:42 dom0 audit: BPF prog-id=71 op=UNLOAD
Jul 08 16:15:42 dom0 kernel: audit: type=1334 audit(1752009342.074:508): prog-id=73 op=UNLOAD
Jul 08 16:15:42 dom0 kernel: audit: type=1334 audit(1752009342.074:509): prog-id=72 op=UNLOAD
Jul 08 16:15:42 dom0 kernel: audit: type=1334 audit(1752009342.074:510): prog-id=71 op=UNLOAD
Jul 08 16:16:01 dom0 systemd[1]: Started getty@tty2.service - Getty on tty2.
Jul 08 16:16:01 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=getty@tty2 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:16:01 dom0 kernel: audit: type=1130 audit(1752009361.784:511): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=getty@tty2 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:16:01 dom0 kernel: fbcon: Taking over console
Jul 08 16:16:01 dom0 kernel: Console: switching to colour frame buffer device 320x100
Jul 08 16:16:04 dom0 login[12106]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory
Jul 08 16:16:04 dom0 login[12106]: PAM adding faulty module: /usr/lib64/security/pam_sss.so
Jul 08 16:16:10 dom0 audit[12106]: USER_AUTH pid=12106 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:authentication grantors=pam_usertype,pam_localuser,pam_unix acct="admin" exe="/usr/bin/login" hostname=dom0 addr=? terminal=/dev/tty2 res=success'
Jul 08 16:16:10 dom0 audit[12106]: USER_ACCT pid=12106 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="admin" exe="/usr/bin/login" hostname=dom0 addr=? terminal=/dev/tty2 res=success'
Jul 08 16:16:10 dom0 kernel: audit: type=1100 audit(1752009370.783:512): pid=12106 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:authentication grantors=pam_usertype,pam_localuser,pam_unix acct="admin" exe="/usr/bin/login" hostname=dom0 addr=? terminal=/dev/tty2 res=success'
Jul 08 16:16:10 dom0 kernel: audit: type=1101 audit(1752009370.783:513): pid=12106 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="admin" exe="/usr/bin/login" hostname=dom0 addr=? terminal=/dev/tty2 res=success'
Jul 08 16:16:10 dom0 audit[12106]: CRED_ACQ pid=12106 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_localuser,pam_unix acct="admin" exe="/usr/bin/login" hostname=dom0 addr=? terminal=/dev/tty2 res=success'
Jul 08 16:16:10 dom0 audit[12106]: SYSCALL arch=c000003e syscall=1 success=yes exit=4 a0=3 a1=7ffeca7d8540 a2=4 a3=7ffeca7d8254 items=0 ppid=1 pid=12106 auid=1000 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=1000 fsgid=0 tty=tty2 ses=7 comm="login" exe="/usr/bin/login" key=(null)
Jul 08 16:16:10 dom0 audit: PROCTITLE proctitle=2F62696E2F6C6F67696E002D70002D2D
Jul 08 16:16:10 dom0 kernel: audit: type=1103 audit(1752009370.784:514): pid=12106 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_localuser,pam_unix acct="admin" exe="/usr/bin/login" hostname=dom0 addr=? terminal=/dev/tty2 res=success'
Jul 08 16:16:10 dom0 kernel: audit: type=1006 audit(1752009370.784:515): pid=12106 uid=0 old-auid=4294967295 auid=1000 tty=tty2 old-ses=4294967295 ses=7 res=1
Jul 08 16:16:10 dom0 kernel: audit: type=1300 audit(1752009370.784:515): arch=c000003e syscall=1 success=yes exit=4 a0=3 a1=7ffeca7d8540 a2=4 a3=7ffeca7d8254 items=0 ppid=1 pid=12106 auid=1000 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=1000 fsgid=0 tty=tty2 ses=7 comm="login" exe="/usr/bin/login" key=(null)
Jul 08 16:16:10 dom0 kernel: audit: type=1327 audit(1752009370.784:515): proctitle=2F62696E2F6C6F67696E002D70002D2D
Jul 08 16:16:10 dom0 systemd-logind[3298]: New session 7 of user admin.
Jul 08 16:16:10 dom0 systemd[1]: Started session-7.scope - Session 7 of User admin.
Jul 08 16:16:10 dom0 login[12106]: pam_unix(login:session): session opened for user admin(uid=1000) by LOGIN(uid=0)
Jul 08 16:16:10 dom0 audit[12106]: USER_START pid=12106 uid=0 auid=1000 ses=7 msg='op=PAM:session_open grantors=pam_selinux,pam_loginuid,pam_selinux,pam_namespace,pam_keyinit,pam_keyinit,pam_limits,pam_systemd,pam_unix,pam_umask,pam_lastlog acct="admin" exe="/usr/bin/login" hostname=dom0 addr=? terminal=/dev/tty2 res=success'
Jul 08 16:16:10 dom0 audit[12106]: CRED_REFR pid=12106 uid=0 auid=1000 ses=7 msg='op=PAM:setcred grantors=pam_localuser,pam_unix acct="admin" exe="/usr/bin/login" hostname=dom0 addr=? terminal=/dev/tty2 res=success'
Jul 08 16:16:10 dom0 audit[12106]: USER_LOGIN pid=12106 uid=0 auid=1000 ses=7 msg='op=login id=1000 exe="/usr/bin/login" hostname=dom0 addr=? terminal=tty2 res=success'
Jul 08 16:16:10 dom0 login[12106]: LOGIN ON tty2 BY admin
Jul 08 16:16:10 dom0 kernel: audit: type=1105 audit(1752009370.816:516): pid=12106 uid=0 auid=1000 ses=7 msg='op=PAM:session_open grantors=pam_selinux,pam_loginuid,pam_selinux,pam_namespace,pam_keyinit,pam_keyinit,pam_limits,pam_systemd,pam_unix,pam_umask,pam_lastlog acct="admin" exe="/usr/bin/login" hostname=dom0 addr=? terminal=/dev/tty2 res=success'
Jul 08 16:16:10 dom0 kernel: audit: type=1110 audit(1752009370.816:517): pid=12106 uid=0 auid=1000 ses=7 msg='op=PAM:setcred grantors=pam_localuser,pam_unix acct="admin" exe="/usr/bin/login" hostname=dom0 addr=? terminal=/dev/tty2 res=success'
Jul 08 16:16:10 dom0 kernel: audit: type=1112 audit(1752009370.816:518): pid=12106 uid=0 auid=1000 ses=7 msg='op=login id=1000 exe="/usr/bin/login" hostname=dom0 addr=? terminal=tty2 res=success'
Jul 08 16:16:10 dom0 audit: BPF prog-id=74 op=LOAD
Jul 08 16:16:10 dom0 audit: BPF prog-id=75 op=LOAD
Jul 08 16:16:10 dom0 audit: BPF prog-id=76 op=LOAD
Jul 08 16:16:10 dom0 kernel: audit: type=1334 audit(1752009370.834:519): prog-id=74 op=LOAD
Jul 08 16:16:10 dom0 systemd[1]: Starting systemd-hostnamed.service - Hostname Service...
Jul 08 16:16:10 dom0 systemd[1]: Started systemd-hostnamed.service - Hostname Service.
Jul 08 16:16:10 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:16:11 dom0 wireplumber[9005]: GetManagedObjects() failed: org.freedesktop.DBus.Error.NameHasNoOwner
Jul 08 16:16:40 dom0 systemd[1]: systemd-hostnamed.service: Deactivated successfully.
