Jul 08 16:15:01 dom0 crond[7962]: (user) ERROR (getpwnam() failed - user unknown) Jul 08 16:15:01 dom0 crond[7962]: (user) ERROR (getpwnam() failed - user unknown) Jul 08 16:15:01 dom0 crond[7962]: (user) ERROR (getpwnam() failed - user unknown) Jul 08 16:15:03 dom0 lightdm[10600]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory Jul 08 16:15:03 dom0 lightdm[10600]: PAM adding faulty module: /usr/lib64/security/pam_sss.so Jul 08 16:15:11 dom0 audit[10600]: USER_AUTH pid=10600 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:authentication grantors=pam_usertype,pam_localuser,pam_unix acct="engineer" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Jul 08 16:15:11 dom0 audit[10600]: USER_ACCT pid=10600 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="engineer" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Jul 08 16:15:11 dom0 kernel: audit: type=1100 audit(1752009311.008:481): pid=10600 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:authentication grantors=pam_usertype,pam_localuser,pam_unix acct="engineer" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Jul 08 16:15:11 dom0 kernel: audit: type=1101 audit(1752009311.008:482): pid=10600 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="engineer" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Jul 08 16:15:11 dom0 systemd[1]: Stopping session-c2.scope - Session c2 of User lightdm... Jul 08 16:15:11 dom0 lightdm[9818]: pam_unix(lightdm-greeter:session): session closed for user lightdm Jul 08 16:15:11 dom0 audit[9818]: USER_END pid=9818 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_unix,pam_systemd acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Jul 08 16:15:11 dom0 kernel: audit: type=1106 audit(1752009311.059:483): pid=9818 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_unix,pam_systemd acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Jul 08 16:15:11 dom0 kernel: audit: type=1104 audit(1752009311.059:484): pid=9818 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_env,pam_permit acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Jul 08 16:15:11 dom0 audit[9818]: CRED_DISP pid=9818 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_env,pam_permit acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Jul 08 16:15:11 dom0 systemd[1]: session-c2.scope: Deactivated successfully. Jul 08 16:15:11 dom0 systemd[1]: Stopped session-c2.scope - Session c2 of User lightdm. Jul 08 16:15:11 dom0 systemd[1]: session-c2.scope: Consumed 1.791s CPU time. Jul 08 16:15:11 dom0 systemd-logind[3298]: Removed session c2. Jul 08 16:15:11 dom0 audit[10600]: CRED_ACQ pid=10600 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_localuser,pam_unix acct="engineer" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Jul 08 16:15:11 dom0 audit[10600]: SYSCALL arch=c000003e syscall=1 success=yes exit=4 a0=8 a1=7ffc0df86cd0 a2=4 a3=7ffc0df869e4 items=0 ppid=7963 pid=10600 auid=1001 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=5 comm="lightdm" exe="/usr/sbin/lightdm" key=(null) Jul 08 16:15:11 dom0 audit: PROCTITLE proctitle=6C69676874646D002D2D73657373696F6E2D6368696C64003132003234 Jul 08 16:15:11 dom0 kernel: audit: type=1103 audit(1752009311.065:485): pid=10600 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_localuser,pam_unix acct="engineer" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Jul 08 16:15:11 dom0 kernel: audit: type=1006 audit(1752009311.065:486): pid=10600 uid=0 old-auid=4294967295 auid=1001 tty=(none) old-ses=4294967295 ses=5 res=1 Jul 08 16:15:11 dom0 kernel: audit: type=1300 audit(1752009311.065:486): arch=c000003e syscall=1 success=yes exit=4 a0=8 a1=7ffc0df86cd0 a2=4 a3=7ffc0df869e4 items=0 ppid=7963 pid=10600 auid=1001 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=5 comm="lightdm" exe="/usr/sbin/lightdm" key=(null) Jul 08 16:15:11 dom0 kernel: audit: type=1327 audit(1752009311.065:486): proctitle=6C69676874646D002D2D73657373696F6E2D6368696C64003132003234 Jul 08 16:15:11 dom0 systemd[1]: Created slice user-1001.slice - User Slice of UID 1001. Jul 08 16:15:11 dom0 systemd[1]: Starting user-runtime-dir@1001.service - User Runtime Directory /run/user/1001... Jul 08 16:15:11 dom0 systemd-logind[3298]: New session 5 of user engineer. Jul 08 16:15:11 dom0 systemd[1]: Finished user-runtime-dir@1001.service - User Runtime Directory /run/user/1001. Jul 08 16:15:11 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@1001 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:15:11 dom0 kernel: audit: type=1130 audit(1752009311.087:487): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@1001 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:15:11 dom0 systemd[1]: Starting user@1001.service - User Manager for UID 1001... Jul 08 16:15:11 dom0 (systemd)[10663]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory Jul 08 16:15:11 dom0 (systemd)[10663]: PAM adding faulty module: /usr/lib64/security/pam_sss.so Jul 08 16:15:11 dom0 (systemd)[10663]: pam_systemd_home(systemd-user:account): systemd-homed is not available: Could not activate remote peer: activation request failed: unknown unit. Jul 08 16:15:11 dom0 audit[10663]: USER_ACCT pid=10663 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_unix acct="engineer" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:15:11 dom0 audit[10663]: CRED_ACQ pid=10663 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=? acct="engineer" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 08 16:15:11 dom0 audit[10663]: SYSCALL arch=c000003e syscall=1 success=yes exit=4 a0=8 a1=7fff893bb3a0 a2=4 a3=7fff893bb0b4 items=0 ppid=1 pid=10663 auid=1001 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=6 comm="(systemd)" exe="/usr/lib/systemd/systemd" key=(null) Jul 08 16:15:11 dom0 kernel: audit: type=1101 audit(1752009311.095:488): pid=10663 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_unix acct="engineer" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:15:11 dom0 audit: PROCTITLE proctitle="(systemd)" Jul 08 16:15:11 dom0 audit[10663]: USER_START pid=10663 uid=0 auid=1001 ses=6 msg='op=PAM:session_open grantors=pam_selinux,pam_selinux,pam_loginuid,pam_namespace,pam_systemd_home,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="engineer" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:15:11 dom0 (systemd)[10663]: pam_unix(systemd-user:session): session opened for user engineer(uid=1001) by (uid=0) Jul 08 16:15:11 dom0 systemd[10663]: Queued start job for default target default.target. Jul 08 16:15:11 dom0 systemd[10663]: Created slice app.slice - User Application Slice. Jul 08 16:15:11 dom0 systemd[10663]: Created slice session.slice - User Core Session Slice. Jul 08 16:15:11 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user@1001 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:15:11 dom0 systemd[10663]: Started grub-boot-success.timer - Mark boot as successful after the user session has run 2 minutes. Jul 08 16:15:11 dom0 systemd[10663]: Started systemd-tmpfiles-clean.timer - Daily Cleanup of User's Temporary Directories. Jul 08 16:15:11 dom0 systemd[10663]: Reached target paths.target - Paths. Jul 08 16:15:11 dom0 systemd[10663]: Reached target timers.target - Timers. Jul 08 16:15:11 dom0 systemd[10663]: Starting dbus.socket - D-Bus User Message Bus Socket... Jul 08 16:15:11 dom0 systemd[10663]: Listening on pipewire-pulse.socket - PipeWire PulseAudio. Jul 08 16:15:11 dom0 audit[10600]: USER_START pid=10600 uid=0 auid=1001 ses=5 msg='op=PAM:session_open grantors=pam_selinux,pam_loginuid,pam_selinux,pam_keyinit,pam_namespace,pam_keyinit,pam_limits,pam_systemd,pam_unix,pam_lastlog,pam_umask,pam_lastlog acct="engineer" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Jul 08 16:15:11 dom0 lightdm[10600]: pam_unix(lightdm:session): session opened for user engineer(uid=1001) by (uid=0) Jul 08 16:15:11 dom0 audit[10600]: USER_LOGIN pid=10600 uid=0 auid=1001 ses=5 msg='op=login id=1001 exe="/usr/sbin/lightdm" hostname=dom0 addr=? terminal=/dev/tty1 res=success' Jul 08 16:15:11 dom0 systemd[10663]: Listening on pipewire.socket - PipeWire Multimedia System Sockets. Jul 08 16:15:11 dom0 systemd[10663]: Listening on ssh-agent.socket - OpenSSH key agent. Jul 08 16:15:11 dom0 systemd[10663]: Starting systemd-tmpfiles-setup.service - Create User's Volatile Files and Directories... Jul 08 16:15:11 dom0 systemd[10663]: Finished systemd-tmpfiles-setup.service - Create User's Volatile Files and Directories. Jul 08 16:15:11 dom0 systemd[10663]: Listening on dbus.socket - D-Bus User Message Bus Socket. Jul 08 16:15:11 dom0 systemd[10663]: Reached target sockets.target - Sockets. Jul 08 16:15:11 dom0 systemd[10663]: Reached target basic.target - Basic System. Jul 08 16:15:11 dom0 systemd[1]: Started user@1001.service - User Manager for UID 1001. Jul 08 16:15:11 dom0 systemd[1]: Started session-5.scope - Session 5 of User engineer. Jul 08 16:15:11 dom0 systemd[10663]: Started pipewire.service - PipeWire Multimedia Service. Jul 08 16:15:11 dom0 systemd[10663]: Started wireplumber.service - Multimedia Service Session Manager. Jul 08 16:15:11 dom0 systemd[10663]: Started pipewire-pulse.service - PipeWire PulseAudio. Jul 08 16:15:11 dom0 systemd[10663]: Reached target default.target - Main User Target. Jul 08 16:15:11 dom0 systemd[10663]: Startup finished in 638ms. Jul 08 16:15:11 dom0 systemd[10663]: Started dbus-daemon.service - D-Bus User Message Bus. Jul 08 16:15:11 dom0 rtkit-daemon[8325]: Successfully made thread 10676 of process 10676 (/usr/bin/wireplumber) owned by '1001' high priority at nice level -11. Jul 08 16:15:11 dom0 rtkit-daemon[8325]: Successfully made thread 10677 of process 10677 (/usr/bin/pipewire) owned by '1001' high priority at nice level -11. Jul 08 16:15:11 dom0 rtkit-daemon[8325]: Successfully made thread 10693 of process 10676 (/usr/bin/wireplumber) owned by '1001' RT at priority 20. Jul 08 16:15:11 dom0 rtkit-daemon[8325]: Successfully made thread 10696 of process 10677 (/usr/bin/pipewire) owned by '1001' RT at priority 20. Jul 08 16:15:11 dom0 wireplumber[10676]: Failed to set scheduler settings: Operation not permitted Jul 08 16:15:11 dom0 rtkit-daemon[8325]: Successfully made thread 10675 of process 10675 (/usr/bin/pipewire) owned by '1001' high priority at nice level -11. Jul 08 16:15:11 dom0 rtkit-daemon[8325]: Successfully made thread 10695 of process 10675 (/usr/bin/pipewire) owned by '1001' RT at priority 20. Jul 08 16:15:11 dom0 wireplumber[10676]: SPA handle 'api.libcamera.enum.manager' could not be loaded; is it installed? Jul 08 16:15:11 dom0 wireplumber[10676]: PipeWire's libcamera SPA missing or broken. libcamera not supported. Jul 08 