Jul 08 16:16:40 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:16:40 dom0 kernel: kauditd_printk_skb: 3 callbacks suppressed
Jul 08 16:16:40 dom0 kernel: audit: type=1131 audit(1752009400.914:523): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:16:40 dom0 audit: BPF prog-id=76 op=UNLOAD
Jul 08 16:16:40 dom0 audit: BPF prog-id=75 op=UNLOAD
Jul 08 16:16:40 dom0 audit: BPF prog-id=74 op=UNLOAD
Jul 08 16:16:40 dom0 kernel: audit: type=1334 audit(1752009400.939:524): prog-id=76 op=UNLOAD
Jul 08 16:16:40 dom0 kernel: audit: type=1334 audit(1752009400.939:525): prog-id=75 op=UNLOAD
Jul 08 16:16:40 dom0 kernel: audit: type=1334 audit(1752009400.939:526): prog-id=74 op=UNLOAD
Jul 08 16:17:09 dom0 sudo[13216]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory
Jul 08 16:17:09 dom0 sudo[13216]: PAM adding faulty module: /usr/lib64/security/pam_sss.so
Jul 08 16:17:09 dom0 audit[13216]: USER_ACCT pid=13216 uid=1000 auid=1000 ses=7 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="admin" exe="/usr/bin/sudo" hostname=dom0 addr=? terminal=/dev/tty2 res=success'
Jul 08 16:17:09 dom0 kernel: audit: type=1101 audit(1752009429.445:527): pid=13216 uid=1000 auid=1000 ses=7 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="admin" exe="/usr/bin/sudo" hostname=dom0 addr=? terminal=/dev/tty2 res=success'
Jul 08 16:17:09 dom0 kernel: audit: type=1123 audit(1752009429.445:528): pid=13216 uid=1000 auid=1000 ses=7 msg='cwd="/home/admin" cmd=6A6F75726E616C63746C202D2D73696E63653D746F646179 exe="/usr/bin/sudo" terminal=tty2 res=success'
Jul 08 16:17:09 dom0 kernel: audit: type=1110 audit(1752009429.446:529): pid=13216 uid=1000 auid=1000 ses=7 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=dom0 addr=? terminal=/dev/tty2 res=success'
Jul 08 16:17:09 dom0 audit[13216]: USER_CMD pid=13216 uid=1000 auid=1000 ses=7 msg='cwd="/home/admin" cmd=6A6F75726E616C63746C202D2D73696E63653D746F646179 exe="/usr/bin/sudo" terminal=tty2 res=success'
Jul 08 16:17:09 dom0 audit[13216]: CRED_REFR pid=13216 uid=1000 auid=1000 ses=7 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=dom0 addr=? terminal=/dev/tty2 res=success'
Jul 08 16:17:09 dom0 sudo[13216]: admin : TTY=tty2 ; PWD=/home/admin ; USER=root ; COMMAND=/usr/bin/journalctl --since=today
Jul 08 16:17:09 dom0 kernel: audit: type=1105 audit(1752009429.448:530): pid=13216 uid=1000 auid=1000 ses=7 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=dom0 addr=? terminal=/dev/tty2 res=success'
Jul 08 16:17:09 dom0 audit[13216]: USER_START pid=13216 uid=1000 auid=1000 ses=7 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=dom0 addr=? terminal=/dev/tty2 res=success'
Jul 08 16:17:09 dom0 sudo[13216]: pam_unix(sudo:session): session opened for user root(uid=0) by admin(uid=1000)
Jul 08 16:17:10 dom0 sudo[13216]: pam_unix(sudo:session): session closed for user root
Jul 08 16:17:10 dom0 audit[13216]: USER_END pid=13216 uid=1000 auid=1000 ses=7 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=dom0 addr=? terminal=/dev/tty2 res=success'
Jul 08 16:17:10 dom0 audit[13216]: CRED_DISP pid=13216 uid=1000 auid=1000 ses=7 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=dom0 addr=? terminal=/dev/tty2 res=success'
Jul 08 16:17:10 dom0 kernel: audit: type=1106 audit(1752009430.091:531): pid=13216 uid=1000 auid=1000 ses=7 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=dom0 addr=? terminal=/dev/tty2 res=success'
Jul 08 16:17:10 dom0 kernel: audit: type=1104 audit(1752009430.091:532): pid=13216 uid=1000 auid=1000 ses=7 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=dom0 addr=? terminal=/dev/tty2 res=success'
Jul 08 16:17:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+linux-kernel: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:17:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+linux-kernel: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:17:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+linux-kernel: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:17:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+pool00: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:17:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+pool00: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:17:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+pool00: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:17:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+varlibqubes: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:17:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+varlibqubes: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:17:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+varlibqubes: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:17:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:17:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+template: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:17:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:17:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+template: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:17:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:17:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:17:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:17:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:17:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-net: allowed to dom0
Jul 08 16:17:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+template: sys-gui -> sys-net: allowed to dom0
Jul 08 16:17:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-net: allowed to dom0
Jul 08 16:17:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-net: allowed to dom0
Jul 08 16:17:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:17:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+template: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:17:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:17:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:17:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:17:33 dom0 systemd[10663]: Starting grub-boot-success.service - Mark boot as successful...
Jul 08 16:17:33 dom0 systemd[10663]: Finished grub-boot-success.service - Mark boot as successful.
Jul 08 16:17:34 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-firewall-localnet -> @adminvm: allowed to dom0
Jul 08 16:17:34 dom0 xenstored[3342]: write rate limit: not in force recently
Jul 08 16:17:34 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-firewall-chocolatey -> @adminvm: allowed to dom0
Jul 08 16:17:34 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-firewall -> @adminvm: allowed to dom0
Jul 08 16:17:34 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-firewall-full-internet -> @adminvm: allowed to dom0
Jul 08 16:17:42 dom0 sudo[13865]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory
Jul 08 16:17:42 dom0 sudo[13865]: PAM adding faulty module: /usr/lib64/security/pam_sss.so
Jul 08 16:17:42 dom0 audit[13865]: USER_ACCT pid=13865 uid=1000 auid=1000 ses=7 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="admin" exe="/usr/bin/sudo" hostname=dom0 addr=? terminal=/dev/tty2 res=success'
Jul 08 16:17:42 dom0 kernel: audit: type=1101 audit(1752009462.088:533): pid=13865 uid=1000 auid=1000 ses=7 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="admin" exe="/usr/bin/sudo" hostname=dom0 addr=? terminal=/dev/tty2 res=success'
Jul 08 16:17:42 dom0 kernel: audit: type=1123 audit(1752009462.088:534): pid=13865 uid=1000 auid=1000 ses=7 msg='cwd="/home/admin" cmd=71766D2D73687574646F776E202D2D666F726365207379732D677569 exe="/usr/bin/sudo" terminal=tty2 res=success'
Jul 08 16:17:42 dom0 kernel: audit: type=1110 audit(1752009462.089:535): pid=13865 uid=1000 auid=1000 ses=7 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=dom0 addr=? terminal=/dev/tty2 res=success'
Jul 08 16:17:42 dom0 audit[13865]: USER_CMD pid=13865 uid=1000 auid=1000 ses=7 msg='cwd="/home/admin" cmd=71766D2D73687574646F776E202D2D666F726365207379732D677569 exe="/usr/bin/sudo" terminal=tty2 res=success'
Jul 08 16:17:42 dom0 audit[13865]: CRED_REFR pid=13865 uid=1000 auid=1000 ses=7 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=dom0 addr=? terminal=/dev/tty2 res=success'
Jul 08 16:17:42 dom0 sudo[13865]: admin : TTY=tty2 ; PWD=/home/admin ; USER=root ; COMMAND=/usr/bin/qvm-shutdown --force sys-gui
Jul 08 16:17:42 dom0 sudo[13865]: pam_unix(sudo:session): session opened for user root(uid=0) by admin(uid=1000)
Jul 08 16:17:42 dom0 audit[13865]: USER_START pid=13865 uid=1000 auid=1000 ses=7 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=dom0 addr=? terminal=/dev/tty2 res=success'
Jul 08 16:17:42 dom0 kernel: audit: type=1105 audit(1752009462.091:536): pid=13865 uid=1000 auid=1000 ses=7 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=dom0 addr=? terminal=/dev/tty2 res=success'
Jul 08 16:17:42 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:42 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:42 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:42 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:42 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:42 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:42 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:42 dom0 audit[13865]: USER_END pid=13865 uid=1000 auid=1000 ses=7 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=dom0 addr=? terminal=/dev/tty2 res=success'
Jul 08 16:17:42 dom0 sudo[13865]: pam_unix(sudo:session): session closed for user root
Jul 08 16:17:42 dom0 audit[13865]: CRED_DISP pid=13865 uid=1000 auid=1000 ses=7 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=dom0 addr=? terminal=/dev/tty2 res=success'
Jul 08 16:17:42 dom0 kernel: audit: type=1106 audit(1752009462.366:537): pid=13865 uid=1000 auid=1000 ses=7 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=dom0 addr=? terminal=/dev/tty2 res=success'
Jul 08 16:17:42 dom0 kernel: audit: type=1104 audit(1752009462.366:538): pid=13865 uid=1000 auid=1000 ses=7 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=dom0 addr=? terminal=/dev/tty2 res=success'
Jul 08 16:17:42 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:17:42 dom0 audit[10600]: USER_LOGOUT pid=10600 uid=0 auid=1001 ses=5 msg='op=logout id=1001 exe="/usr/sbin/lightdm" hostname=dom0 addr=? terminal=/dev/tty1 res=success'
Jul 08 16:17:42 dom0 kernel: audit: type=1113 audit(1752009462.388:539): pid=10600 uid=0 auid=1001 ses=5 msg='op=logout id=1001 exe="/usr/sbin/lightdm" hostname=dom0 addr=? terminal=/dev/tty1 res=success'
Jul 08 16:17:42 dom0 lightdm[10600]: pam_unix(lightdm:session): session closed for user engineer
Jul 08 16:17:42 dom0 kernel: audit: type=1106 audit(1752009462.389:540): pid=10600 uid=0 auid=1001 ses=5 msg='op=PAM:session_close grantors=pam_selinux,pam_loginuid,pam_selinux,pam_keyinit,pam_namespace,pam_keyinit,pam_limits,pam_systemd,pam_unix,pam_lastlog,pam_umask,pam_lastlog acct="engineer" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:17:42 dom0 kernel: audit: type=1104 audit(1752009462.390:541): pid=10600 uid=0 auid=1001 ses=5 msg='op=PAM:setcred grantors=pam_localuser,pam_unix acct="engineer" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:17:42 dom0 audit[10600]: USER_END pid=10600 uid=0 auid=1001 ses=5 msg='op=PAM:session_close grantors=pam_selinux,pam_loginuid,pam_selinux,pam_keyinit,pam_namespace,pam_keyinit,pam_limits,pam_systemd,pam_unix,pam_lastlog,pam_umask,pam_lastlog acct="engineer" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:17:42 dom0 audit[10600]: CRED_DISP pid=10600 uid=0 auid=1001 ses=5 msg='op=PAM:setcred grantors=pam_localuser,pam_unix acct="engineer" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:17:42 dom0 systemd-logind[3298]: Session 5 logged out. Waiting for processes to exit.
Jul 08 16:17:42 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-usb -> @adminvm: allowed to sys-gui
Jul 08 16:17:42 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-net -> @adminvm: allowed to sys-gui
Jul 08 16:17:42 dom0 audit[13907]: CRED_ACQ pid=13907 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_env,pam_permit acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:17:42 dom0 kernel: audit: type=1103 audit(1752009462.908:542): pid=13907 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_env,pam_permit acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:17:42 dom0 lightdm[13907]: pam_unix(lightdm-greeter:session): session opened for user lightdm(uid=992) by (uid=0)
Jul 08 16:17:42 dom0 systemd[1]: Created slice user-992.slice - User Slice of UID 992.
Jul 08 16:17:42 dom0 systemd[1]: Starting user-runtime-dir@992.service - User Runtime Directory /run/user/992...
Jul 08 16:17:42 dom0 systemd-logind[3298]: New session c3 of user lightdm.
Jul 08 16:17:42 dom0 systemd[1]: Finished user-runtime-dir@992.service - User Runtime Directory /run/user/992.
Jul 08 16:17:42 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:17:42 dom0 systemd[1]: Starting user@992.service - User Manager for UID 992...
Jul 08 16:17:42 dom0 (systemd)[13911]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory
Jul 08 16:17:42 dom0 (systemd)[13911]: PAM adding faulty module: /usr/lib64/security/pam_sss.so
Jul 08 16:17:42 dom0 (systemd)[13911]: pam_systemd_home(systemd-user:account): systemd-homed is not available: Could not activate remote peer: activation request failed: unknown unit.
Jul 08 16:17:42 dom0 audit[13911]: USER_ACCT pid=13911 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_unix acct="lightdm" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:17:42 dom0 audit[13911]: CRED_ACQ pid=13911 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=? acct="lightdm" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
Jul 08 16:17:42 dom0 audit[13911]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=8 a1=7fff893bb3a0 a2=3 a3=7fff893bb0b5 items=0 ppid=1 pid=13911 auid=992 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="(systemd)" exe="/usr/lib/systemd/systemd" key=(null)
Jul 08 16:17:42 dom0 audit: PROCTITLE proctitle="(systemd)"
Jul 08 16:17:42 dom0 (systemd)[13911]: pam_unix(systemd-user:session): session opened for user lightdm(uid=992) by (uid=0)
Jul 08 16:17:42 dom0 audit[13911]: USER_START pid=13911 uid=0 auid=992 ses=8 msg='op=PAM:session_open grantors=pam_selinux,pam_selinux,pam_loginuid,pam_namespace,pam_systemd_home,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="lightdm" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:17:43 dom0 systemd[13911]: Queued start job for default target default.target.
Jul 08 16:17:43 dom0 systemd[13911]: Created slice app.slice - User Application Slice.
Jul 08 16:17:43 dom0 systemd[13911]: Created slice session.slice - User Core Session Slice.
Jul 08 16:17:43 dom0 systemd[13911]: grub-boot-success.timer - Mark boot as successful after the user session has run 2 minutes was skipped because of a failed condition check (ConditionUser=!@system).
Jul 08 16:17:43 dom0 systemd[13911]: Started systemd-tmpfiles-clean.timer - Daily Cleanup of User's Temporary Directories.
Jul 08 16:17:43 dom0 systemd[13911]: Reached target paths.target - Paths.
Jul 08 16:17:43 dom0 systemd[13911]: Reached target timers.target - Timers.
Jul 08 16:17:43 dom0 systemd[13911]: Starting dbus.socket - D-Bus User Message Bus Socket...
Jul 08 16:17:43 dom0 systemd[13911]: Listening on pipewire-pulse.socket - PipeWire PulseAudio.
Jul 08 16:17:43 dom0 systemd[13911]: Listening on pipewire.socket - PipeWire Multimedia System Sockets.
Jul 08 16:17:43 dom0 systemd[13911]: Listening on ssh-agent.socket - OpenSSH key agent.
Jul 08 16:17:43 dom0 systemd[13911]: Starting systemd-tmpfiles-setup.service - Create User's Volatile Files and Directories...
Jul 08 16:17:43 dom0 systemd[13911]: Finished systemd-tmpfiles-setup.service - Create User's Volatile Files and Directories.
Jul 08 16:17:43 dom0 systemd[13911]: Listening on dbus.socket - D-Bus User Message Bus Socket.
Jul 08 16:17:43 dom0 systemd[13911]: Reached target sockets.target - Sockets.
Jul 08 16:17:43 dom0 systemd[13911]: Reached target basic.target - Basic System.
Jul 08 16:17:43 dom0 systemd[1]: Started user@992.service - User Manager for UID 992.
Jul 08 16:17:43 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user@992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:17:43 dom0 systemd[1]: Started session-c3.scope - Session c3 of User lightdm.
Jul 08 16:17:43 dom0 systemd[13911]: Started pipewire.service - PipeWire Multimedia Service.
Jul 08 16:17:43 dom0 systemd[13911]: Started wireplumber.service - Multimedia Service Session Manager.
Jul 08 16:17:43 dom0 audit[13907]: USER_START pid=13907 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_unix,pam_systemd acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:17:43 dom0 systemd[13911]: Started pipewire-pulse.service - PipeWire PulseAudio.
Jul 08 16:17:43 dom0 systemd[13911]: Reached target default.target - Main User Target.
Jul 08 16:17:43 dom0 systemd[13911]: Startup finished in 645ms.
Jul 08 16:17:43 dom0 systemd[13911]: Started dbus-daemon.service - D-Bus User Message Bus.
Jul 08 16:17:43 dom0 rtkit-daemon[8325]: Successfully made thread 13936 of process 13936 (/usr/bin/pipewire) owned by '992' high priority at nice level -11.
Jul 08 16:17:43 dom0 rtkit-daemon[8325]: Successfully made thread 13933 of process 13933 (/usr/bin/pipewire) owned by '992' high priority at nice level -11.
Jul 08 16:17:43 dom0 rtkit-daemon[8325]: Successfully made thread 13934 of process 13934 (/usr/bin/wireplumber) owned by '992' high priority at nice level -11.
Jul 08 16:17:43 dom0 wireplumber[13934]: Failed to set scheduler settings: Operation not permitted
Jul 08 16:17:43 dom0 rtkit-daemon[8325]: Successfully made thread 13942 of process 13934 (/usr/bin/wireplumber) owned by '992' RT at priority 20.
Jul 08 16:17:43 dom0 rtkit-daemon[8325]: Successfully made thread 13944 of process 13933 (/usr/bin/pipewire) owned by '992' RT at priority 20.
Jul 08 16:17:43 dom0 rtkit-daemon[8325]: Successfully made thread 13945 of process 13936 (/usr/bin/pipewire) owned by '992' RT at priority 20.
Jul 08 16:17:43 dom0 wireplumber[13934]: SPA handle 'api.libcamera.enum.manager' could not be loaded; is it installed?
Jul 08 16:17:43 dom0 wireplumber[13934]: PipeWire's libcamera SPA missing or broken. libcamera not supported.
Jul 08 16:17:43 dom0 dbus-daemon[13937]: [session uid=992 pid=13937] Activating via systemd: service name='org.a11y.Bus' unit='at-spi-dbus-bus.service' requested by ':1.7' (uid=992 pid=13935 comm="/usr/sbin/lightdm-gtk-greeter")
Jul 08 16:17:43 dom0 systemd[13911]: Starting at-spi-dbus-bus.service - Accessibility services bus...
Jul 08 16:17:43 dom0 dbus-daemon[13937]: [session uid=992 pid=13937] Successfully activated service 'org.a11y.Bus'
Jul 08 16:17:43 dom0 systemd[13911]: Started at-spi-dbus-bus.service - Accessibility services bus.
Jul 08 16:17:43 dom0 at-spi-bus-launcher[13967]: Policy to allow eavesdropping in /usr/share/defaults/at-spi2/accessibility.conf +15: Eavesdropping is deprecated and ignored
Jul 08 16:17:43 dom0 at-spi-bus-launcher[13967]: Policy to allow eavesdropping in /usr/share/defaults/at-spi2/accessibility.conf +17: Eavesdropping is deprecated and ignored
Jul 08 16:17:43 dom0 dbus-broker-launch[13967]: Ready
Jul 08 16:17:43 dom0 dbus-daemon[13937]: [session uid=992 pid=13937] Activating via systemd: service name='org.gtk.vfs.Daemon' unit='gvfs-daemon.service' requested by ':1.10' (uid=992 pid=13935 comm="/usr/sbin/lightdm-gtk-greeter")
Jul 08 16:17:43 dom0 systemd[13911]: Starting gvfs-daemon.service - Virtual filesystem service...
Jul 08 16:17:43 dom0 dbus-daemon[13937]: [session uid=992 pid=13937] Successfully activated service 'org.gtk.vfs.Daemon'
Jul 08 16:17:43 dom0 systemd[13911]: Started gvfs-daemon.service - Virtual filesystem service.
Jul 08 16:17:43 dom0 wireplumber[13934]: GetManagedObjects() failed: org.freedesktop.DBus.Error.NameHasNoOwner
Jul 08 16:17:43 dom0 systemd[13911]: Created slice app-dbus\x2d:1.9\x2dorg.a11y.atspi.Registry.slice - Slice /app/dbus-:1.9-org.a11y.atspi.Registry.
Jul 08 16:17:43 dom0 lightdm[13997]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory
Jul 08 16:17:43 dom0 lightdm[13997]: PAM adding faulty module: /usr/lib64/security/pam_sss.so
Jul 08 16:17:43 dom0 systemd[13911]: Started dbus-:1.9-org.a11y.atspi.Registry@0.service.
Jul 08 16:17:43 dom0 at-spi2-registryd[13998]: SpiRegistry daemon is running with well-known name - org.a11y.atspi.Registry
Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:44 dom0 qubesd[4330]: socket.send() raised exception.
Jul 08 16:17:45 dom0 dmeventd[2209]: No longer monitoring thin pool qubes_dom0-pool00-tpool.
Jul 08 16:17:46 dom0 lvm[2209]: Monitoring thin pool qubes_dom0-pool00-tpool.
Jul 08 16:17:46 dom0 dmeventd[2209]: No longer monitoring thin pool qubes_dom0-pool00-tpool.
Jul 08 16:17:46 dom0 lvm[2209]: Monitoring thin pool qubes_dom0-pool00-tpool.
Jul 08 16:17:47 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-net -> @adminvm: allowed to sys-gui
Jul 08 16:17:47 dom0 qubesd[4330]: vm.sys-gui: Starting sys-gui
Jul 08 16:17:47 dom0 dmeventd[2209]: No longer monitoring thin pool qubes_dom0-pool00-tpool.
Jul 08 16:17:47 dom0 lvm[2209]: Monitoring thin pool qubes_dom0-pool00-tpool.
Jul 08 16:17:48 dom0 dmeventd[2209]: No longer monitoring thin pool qubes_dom0-pool00-tpool.
Jul 08 16:17:48 dom0 lvm[2209]: Monitoring thin pool qubes_dom0-pool00-tpool.
Jul 08 16:17:49 dom0 kernel: loop4: detected capacity change from 0 to 1399816
Jul 08 16:17:49 dom0 qubesd[4330]: vm.sys-gui: Setting Qubes DB info for the VM
Jul 08 16:17:49 dom0 qubesd[4330]: vm.sys-gui: Starting Qubes DB
Jul 08 16:17:49 dom0 audit[14940]: CRED_ACQ pid=14940 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:17:49 dom0 kernel: kauditd_printk_skb: 9 callbacks suppressed
Jul 08 16:17:49 dom0 kernel: audit: type=1103 audit(1752009469.160:550): pid=14940 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:17:49 dom0 runuser[14940]: pam_unix(runuser:session): session opened for user admin(uid=1000) by (uid=0)
Jul 08 16:17:49 dom0 audit[14940]: USER_START pid=14940 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:17:49 dom0 kernel: audit: type=1105 audit(1752009469.162:551): pid=14940 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:17:49 dom0 runuser[14940]: pam_unix(runuser:session): session closed for user admin
Jul 08 16:17:49 dom0 audit[14940]: USER_END pid=14940 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:17:49 dom0 audit[14940]: CRED_DISP pid=14940 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:17:49 dom0 kernel: audit: type=1106 audit(1752009469.167:552): pid=14940 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:17:49 dom0 kernel: audit: type=1104 audit(1752009469.167:553): pid=14940 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:17:49 dom0 qubesd[4330]: vm.sys-gui: Activating the sys-gui VM
Jul 08 16:17:49 dom0 audit[14959]: CRED_ACQ pid=14959 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:17:49 dom0 kernel: audit: type=1103 audit(1752009469.176:554): pid=14959 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:17:49 dom0 runuser[14959]: pam_unix(runuser:session): session opened for user admin(uid=1000) by (uid=0)
Jul 08 16:17:49 dom0 kernel: audit: type=1105 audit(1752009469.177:555): pid=14959 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:17:49 dom0 audit[14959]: USER_START pid=14959 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:17:49 dom0 kernel: xen-blkback: backend/vbd/10/51712: using 2 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:17:49 dom0 kernel: xen-blkback: backend/vbd/10/51728: using 2 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:17:49 dom0 kernel: xen-blkback: backend/vbd/10/51744: using 2 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:17:49 dom0 kernel: xen-blkback: backend/vbd/10/51760: using 2 queues, protocol 1 (x86_64-abi) persistent grants
Jul 08 16:17:52 dom0 systemd[1]: session-5.scope: Deactivated successfully.
Jul 08 16:17:52 dom0 systemd-logind[3298]: Removed session 5.
Jul 08 16:17:52 dom0 runuser[14959]: pam_unix(runuser:session): session closed for user admin
Jul 08 16:17:52 dom0 audit[14959]: USER_END pid=14959 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:17:52 dom0 kernel: audit: type=1106 audit(1752009472.449:556): pid=14959 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:17:52 dom0 kernel: audit: type=1104 audit(1752009472.449:557): pid=14959 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:17:52 dom0 audit[14959]: CRED_DISP pid=14959 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="admin" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
Jul 08 16:17:59 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.GetDate+nanoseconds: sys-gui -> @default: allowed to dom0
Jul 08 16:17:59 dom0 audit: BPF prog-id=77 op=LOAD
Jul 08 16:17:59 dom0 kernel: audit: type=1334 audit(1752009479.878:558): prog-id=77 op=LOAD
Jul 08 16:17:59 dom0 kernel: audit: type=1334 audit(1752009479.878:559): prog-id=78 op=LOAD
Jul 08 16:17:59 dom0 kernel: audit: type=1334 audit(1752009479.878:560): prog-id=79 op=LOAD
Jul 08 16:17:59 dom0 audit: BPF prog-id=78 op=LOAD
Jul 08 16:17:59 dom0 audit: BPF prog-id=79 op=LOAD
Jul 08 16:17:59 dom0 systemd[1]: Starting systemd-hostnamed.service - Hostname Service...
Jul 08 16:17:59 dom0 systemd[1]: Started systemd-hostnamed.service - Hostname Service.
Jul 08 16:17:59 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:17:59 dom0 kernel: audit: type=1130 audit(1752009479.931:561): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:18:02 dom0 systemd[1]: Stopping user@1001.service - User Manager for UID 1001...
Jul 08 16:18:02 dom0 systemd[10663]: Activating special unit exit.target...
Jul 08 16:18:02 dom0 systemd[10663]: Stopped target default.target - Main User Target.
Jul 08 16:18:02 dom0 systemd[10663]: Stopping dbus-daemon.service - D-Bus User Message Bus...
Jul 08 16:18:02 dom0 systemd[10663]: Stopping pipewire-pulse.service - PipeWire PulseAudio...
Jul 08 16:18:02 dom0 systemd[10663]: Stopped dbus-daemon.service - D-Bus User Message Bus.
Jul 08 16:18:02 dom0 systemd[10663]: Stopped pipewire-pulse.service - PipeWire PulseAudio.
Jul 08 16:18:02 dom0 systemd[10663]: Stopping wireplumber.service - Multimedia Service Session Manager...
Jul 08 16:18:02 dom0 wireplumber[10676]: stopped by signal: Terminated
Jul 08 16:18:02 dom0 wireplumber[10676]: disconnected from pipewire
Jul 08 16:18:02 dom0 systemd[10663]: Stopped wireplumber.service - Multimedia Service Session Manager.
Jul 08 16:18:02 dom0 systemd[10663]: Stopping pipewire.service - PipeWire Multimedia Service...
Jul 08 16:18:02 dom0 systemd[10663]: Stopped pipewire.service - PipeWire Multimedia Service.
Jul 08 16:18:02 dom0 systemd[10663]: Removed slice session.slice - User Core Session Slice.
Jul 08 16:18:02 dom0 systemd[10663]: Stopped target basic.target - Basic System.
Jul 08 16:18:02 dom0 systemd[10663]: Stopped target paths.target - Paths.
Jul 08 16:18:02 dom0 systemd[10663]: Stopped target sockets.target - Sockets.
Jul 08 16:18:02 dom0 systemd[10663]: Stopped target timers.target - Timers.
Jul 08 16:18:02 dom0 systemd[10663]: Stopped grub-boot-success.timer - Mark boot as successful after the user session has run 2 minutes.
Jul 08 16:18:02 dom0 systemd[10663]: Stopped systemd-tmpfiles-clean.timer - Daily Cleanup of User's Temporary Directories.
Jul 08 16:18:02 dom0 systemd[10663]: Closed dbus.socket - D-Bus User Message Bus Socket.
Jul 08 16:18:02 dom0 systemd[10663]: Closed pipewire-pulse.socket - PipeWire PulseAudio.
Jul 08 16:18:02 dom0 systemd[10663]: Closed pipewire.socket - PipeWire Multimedia System Sockets.
Jul 08 16:18:02 dom0 systemd[10663]: Closed ssh-agent.socket - OpenSSH key agent.
Jul 08 16:18:02 dom0 systemd[10663]: Stopped systemd-tmpfiles-setup.service - Create User's Volatile Files and Directories.
Jul 08 16:18:02 dom0 systemd[10663]: Removed slice app.slice - User Application Slice.
Jul 08 16:18:02 dom0 systemd[10663]: Reached target shutdown.target - Shutdown.
Jul 08 16:18:02 dom0 systemd[10663]: Finished systemd-exit.service - Exit the Session.
Jul 08 16:18:02 dom0 systemd[10663]: Reached target exit.target - Exit the Session.
Jul 08 16:18:02 dom0 systemd[1]: user@1001.service: Deactivated successfully.
Jul 08 16:18:02 dom0 systemd[1]: Stopped user@1001.service - User Manager for UID 1001.
Jul 08 16:18:02 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user@1001 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:18:02 dom0 systemd[1]: user@1001.service: Consumed 1.017s CPU time.
Jul 08 16:18:02 dom0 kernel: audit: type=1131 audit(1752009482.167:562): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user@1001 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:18:02 dom0 systemd[1]: Stopping user-runtime-dir@1001.service - User Runtime Directory /run/user/1001...
Jul 08 16:18:02 dom0 systemd[1]: run-user-1001.mount: Deactivated successfully.
Jul 08 16:18:02 dom0 systemd[1]: user-runtime-dir@1001.service: Deactivated successfully.
Jul 08 16:18:02 dom0 systemd[1]: Stopped user-runtime-dir@1001.service - User Runtime Directory /run/user/1001.
Jul 08 16:18:02 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@1001 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:18:02 dom0 systemd[1]: Removed slice user-1001.slice - User Slice of UID 1001.
Jul 08 16:18:02 dom0 systemd[1]: user-1001.slice: Consumed 1.606s CPU time.
Jul 08 16:18:02 dom0 kernel: audit: type=1131 audit(1752009482.184:563): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@1001 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:18:02 dom0 lightdm[13997]: pam_unix(lightdm:auth): authentication failure; logname= uid=0 euid=0 tty=:0 ruser= rhost= user=engineer
Jul 08 16:18:02 dom0 audit[13997]: USER_AUTH pid=13997 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:authentication grantors=? acct="engineer" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=failed'
Jul 08 16:18:02 dom0 kernel: audit: type=1100 audit(1752009482.397:564): pid=13997 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:authentication grantors=? acct="engineer" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=failed'
Jul 08 16:18:04 dom0 audit[13997]: USER_LOGIN pid=13997 uid=0 auid=4294967295 ses=4294967295 msg='op=login acct="engineer" exe="/usr/sbin/lightdm" hostname=dom0 addr=? terminal=/dev/tty1 res=failed'
Jul 08 16:18:04 dom0 kernel: audit: type=1112 audit(1752009484.827:565): pid=13997 uid=0 auid=4294967295 ses=4294967295 msg='op=login acct="engineer" exe="/usr/sbin/lightdm" hostname=dom0 addr=? terminal=/dev/tty1 res=failed'
Jul 08 16:18:04 dom0 lightdm[15385]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory
Jul 08 16:18:04 dom0 lightdm[15385]: PAM adding faulty module: /usr/lib64/security/pam_sss.so
Jul 08 16:18:13 dom0 audit[15385]: USER_AUTH pid=15385 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:authentication grantors=pam_usertype,pam_localuser,pam_unix acct="engineer" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:18:13 dom0 audit[15385]: USER_ACCT pid=15385 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="engineer" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:18:13 dom0 kernel: audit: type=1100 audit(1752009493.180:566): pid=15385 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:authentication grantors=pam_usertype,pam_localuser,pam_unix acct="engineer" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:18:13 dom0 kernel: audit: type=1101 audit(1752009493.180:567): pid=15385 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="engineer" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:18:13 dom0 systemd[1]: Stopping session-c3.scope - Session c3 of User lightdm...
Jul 08 16:18:13 dom0 lightdm[13907]: pam_unix(lightdm-greeter:session): session closed for user lightdm
Jul 08 16:18:13 dom0 audit[13907]: USER_END pid=13907 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_unix,pam_systemd acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:18:13 dom0 audit[13907]: CRED_DISP pid=13907 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_env,pam_permit acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:18:13 dom0 kernel: audit: type=1106 audit(1752009493.228:568): pid=13907 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_unix,pam_systemd acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:18:13 dom0 kernel: audit: type=1104 audit(1752009493.228:569): pid=13907 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_env,pam_permit acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:18:13 dom0 systemd[1]: session-c3.scope: Deactivated successfully.
Jul 08 16:18:13 dom0 systemd[1]: Stopped session-c3.scope - Session c3 of User lightdm.
Jul 08 16:18:13 dom0 systemd[1]: session-c3.scope: Consumed 1.383s CPU time.
Jul 08 16:18:13 dom0 systemd-logind[3298]: Removed session c3.
Jul 08 16:18:13 dom0 audit[15385]: CRED_ACQ pid=15385 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_localuser,pam_unix acct="engineer" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:18:13 dom0 audit[15385]: SYSCALL arch=c000003e syscall=1 success=yes exit=4 a0=8 a1=7ffe694016a0 a2=4 a3=7ffe694013b4 items=0 ppid=7963 pid=15385 auid=1001 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="lightdm" exe="/usr/sbin/lightdm" key=(null)
Jul 08 16:18:13 dom0 audit: PROCTITLE proctitle=6C69676874646D002D2D73657373696F6E2D6368696C64003133003230
Jul 08 16:18:13 dom0 kernel: audit: type=1103 audit(1752009493.233:570): pid=15385 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_localuser,pam_unix acct="engineer" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:18:13 dom0 kernel: audit: type=1006 audit(1752009493.233:571): pid=15385 uid=0 old-auid=4294967295 auid=1001 tty=(none) old-ses=4294967295 ses=9 res=1
Jul 08 16:18:13 dom0 kernel: audit: type=1300 audit(1752009493.233:571): arch=c000003e syscall=1 success=yes exit=4 a0=8 a1=7ffe694016a0 a2=4 a3=7ffe694013b4 items=0 ppid=7963 pid=15385 auid=1001 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="lightdm" exe="/usr/sbin/lightdm" key=(null)
Jul 08 16:18:13 dom0 kernel: audit: type=1327 audit(1752009493.233:571): proctitle=6C69676874646D002D2D73657373696F6E2D6368696C64003133003230
Jul 08 16:18:13 dom0 systemd[1]: Created slice user-1001.slice - User Slice of UID 1001.
Jul 08 16:18:13 dom0 systemd[1]: Starting user-runtime-dir@1001.service - User Runtime Directory /run/user/1001...
Jul 08 16:18:13 dom0 systemd-logind[3298]: New session 9 of user engineer.
Jul 08 16:18:13 dom0 systemd[1]: Finished user-runtime-dir@1001.service - User Runtime Directory /run/user/1001.
Jul 08 16:18:13 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@1001 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:18:13 dom0 kernel: audit: type=1130 audit(1752009493.255:572): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@1001 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:18:13 dom0 systemd[1]: Starting user@1001.service - User Manager for UID 1001...
Jul 08 16:18:13 dom0 (systemd)[15585]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory
Jul 08 16:18:13 dom0 (systemd)[15585]: PAM adding faulty module: /usr/lib64/security/pam_sss.so
Jul 08 16:18:13 dom0 (systemd)[15585]: pam_systemd_home(systemd-user:account): systemd-homed is not available: Could not activate remote peer: activation request failed: unknown unit.
Jul 08 16:18:13 dom0 audit[15585]: USER_ACCT pid=15585 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_unix acct="engineer" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:18:13 dom0 audit[15585]: CRED_ACQ pid=15585 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=? acct="engineer" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
Jul 08 16:18:13 dom0 audit[15585]: SYSCALL arch=c000003e syscall=1 success=yes exit=4 a0=8 a1=7fff893bb3a0 a2=4 a3=7fff893bb0b4 items=0 ppid=1 pid=15585 auid=1001 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="(systemd)" exe="/usr/lib/systemd/systemd" key=(null)
Jul 08 16:18:13 dom0 kernel: audit: type=1101 audit(1752009493.262:573): pid=15585 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_unix acct="engineer" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:18:13 dom0 audit: PROCTITLE proctitle="(systemd)"
Jul 08 16:18:13 dom0 (systemd)[15585]: pam_unix(systemd-user:session): session opened for user engineer(uid=1001) by (uid=0)
Jul 08 16:18:13 dom0 audit[15585]: USER_START pid=15585 uid=0 auid=1001 ses=10 msg='op=PAM:session_open grantors=pam_selinux,pam_selinux,pam_loginuid,pam_namespace,pam_systemd_home,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="engineer" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:18:13 dom0 systemd[15585]: Queued start job for default target default.target.
Jul 08 16:18:13 dom0 systemd[15585]: Created slice app.slice - User Application Slice.
Jul 08 16:18:13 dom0 systemd[15585]: Created slice session.slice - User Core Session Slice.
Jul 08 16:18:13 dom0 systemd[15585]: Started grub-boot-success.timer - Mark boot as successful after the user session has run 2 minutes.
Jul 08 16:18:13 dom0 systemd[15585]: Started systemd-tmpfiles-clean.timer - Daily Cleanup of User's Temporary Directories.
Jul 08 16:18:13 dom0 systemd[15585]: Reached target paths.target - Paths.
Jul 08 16:18:13 dom0 systemd[15585]: Reached target timers.target - Timers.
Jul 08 16:18:13 dom0 systemd[15585]: Starting dbus.socket - D-Bus User Message Bus Socket...
Jul 08 16:18:13 dom0 systemd[15585]: Listening on pipewire-pulse.socket - PipeWire PulseAudio.
Jul 08 16:18:13 dom0 systemd[15585]: Listening on pipewire.socket - PipeWire Multimedia System Sockets.
Jul 08 16:18:13 dom0 systemd[15585]: Listening on ssh-agent.socket - OpenSSH key agent.
Jul 08 16:18:13 dom0 systemd[15585]: Starting systemd-tmpfiles-setup.service - Create User's Volatile Files and Directories...
Jul 08 16:18:13 dom0 systemd[15585]: Finished systemd-tmpfiles-setup.service - Create User's Volatile Files and Directories.
Jul 08 16:18:13 dom0 systemd[15585]: Listening on dbus.socket - D-Bus User Message Bus Socket.
Jul 08 16:18:13 dom0 systemd[15585]: Reached target sockets.target - Sockets.
Jul 08 16:18:13 dom0 systemd[15585]: Reached target basic.target - Basic System.
Jul 08 16:18:13 dom0 systemd[1]: Started user@1001.service - User Manager for UID 1001.
Jul 08 16:18:13 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user@1001 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:18:13 dom0 systemd[1]: Started session-9.scope - Session 9 of User engineer.
Jul 08 16:18:13 dom0 systemd[15585]: Started pipewire.service - PipeWire Multimedia Service.
Jul 08 16:18:13 dom0 lightdm[15385]: pam_unix(lightdm:session): session opened for user engineer(uid=1001) by (uid=0)
Jul 08 16:18:13 dom0 systemd[15585]: Started wireplumber.service - Multimedia Service Session Manager.
Jul 08 16:18:13 dom0 audit[15385]: USER_START pid=15385 uid=0 auid=1001 ses=9 msg='op=PAM:session_open grantors=pam_selinux,pam_loginuid,pam_selinux,pam_keyinit,pam_namespace,pam_keyinit,pam_limits,pam_systemd,pam_unix,pam_lastlog,pam_umask,pam_lastlog acct="engineer" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
Jul 08 16:18:13 dom0 systemd[15585]: Started pipewire-pulse.service - PipeWire PulseAudio.
Jul 08 16:18:13 dom0 systemd[15585]: Reached target default.target - Main User Target.
Jul 08 16:18:13 dom0 systemd[15585]: Startup finished in 715ms.
Jul 08 16:18:13 dom0 audit[15385]: USER_LOGIN pid=15385 uid=0 auid=1001 ses=9 msg='op=login id=1001 exe="/usr/sbin/lightdm" hostname=dom0 addr=? terminal=/dev/tty1 res=success'
Jul 08 16:18:13 dom0 systemd[15585]: Started dbus-daemon.service - D-Bus User Message Bus.
Jul 08 16:18:14 dom0 rtkit-daemon[8325]: Successfully made thread 15617 of process 15617 (/usr/bin/pipewire) owned by '1001' high priority at nice level -11.
Jul 08 16:18:14 dom0 rtkit-daemon[8325]: Successfully made thread 15637 of process 15617 (/usr/bin/pipewire) owned by '1001' RT at priority 20.
Jul 08 16:18:14 dom0 rtkit-daemon[8325]: Successfully made thread 15618 of process 15618 (/usr/bin/wireplumber) owned by '1001' high priority at nice level -11.
Jul 08 16:18:14 dom0 rtkit-daemon[8325]: Successfully made thread 15619 of process 15619 (/usr/bin/pipewire) owned by '1001' high priority at nice level -11.
Jul 08 16:18:14 dom0 wireplumber[15618]: Failed to set scheduler settings: Operation not permitted
Jul 08 16:18:14 dom0 rtkit-daemon[8325]: Successfully made thread 15635 of process 15618 (/usr/bin/wireplumber) owned by '1001' RT at priority 20.
Jul 08 16:18:14 dom0 rtkit-daemon[8325]: Successfully made thread 15638 of process 15619 (/usr/bin/pipewire) owned by '1001' RT at priority 20.
Jul 08 16:18:14 dom0 wireplumber[15618]: SPA handle 'api.libcamera.enum.manager' could not be loaded; is it installed?
Jul 08 16:18:14 dom0 wireplumber[15618]: PipeWire's libcamera SPA missing or broken. libcamera not supported.
Jul 08 16:18:14 dom0 sudo[15685]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory
Jul 08 16:18:14 dom0 sudo[15685]: PAM adding faulty module: /usr/lib64/security/pam_sss.so
Jul 08 16:18:14 dom0 audit[15685]: USER_ACCT pid=15685 uid=1001 auid=1001 ses=9 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="engineer" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Jul 08 16:18:14 dom0 audit[15685]: USER_CMD pid=15685 uid=1001 auid=1001 ses=9 msg='cwd="/home/engineer" cmd=67726570205E7379732D6775693A202F6574632F71756265732D7379732D6775692D757365722D70617373776F726473 exe="/usr/bin/sudo" terminal=? res=success'
Jul 08 16:18:14 dom0 sudo[15685]: engineer : PWD=/home/engineer ; USER=root ; COMMAND=/usr/bin/grep ^sys-gui: /etc/qubes-sys-gui-user-passwords
Jul 08 16:18:14 dom0 audit[15685]: CRED_REFR pid=15685 uid=1001 auid=1001 ses=9 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Jul 08 16:18:14 dom0 sudo[15685]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1001)
Jul 08 16:18:14 dom0 audit[15685]: USER_START pid=15685 uid=1001 auid=1001 ses=9 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Jul 08 16:18:14 dom0 sudo[15685]: pam_unix(sudo:session): session closed for user root
Jul 08 16:18:14 dom0 audit[15685]: USER_END pid=15685 uid=1001 auid=1001 ses=9 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Jul 08 16:18:14 dom0 audit[15685]: CRED_DISP pid=15685 uid=1001 auid=1001 ses=9 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Jul 08 16:18:14 dom0 wireplumber[15618]: GetManagedObjects() failed: org.freedesktop.DBus.Error.NameHasNoOwner
Jul 08 16:18:17 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-net -> @adminvm: allowed to sys-gui
Jul 08 16:18:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:18:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.Events+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.List+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll: sys-gui -> dom0: denied: no matching rule found
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: resolution = policy.evaluate(request)
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: rule = self.find_matching_rule(request)
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: raise AccessDenied("no matching rule found")
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred:
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: await call_socket_service(guivm, service, source_domain, params)
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: reader, writer = await asyncio.open_unix_connection(path)
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: transport, _ = await loop.create_unix_connection(
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: await self.sock_connect(sock, path)
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: return await fut
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: sock.connect(address)
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+updates-available: sys-gui -> dom0: denied: no matching rule found
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: resolution = policy.evaluate(request)
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: rule = self.find_matching_rule(request)
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: raise AccessDenied("no matching rule found")
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred:
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: await call_socket_service(guivm, service, source_domain, params)
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: reader, writer = await asyncio.open_unix_connection(path)
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: transport, _ = await loop.create_unix_connection(
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: await self.sock_connect(sock, path)
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: return await fut
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: sock.connect(address)
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-secure-copy-sequence: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+template_for_dispvms: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll: sys-gui -> dom0: denied: no matching rule found
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: resolution = policy.evaluate(request)
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: rule = self.find_matching_rule(request)
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: raise AccessDenied("no matching rule found")
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred:
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: await call_socket_service(guivm, service, source_domain, params)
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: reader, writer = await asyncio.open_unix_connection(path)
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: transport, _ = await loop.create_unix_connection(
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: await self.sock_connect(sock, path)
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: return await fut
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: sock.connect(address)
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+linux-kernel: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+os-eol: sys-gui -> dom0: denied: no matching rule found
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: resolution = policy.evaluate(request)
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: rule = self.find_matching_rule(request)
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: raise AccessDenied("no matching rule found")
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred:
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: await call_socket_service(guivm, service, source_domain, params)
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: reader, writer = await asyncio.open_unix_connection(path)
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: transport, _ = await loop.create_unix_connection(
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: await self.sock_connect(sock, path)
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: return await fut
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: sock.connect(address)
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-secure-paste-sequence: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+updateable: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+linux-kernel: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-net: allowed to dom0
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+updates-available: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.Events+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-net: allowed to dom0
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.Info+linux-kernel: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+updates-available: sys-gui -> dom0: denied: no matching rule found
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: resolution = policy.evaluate(request)
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: rule = self.find_matching_rule(request)
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: raise AccessDenied("no matching rule found")
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred:
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: await call_socket_service(guivm, service, source_domain, params)
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: reader, writer = await asyncio.open_unix_connection(path)
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: transport, _ = await loop.create_unix_connection(
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: await self.sock_connect(sock, path)
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: return await fut
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: sock.connect(address)
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+servicevm: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+os-eol: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+linux-kernel: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:18:19 dom0 xenstored[3342]: write rate limit: domain 10 is affected
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+template-name: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll: sys-gui -> dom0: denied: no matching rule found
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: resolution = policy.evaluate(request)
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: rule = self.find_matching_rule(request)
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: raise AccessDenied("no matching rule found")
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred:
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: await call_socket_service(guivm, service, source_domain, params)
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: reader, writer = await asyncio.open_unix_connection(path)
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: transport, _ = await loop.create_unix_connection(
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: await self.sock_connect(sock, path)
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: return await fut
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: sock.connect(address)
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-net: allowed to dom0
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+pool00: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.List+: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+template_for_dispvms: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+updates-available: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+root: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+pool00: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+os-eol: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll: sys-gui -> dom0: denied: no matching rule found
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: resolution = policy.evaluate(request)
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: rule = self.find_matching_rule(request)
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: raise AccessDenied("no matching rule found")
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred:
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: await call_socket_service(guivm, service, source_domain, params)
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: reader, writer = await asyncio.open_unix_connection(path)
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: transport, _ = await loop.create_unix_connection(
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: await self.sock_connect(sock, path)
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: return await fut
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: sock.connect(address)
Jul 08 16:18:19 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.CheckWithTemplate+gui-emulated: sys-gui -> sys-net: allowed to dom0
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.Info+pool00: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+label: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+updates-available: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+pool00: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.CheckWithTemplate+gui: sys-gui -> sys-net: allowed to dom0
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+volatile: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.Available: sys-gui -> dom0: denied: no matching rule found
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: resolution = policy.evaluate(request)
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: rule = self.find_matching_rule(request)
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: raise AccessDenied("no matching rule found")
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred:
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: await call_socket_service(guivm, service, source_domain, params)
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: reader, writer = await asyncio.open_unix_connection(path)
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: transport, _ = await loop.create_unix_connection(
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: await self.sock_connect(sock, path)
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: return await fut
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: sock.connect(address)
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+icon: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.Available: sys-gui -> dom0: denied: no matching rule found
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: resolution = policy.evaluate(request)
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: rule = self.find_matching_rule(request)
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: raise AccessDenied("no matching rule found")
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred:
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: await call_socket_service(guivm, service, source_domain, params)
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: reader, writer = await asyncio.open_unix_connection(path)
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: transport, _ = await loop.create_unix_connection(
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: await self.sock_connect(sock, path)
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: return await fut
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: sock.connect(address)
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.CheckWithTemplate+gui: sys-gui -> sys-net: allowed to dom0
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+kernel: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+varlibqubes: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+appmenus-dispvm: sys-gui -> dom0: denied: no matching rule found
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: resolution = policy.evaluate(request)
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: rule = self.find_matching_rule(request)
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: raise AccessDenied("no matching rule found")
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred:
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: await call_socket_service(guivm, service, source_domain, params)
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: reader, writer = await asyncio.open_unix_connection(path)
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: transport, _ = await loop.create_unix_connection(
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: await self.sock_connect(sock, path)
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: return await fut
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: sock.connect(address)
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+os-eol: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.Available+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.label.Get+red: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+varlibqubes: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+updates-available: sys-gui -> sys-net: allowed to dom0
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll: sys-gui -> dom0: denied: no matching rule found
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: resolution = policy.evaluate(request)
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: rule = self.find_matching_rule(request)
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: raise AccessDenied("no matching rule found")
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred:
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: await call_socket_service(guivm, service, source_domain, params)
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: reader, writer = await asyncio.open_unix_connection(path)
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: transport, _ = await loop.create_unix_connection(
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: await self.sock_connect(sock, path)
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: return await fut
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: sock.connect(address)
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.Info+varlibqubes: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.label.Index+red: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+os-eol: sys-gui -> sys-net: allowed to dom0
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+servicevm: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+label: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.CheckWithTemplate+rpc-clipboard: sys-gui -> sys-net: allowed to dom0
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+varlibqubes: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+template-name: sys-gui -> sys-net: allowed to dom0
Jul 08 16:18:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-allow-fullscreen: sys-gui -> sys-net: allowed to dom0
Jul 08 16:18:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:18:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.List+: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:18:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+icon: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:18:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+updates-available: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:18:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+appmenus-dispvm: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+root: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:18:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-allow-fullscreen: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.Available+: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:18:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+os-eol: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:18:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:18:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.Available+: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:18:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-override-redirect-protection: sys-gui -> sys-net: allowed to dom0
Jul 08 16:18:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+template: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:18:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+servicevm: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:18:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+template-name: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:18:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.List+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:18:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.Available+: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-override-redirect-protection: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+volatile: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:18:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:18:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+updates-available: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:18:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-override-redirect: sys-gui -> sys-net: allowed to dom0
Jul 08 16:18:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.Available+: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:18:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+kernel: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:18:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+appmenus-dispvm: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:18:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+os-eol: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:18:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:18:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.Available+: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:18:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-override-redirect: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+template: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+template-name: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:18:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:18:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.Available+: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:18:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-allow-utf8-titles: sys-gui -> sys-net: allowed to dom0
Jul 08 16:18:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.List+: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+updates-available: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:18:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+servicevm: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:18:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.Events+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:18:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.Available+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:18:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-allow-utf8-titles: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:18:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+appmenus-dispvm: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:18:22 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-net -> @adminvm: allowed to sys-gui
Jul 08 16:18:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.Available+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:18:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-secure-copy-sequence: sys-gui -> sys-net: allowed to dom0
Jul 08 16:18:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.List+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:18:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-net: allowed to dom0
Jul 08 16:18:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:18:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-secure-copy-sequence: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:18:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+root: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:18:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.Available+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:18:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+label: sys-gui -> sys-net: allowed to dom0
Jul 08 16:18:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+servicevm: sys-gui -> sys-net: allowed to dom0
Jul 08 16:18:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-secure-paste-sequence: sys-gui -> sys-net: allowed to dom0
Jul 08 16:18:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.Available+: sys-gui -> sys-net: allowed to dom0
Jul 08 16:18:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:18:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:18:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-net: allowed to dom0
Jul 08 16:18:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.label.Get+red: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:18:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-secure-paste-sequence: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.Available+: sys-gui -> sys-net: allowed to dom0
Jul 08 16:18:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-net: allowed to dom0
Jul 08 16:18:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+volatile: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:18:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+appmenus-dispvm: sys-gui -> sys-net: allowed to dom0
Jul 08 16:18:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+template: sys-gui -> sys-net: allowed to dom0
Jul 08 16:18:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.Available+: sys-gui -> sys-net: allowed to dom0
Jul 08 16:18:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-windows-count-limit: sys-gui -> sys-net: allowed to dom0
Jul 08 16:18:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+kernel: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:18:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:18:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.List+: sys-gui -> sys-net: allowed to dom0
Jul 08 16:18:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-windows-count-limit: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.Available+: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:18:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:18:23 dom0 systemd[1]: Stopping user@992.service - User Manager for UID 992...
Jul 08 16:18:23 dom0 systemd[13911]: Activating special unit exit.target...
Jul 08 16:18:23 dom0 systemd[13911]: Stopped target default.target - Main User Target.
Jul 08 16:18:23 dom0 dbus-broker[13968]: Dispatched 22 messages @ 6(±7)μs / message.
Jul 08 16:18:23 dom0 systemd[13911]: Stopping at-spi-dbus-bus.service - Accessibility services bus...
Jul 08 16:18:23 dom0 systemd[13911]: Stopping dbus-:1.9-org.a11y.atspi.Registry@0.service...
Jul 08 16:18:23 dom0 gvfsd[13970]: A connection to the bus can't be made
Jul 08 16:18:23 dom0 systemd[13911]: Stopping dbus-daemon.service - D-Bus User Message Bus...
Jul 08 16:18:23 dom0 systemd[13911]: Stopping gvfs-daemon.service - Virtual filesystem service...
Jul 08 16:18:23 dom0 systemd[13911]: Stopping pipewire-pulse.service - PipeWire PulseAudio...
Jul 08 16:18:23 dom0 systemd[13911]: Stopped dbus-:1.9-org.a11y.atspi.Registry@0.service.
Jul 08 16:18:23 dom0 systemd[13911]: Stopped gvfs-daemon.service - Virtual filesystem service.
Jul 08 16:18:23 dom0 systemd[13911]: Stopped at-spi-dbus-bus.service - Accessibility services bus.
Jul 08 16:18:23 dom0 systemd[13911]: Removed slice app-dbus\x2d:1.9\x2dorg.a11y.atspi.Registry.slice - Slice /app/dbus-:1.9-org.a11y.atspi.Registry.
Jul 08 16:18:23 dom0 systemd[13911]: Stopped pipewire-pulse.service - PipeWire PulseAudio.
Jul 08 16:18:23 dom0 systemd[13911]: Stopping wireplumber.service - Multimedia Service Session Manager...
Jul 08 16:18:23 dom0 wireplumber[13934]: stopped by signal: Terminated
Jul 08 16:18:23 dom0 wireplumber[13934]: disconnected from pipewire
Jul 08 16:18:23 dom0 systemd[13911]: Stopped dbus-daemon.service - D-Bus User Message Bus.
Jul 08 16:18:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:18:23 dom0 systemd[13911]: Stopped wireplumber.service - Multimedia Service Session Manager.
Jul 08 16:18:23 dom0 systemd[13911]: Stopping pipewire.service - PipeWire Multimedia Service...
Jul 08 16:18:23 dom0 systemd[13911]: Stopped pipewire.service - PipeWire Multimedia Service.
Jul 08 16:18:23 dom0 systemd[13911]: Removed slice session.slice - User Core Session Slice.
Jul 08 16:18:23 dom0 systemd[13911]: Stopped target basic.target - Basic System.
Jul 08 16:18:23 dom0 systemd[13911]: Stopped target paths.target - Paths.
Jul 08 16:18:23 dom0 systemd[13911]: Stopped target sockets.target - Sockets.
Jul 08 16:18:23 dom0 systemd[13911]: Stopped target timers.target - Timers.
Jul 08 16:18:23 dom0 systemd[13911]: Stopped systemd-tmpfiles-clean.timer - Daily Cleanup of User's Temporary Directories.
Jul 08 16:18:23 dom0 systemd[13911]: Closed dbus.socket - D-Bus User Message Bus Socket.
Jul 08 16:18:23 dom0 systemd[13911]: Closed pipewire-pulse.socket - PipeWire PulseAudio.
Jul 08 16:18:23 dom0 systemd[13911]: Closed pipewire.socket - PipeWire Multimedia System Sockets.
Jul 08 16:18:23 dom0 systemd[13911]: Closed ssh-agent.socket - OpenSSH key agent.
Jul 08 16:18:23 dom0 systemd[13911]: Stopped systemd-tmpfiles-setup.service - Create User's Volatile Files and Directories.
Jul 08 16:18:23 dom0 systemd[13911]: Removed slice app.slice - User Application Slice.
Jul 08 16:18:23 dom0 systemd[13911]: Reached target shutdown.target - Shutdown.
Jul 08 16:18:23 dom0 systemd[13911]: Finished systemd-exit.service - Exit the Session.
Jul 08 16:18:23 dom0 systemd[13911]: Reached target exit.target - Exit the Session.
Jul 08 16:18:23 dom0 systemd[1]: user@992.service: Deactivated successfully.
Jul 08 16:18:23 dom0 systemd[1]: Stopped user@992.service - User Manager for UID 992.
Jul 08 16:18:23 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user@992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:18:23 dom0 kernel: kauditd_printk_skb: 14 callbacks suppressed
Jul 08 16:18:23 dom0 kernel: audit: type=1131 audit(1752009503.428:586): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user@992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:18:23 dom0 systemd[1]: Stopping user-runtime-dir@992.service - User Runtime Directory /run/user/992...
Jul 08 16:18:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-net: allowed to dom0
Jul 08 16:18:23 dom0 systemd[1]: run-user-992.mount: Deactivated successfully.
Jul 08 16:18:23 dom0 systemd[8996]: Created slice background.slice - User Background Tasks Slice.
Jul 08 16:18:23 dom0 systemd[1]: user-runtime-dir@992.service: Deactivated successfully.
Jul 08 16:18:23 dom0 systemd[1]: Stopped user-runtime-dir@992.service - User Runtime Directory /run/user/992.
Jul 08 16:18:23 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:18:23 dom0 kernel: audit: type=1131 audit(1752009503.446:587): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:18:23 dom0 systemd[1]: Removed slice user-992.slice - User Slice of UID 992.
Jul 08 16:18:23 dom0 systemd[1]: user-992.slice: Consumed 2.374s CPU time.
Jul 08 16:18:23 dom0 systemd[8996]: Starting systemd-tmpfiles-clean.service - Cleanup of User's Temporary Files and Directories...
Jul 08 16:18:23 dom0 systemd[8996]: Finished systemd-tmpfiles-clean.service - Cleanup of User's Temporary Files and Directories.
Jul 08 16:18:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-trayicon-mode: sys-gui -> sys-net: allowed to dom0
Jul 08 16:18:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-trayicon-mode: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-net: allowed to dom0
Jul 08 16:18:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+servicevm: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:18:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.Available+: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:18:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+updates-available: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:18:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-startup-timeout: sys-gui -> sys-net: allowed to dom0
Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+appmenus-dispvm: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-startup-timeout: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.Available+: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-net: allowed to dom0
Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+template: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.Available+: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.List+: sys-gui -> sys-net: allowed to dom0
Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.List+: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.CheckWithTemplate+gui-emulated: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+servicevm: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.Available+: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.CheckWithTemplate+gui: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+root: sys-gui -> sys-net: allowed to dom0
Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+appmenus-dispvm: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.Available+: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.CheckWithTemplate+gui: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-net: allowed to dom0
Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.List: sys-gui -> dom0: denied: no matching rule found
Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0
Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request
Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: resolution = policy.evaluate(request)
Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate
Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: rule = self.find_matching_rule(request)
Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule
Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: raise AccessDenied("no matching rule found")
Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found
Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred:
Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify
Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: await call_socket_service(guivm, service, source_domain, params)
Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local
Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: reader, writer = await asyncio.open_unix_connection(path)
Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection
Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: transport, _ = await loop.create_unix_connection(
Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection
Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: await self.sock_connect(sock, path)
Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect
Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: return await fut
Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^
Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect
Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: sock.connect(address)
Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused
Jul 08 16:18:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.CheckWithTemplate+rpc-clipboard: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+volatile: sys-gui -> sys-net: allowed to dom0
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.List: sys-gui -> dom0: denied: no matching rule found
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: resolution = policy.evaluate(request)
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: rule = self.find_matching_rule(request)
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: raise AccessDenied("no matching rule found")
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred:
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: await call_socket_service(guivm, service, source_domain, params)
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: reader, writer = await asyncio.open_unix_connection(path)
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: transport, _ = await loop.create_unix_connection(
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: await self.sock_connect(sock, path)
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: return await fut
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: sock.connect(address)
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.List: sys-gui -> dom0: denied: no matching rule found
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: resolution = policy.evaluate(request)
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: rule = self.find_matching_rule(request)
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: raise AccessDenied("no matching rule found")
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred:
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last):
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: await call_socket_service(guivm, service, source_domain, params)
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: reader, writer = await asyncio.open_unix_connection(path)
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: transport, _ = await loop.create_unix_connection(
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: await self.sock_connect(sock, path)
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: return await fut
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: sock.connect(address)
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-allow-fullscreen: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+kernel: sys-gui -> sys-net: allowed to dom0
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.List+: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-allow-fullscreen: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-net: allowed to dom0
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.List+: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-override-redirect-protection: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-net: allowed to dom0
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.List+: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-override-redirect-protection: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.List+: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.List+: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-override-redirect: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.List+: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-override-redirect: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+root: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.List+: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-allow-utf8-titles: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.List+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:18:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+volatile: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:18:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-allow-utf8-titles: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.List+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:18:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-secure-copy-sequence: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:18:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+kernel: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:18:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.List+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:18:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-secure-copy-sequence: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:18:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.List+: sys-gui -> sys-net: allowed to dom0
Jul 08 16:18:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:18:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-secure-paste-sequence: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:18:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.List+: sys-gui -> sys-net: allowed to dom0
Jul 08 16:18:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-secure-paste-sequence: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:18:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.List+: sys-gui -> sys-net: allowed to dom0
Jul 08 16:18:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.List+: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:18:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-windows-count-limit: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:18:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.List+: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:18:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+root: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:18:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-windows-count-limit: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.List+: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:18:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-trayicon-mode: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:18:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:18:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.List+: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:18:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+volatile: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:18:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-trayicon-mode: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.List+: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:18:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+kernel: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:18:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-startup-timeout: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:18:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.List+: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:18:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:18:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-startup-timeout: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.List+: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:18:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.CheckWithTemplate+no-monitor-layout: sys-gui -> sys-net: allowed to dom0
Jul 08 16:18:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+root: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.Events+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:18:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.CheckWithTemplate+no-monitor-layout: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:18:27 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.SetMonitorLayout+: sys-gui -> sys-net: allowed to sys-net
Jul 08 16:18:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:27 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.SetMonitorLayout+: sys-gui -> sys-usb: allowed to sys-usb
Jul 08 16:18:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+volatile: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+kernel: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+root: sys-gui -> sys-net: allowed to dom0
Jul 08 16:18:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-net: allowed to dom0
Jul 08 16:18:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+volatile: sys-gui -> sys-net: allowed to dom0
Jul 08 16:18:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+kernel: sys-gui -> sys-net: allowed to dom0
Jul 08 16:18:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-net: allowed to dom0
Jul 08 16:18:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:28 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+root: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:18:28 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:28 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:18:28 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:28 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+volatile: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:18:28 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:28 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+kernel: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:18:28 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:28 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:18:28 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:28 dom0 qrexec-policy-daemon[4334]: qrexec: admin.Events+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:18:28 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:28 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.Stats+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:18:28 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:18:28 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:28 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:18:28 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:28 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:28 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:28 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:28 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:28 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-gui-debian-12: allowed to dom0
Jul 08 16:18:28 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:28 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0
Jul 08 16:18:28 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:28 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-net: allowed to dom0
Jul 08 16:18:28 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:28 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-net: allowed to dom0
Jul 08 16:18:28 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:28 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:18:29 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:29 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:18:29 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:29 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-usb: allowed to dom0
Jul 08 16:18:29 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:29 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> unencrypted-browser: allowed to dom0
Jul 08 16:18:29 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:29 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:29 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:29 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:29 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:29 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:29 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:29 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:29 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:29 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:29 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:29 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:29 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:29 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-initial-page: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:29 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-sort-running: sys-gui -> sys-gui: allowed to dom0
Jul 08 16:18:29 dom0 qrexec-policy-daemon[4334]: qrexec: admin.Events+: sys-gui -> @adminvm: allowed to dom0
Jul 08 16:18:44 dom0 systemd[1]: systemd-hostnamed.service: Deactivated successfully.
Jul 08 16:18:44 dom0 kernel: audit: type=1131 audit(1752009524.226:588): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:18:44 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 08 16:18:44 dom0 audit: BPF prog-id=79 op=UNLOAD
Jul 08 16:18:44 dom0 audit: BPF prog-id=78 op=UNLOAD
Jul 08 16:18:44 dom0 audit: BPF prog-id=77 op=UNLOAD
Jul 08 16:18:44 dom0 kernel: audit: type=1334 audit(1752009524.260:589): prog-id=79 op=UNLOAD
Jul 08 16:18:44 dom0 kernel: audit: type=1334 audit(1752009524.260:590): prog-id=78 op=UNLOAD
Jul 08 16:18:44 dom0 kernel: audit: type=1334 audit(1752009524.260:591): prog-id=77 op=UNLOAD
Jul 08 16:19:04 dom0 wireplumber[9005]: GetManagedObjects() failed: org.freedesktop.DBus.Error.NameHasNoOwner
Jul 08 16:19:21 dom0 sudo[18033]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory
Jul 08 16:19:21 dom0 sudo[18033]: PAM adding faulty module: /usr/lib64/security/pam_sss.so
Jul 08 16:19:21 dom0 audit[18033]: USER_ACCT pid=18033 uid=1000 auid=1000 ses=7 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="admin" exe="/usr/bin/sudo" hostname=dom0 addr=? terminal=/dev/tty2 res=success'
Jul 08 16:19:21 dom0 audit[18033]: USER_CMD pid=18033 uid=1000 auid=1000 ses=7 msg='cwd="/home/admin" cmd=6A6F75726E616C63746C202D2D73696E63653D746F646179 exe="/usr/bin/sudo" terminal=tty2 res=success'
Jul 08 16:19:21 dom0 sudo[18033]: admin : TTY=tty2 ; PWD=/home/admin ; USER=root ; COMMAND=/usr/bin/journalctl --since=today
Jul 08 16:19:21 dom0 audit[18033]: CRED_REFR pid=18033 uid=1000 auid=1000 ses=7 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=dom0 addr=? terminal=/dev/tty2 res=success'
Jul 08 16:19:21 dom0 kernel: audit: type=1101 audit(1752009561.861:592): pid=18033 uid=1000 auid=1000 ses=7 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="admin" exe="/usr/bin/sudo" hostname=dom0 addr=? terminal=/dev/tty2 res=success'
Jul 08 16:19:21 dom0 kernel: audit: type=1123 audit(1752009561.861:593): pid=18033 uid=1000 auid=1000 ses=7 msg='cwd="/home/admin" cmd=6A6F75726E616C63746C202D2D73696E63653D746F646179 exe="/usr/bin/sudo" terminal=tty2 res=success'
Jul 08 16:19:21 dom0 kernel: audit: type=1110 audit(1752009561.861:594): pid=18033 uid=1000 auid=1000 ses=7 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=dom0 addr=? terminal=/dev/tty2 res=success'
Jul 08 16:19:21 dom0 sudo[18033]: pam_unix(sudo:session): session opened for user root(uid=0) by admin(uid=1000)
Jul 08 16:19:21 dom0 kernel: audit: type=1105 audit(1752009561.863:595): pid=18033 uid=1000 auid=1000 ses=7 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=dom0 addr=? terminal=/dev/tty2 res=success'
Jul 08 16:19:21 dom0 audit[18033]: USER_START pid=18033 uid=1000 auid=1000 ses=7 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=dom0 addr=? terminal=/dev/tty2 res=success'