16:15:11 dom0 audit: BPF prog-id=71 op=LOAD Jul 08 16:15:11 dom0 audit: BPF prog-id=72 op=LOAD Jul 08 16:15:11 dom0 audit: BPF prog-id=73 op=LOAD Jul 08 16:15:11 dom0 systemd[1]: Starting systemd-hostnamed.service - Hostname Service... Jul 08 16:15:12 dom0 systemd[1]: Started systemd-hostnamed.service - Hostname Service. Jul 08 16:15:12 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:15:12 dom0 wireplumber[10676]: GetManagedObjects() failed: org.freedesktop.DBus.Error.NameHasNoOwner Jul 08 16:15:12 dom0 sudo[10743]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory Jul 08 16:15:12 dom0 sudo[10743]: PAM adding faulty module: /usr/lib64/security/pam_sss.so Jul 08 16:15:12 dom0 audit[10743]: USER_ACCT pid=10743 uid=1001 auid=1001 ses=5 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="engineer" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 08 16:15:12 dom0 audit[10743]: USER_CMD pid=10743 uid=1001 auid=1001 ses=5 msg='cwd="/home/engineer" cmd=67726570205E7379732D6775693A202F6574632F71756265732D7379732D6775692D757365722D70617373776F726473 exe="/usr/bin/sudo" terminal=? res=success' Jul 08 16:15:12 dom0 sudo[10743]: engineer : PWD=/home/engineer ; USER=root ; COMMAND=/usr/bin/grep ^sys-gui: /etc/qubes-sys-gui-user-passwords Jul 08 16:15:12 dom0 audit[10743]: CRED_REFR pid=10743 uid=1001 auid=1001 ses=5 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 08 16:15:12 dom0 sudo[10743]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1001) Jul 08 16:15:12 dom0 audit[10743]: USER_START pid=10743 uid=1001 auid=1001 ses=5 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 08 16:15:12 dom0 sudo[10743]: pam_unix(sudo:session): session closed for user root Jul 08 16:15:12 dom0 audit[10743]: USER_END pid=10743 uid=1001 auid=1001 ses=5 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 08 16:15:12 dom0 audit[10743]: CRED_DISP pid=10743 uid=1001 auid=1001 ses=5 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 08 16:15:15 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:15 dom0 qubesd[4330]: warning: !compat-4.0 directive in file /etc/qubes/policy.d/35-compat.policy line 16 is transitional and will be deprecated Jul 08 16:15:15 dom0 qubesd[4330]: ignoring /etc/qubes-rpc/policy/include (not a file) Jul 08 16:15:15 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:15 dom0 qrexec-policy-daemon[4334]: qrexec: admin.Events+: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:15 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:15 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:15 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:15 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll: sys-gui -> dom0: denied: no matching rule found Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0 Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: resolution = policy.evaluate(request) Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: rule = self.find_matching_rule(request) Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: raise AccessDenied("no matching rule found") Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred: Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: await call_socket_service(guivm, service, source_domain, params) Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: reader, writer = await asyncio.open_unix_connection(path) Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: transport, _ = await loop.create_unix_connection( Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: await self.sock_connect(sock, path) Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: return await fut Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^ Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: sock.connect(address) Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.List+: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-secure-copy-sequence: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+template_for_dispvms: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+linux-kernel: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll: sys-gui -> dom0: denied: no matching rule found Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0 Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: resolution = policy.evaluate(request) Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: rule = self.find_matching_rule(request) Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: raise AccessDenied("no matching rule found") Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred: Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: await call_socket_service(guivm, service, source_domain, params) Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: reader, writer = await asyncio.open_unix_connection(path) Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: transport, _ = await loop.create_unix_connection( Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: await self.sock_connect(sock, path) Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: return await fut Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^ Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: sock.connect(address) Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+updates-available: sys-gui -> dom0: denied: no matching rule found Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0 Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: resolution = policy.evaluate(request) Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: rule = self.find_matching_rule(request) Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: raise AccessDenied("no matching rule found") Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred: Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: await call_socket_service(guivm, service, source_domain, params) Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: reader, writer = await asyncio.open_unix_connection(path) Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: transport, _ = await loop.create_unix_connection( Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: await self.sock_connect(sock, path) Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: return await fut Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^ Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: sock.connect(address) Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-secure-paste-sequence: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+updateable: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+os-eol: sys-gui -> dom0: denied: no matching rule found Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0 Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: resolution = policy.evaluate(request) Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: rule = self.find_matching_rule(request) Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: raise AccessDenied("no matching rule found") Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred: Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: await call_socket_service(guivm, service, source_domain, params) Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: reader, writer = await asyncio.open_unix_connection(path) Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: transport, _ = await loop.create_unix_connection( Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: await self.sock_connect(sock, path) Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: return await fut Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^ Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: sock.connect(address) Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+linux-kernel: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.Events+: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+updates-available: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.Info+linux-kernel: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+updates-available: sys-gui -> dom0: denied: no matching rule found Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0 Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: resolution = policy.evaluate(request) Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: rule = self.find_matching_rule(request) Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: raise AccessDenied("no matching rule found") Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred: Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: await call_socket_service(guivm, service, source_domain, params) Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: reader, writer = await asyncio.open_unix_connection(path) Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: transport, _ = await loop.create_unix_connection( Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: await self.sock_connect(sock, path) Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: return await fut Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^ Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: sock.connect(address) Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:16 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+os-eol: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+linux-kernel: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+servicevm: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:17 dom0 xenstored[3342]: write rate limit: domain 5 is affected Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.List+: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+template-name: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll: sys-gui -> dom0: denied: no matching rule found Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0 Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: resolution = policy.evaluate(request) Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: rule = self.find_matching_rule(request) Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: raise AccessDenied("no matching rule found") Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred: Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: await call_socket_service(guivm, service, source_domain, params) Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: reader, writer = await asyncio.open_unix_connection(path) Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: transport, _ = await loop.create_unix_connection( Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: await self.sock_connect(sock, path) Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: return await fut Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^ Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: sock.connect(address) Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+pool00: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+root: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+template_for_dispvms: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+pool00: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+updates-available: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll: sys-gui -> dom0: denied: no matching rule found Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0 Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: resolution = policy.evaluate(request) Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: rule = self.find_matching_rule(request) Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: raise AccessDenied("no matching rule found") Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred: Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: await call_socket_service(guivm, service, source_domain, params) Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: reader, writer = await asyncio.open_unix_connection(path) Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: transport, _ = await loop.create_unix_connection( Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: await self.sock_connect(sock, path) Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: return await fut Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^ Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: sock.connect(address) Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.Info+pool00: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+os-eol: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.CheckWithTemplate+gui-emulated: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+volatile: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+label: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+pool00: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.Available: sys-gui -> dom0: denied: no matching rule found Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0 Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: resolution = policy.evaluate(request) Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: rule = self.find_matching_rule(request) Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: raise AccessDenied("no matching rule found") Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred: Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: await call_socket_service(guivm, service, source_domain, params) Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: reader, writer = await asyncio.open_unix_connection(path) Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: transport, _ = await loop.create_unix_connection( Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: await self.sock_connect(sock, path) Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: return await fut Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^ Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: sock.connect(address) Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+updates-available: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.CheckWithTemplate+gui: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:17 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+kernel: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.Available: sys-gui -> dom0: denied: no matching rule found Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0 Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: resolution = policy.evaluate(request) Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: rule = self.find_matching_rule(request) Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: raise AccessDenied("no matching rule found") Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred: Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: await call_socket_service(guivm, service, source_domain, params) Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: reader, writer = await asyncio.open_unix_connection(path) Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: transport, _ = await loop.create_unix_connection( Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: await self.sock_connect(sock, path) Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: return await fut Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^ Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: sock.connect(address) Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+icon: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+varlibqubes: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.CheckWithTemplate+gui: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.Available+: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+varlibqubes: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+appmenus-dispvm: sys-gui -> dom0: denied: no matching rule found Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0 Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: resolution = policy.evaluate(request) Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: rule = self.find_matching_rule(request) Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: raise AccessDenied("no matching rule found") Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred: Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: await call_socket_service(guivm, service, source_domain, params) Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: reader, writer = await asyncio.open_unix_connection(path) Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: transport, _ = await loop.create_unix_connection( Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: await self.sock_connect(sock, path) Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: return await fut Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^ Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: sock.connect(address) Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+os-eol: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.label.Get+red: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+updates-available: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll: sys-gui -> dom0: denied: no matching rule found Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0 Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: resolution = policy.evaluate(request) Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: rule = self.find_matching_rule(request) Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: raise AccessDenied("no matching rule found") Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred: Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: await call_socket_service(guivm, service, source_domain, params) Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: reader, writer = await asyncio.open_unix_connection(path) Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: transport, _ = await loop.create_unix_connection( Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: await self.sock_connect(sock, path) Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: return await fut Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^ Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: sock.connect(address) Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.Info+varlibqubes: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.label.Index+red: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+label: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+os-eol: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.pool.UsageDetails+varlibqubes: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+servicevm: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.CheckWithTemplate+rpc-clipboard: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.List+: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+icon: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+template-name: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+root: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-allow-fullscreen: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+updates-available: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+appmenus-dispvm: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:18 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.Available+: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-allow-fullscreen: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+template: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.Available+: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+os-eol: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-override-redirect-protection: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+volatile: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+servicevm: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.Available+: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.List+: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+template-name: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+kernel: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-override-redirect-protection: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.Available+: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+updates-available: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-override-redirect: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+appmenus-dispvm: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+template: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+os-eol: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.Available+: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+updates-available: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-override-redirect: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.List+: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.Available+: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+template-name: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-allow-utf8-titles: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.Available+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+servicevm: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:15:19 dom0 qrexec-policy-daemon[4334]: qrexec: admin.Events+: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-allow-utf8-titles: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.List+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+appmenus-dispvm: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.Available+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+root: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-secure-copy-sequence: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.Available+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-secure-copy-sequence: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+servicevm: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.Available+: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-secure-paste-sequence: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+volatile: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.Available+: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+kernel: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-secure-paste-sequence: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+template: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+appmenus-dispvm: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.Available+: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-windows-count-limit: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.Available+: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.List+: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-windows-count-limit: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+updates-available: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:20 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.Available+: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-trayicon-mode: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:21 dom0 systemd[1]: Stopping user@992.service - User Manager for UID 992... Jul 08 16:15:21 dom0 systemd[9822]: Activating special unit exit.target... Jul 08 16:15:21 dom0 systemd[9822]: Stopped target default.target - Main User Target. Jul 08 16:15:21 dom0 dbus-broker[9863]: Dispatched 22 messages @ 6(±7)μs / message. Jul 08 16:15:21 dom0 systemd[9822]: Stopping at-spi-dbus-bus.service - Accessibility services bus... Jul 08 16:15:21 dom0 systemd[9822]: Stopping dbus-:1.9-org.a11y.atspi.Registry@0.service... Jul 08 16:15:21 dom0 gvfsd[9865]: A connection to the bus can't be made Jul 08 16:15:21 dom0 systemd[9822]: Stopping dbus-daemon.service - D-Bus User Message Bus... Jul 08 16:15:21 dom0 systemd[9822]: Stopping gvfs-daemon.service - Virtual filesystem service... Jul 08 16:15:21 dom0 systemd[9822]: Stopping pipewire-pulse.service - PipeWire PulseAudio... Jul 08 16:15:21 dom0 systemd[9822]: Stopped dbus-daemon.service - D-Bus User Message Bus. Jul 08 16:15:21 dom0 systemd[9822]: Stopped at-spi-dbus-bus.service - Accessibility services bus. Jul 08 16:15:21 dom0 systemd[9822]: Stopped gvfs-daemon.service - Virtual filesystem service. Jul 08 16:15:21 dom0 systemd[9822]: Stopped dbus-:1.9-org.a11y.atspi.Registry@0.service. Jul 08 16:15:21 dom0 systemd[9822]: Stopped pipewire-pulse.service - PipeWire PulseAudio. Jul 08 16:15:21 dom0 systemd[9822]: Removed slice app-dbus\x2d:1.9\x2dorg.a11y.atspi.Registry.slice - Slice /app/dbus-:1.9-org.a11y.atspi.Registry. Jul 08 16:15:21 dom0 systemd[9822]: Stopping wireplumber.service - Multimedia Service Session Manager... Jul 08 16:15:21 dom0 wireplumber[9839]: stopped by signal: Terminated Jul 08 16:15:21 dom0 wireplumber[9839]: disconnected from pipewire Jul 08 16:15:21 dom0 systemd[9822]: Stopped wireplumber.service - Multimedia Service Session Manager. Jul 08 16:15:21 dom0 systemd[9822]: Stopping pipewire.service - PipeWire Multimedia Service... Jul 08 16:15:21 dom0 systemd[9822]: Stopped pipewire.service - PipeWire Multimedia Service. Jul 08 16:15:21 dom0 systemd[9822]: Removed slice session.slice - User Core Session Slice. Jul 08 16:15:21 dom0 systemd[9822]: Stopped target basic.target - Basic System. Jul 08 16:15:21 dom0 systemd[9822]: Stopped target paths.target - Paths. Jul 08 16:15:21 dom0 systemd[9822]: Stopped target sockets.target - Sockets. Jul 08 16:15:21 dom0 systemd[9822]: Stopped target timers.target - Timers. Jul 08 16:15:21 dom0 systemd[9822]: Stopped systemd-tmpfiles-clean.timer - Daily Cleanup of User's Temporary Directories. Jul 08 16:15:21 dom0 systemd[9822]: Closed dbus.socket - D-Bus User Message Bus Socket. Jul 08 16:15:21 dom0 systemd[9822]: Closed pipewire-pulse.socket - PipeWire PulseAudio. Jul 08 16:15:21 dom0 systemd[9822]: Closed pipewire.socket - PipeWire Multimedia System Sockets. Jul 08 16:15:21 dom0 systemd[9822]: Closed ssh-agent.socket - OpenSSH key agent. Jul 08 16:15:21 dom0 systemd[9822]: Stopped systemd-tmpfiles-setup.service - Create User's Volatile Files and Directories. Jul 08 16:15:21 dom0 systemd[9822]: Removed slice app.slice - User Application Slice. Jul 08 16:15:21 dom0 systemd[9822]: Reached target shutdown.target - Shutdown. Jul 08 16:15:21 dom0 systemd[9822]: Finished systemd-exit.service - Exit the Session. Jul 08 16:15:21 dom0 systemd[9822]: Reached target exit.target - Exit the Session. Jul 08 16:15:21 dom0 systemd[1]: user@992.service: Deactivated successfully. Jul 08 16:15:21 dom0 systemd[1]: Stopped user@992.service - User Manager for UID 992. Jul 08 16:15:21 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user@992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:15:21 dom0 kernel: kauditd_printk_skb: 18 callbacks suppressed Jul 08 16:15:21 dom0 kernel: audit: type=1131 audit(1752009321.174:505): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user@992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:15:21 dom0 systemd[1]: Stopping user-runtime-dir@992.service - User Runtime Directory /run/user/992... Jul 08 16:15:21 dom0 systemd[1]: run-user-992.mount: Deactivated successfully. Jul 08 16:15:21 dom0 systemd[1]: user-runtime-dir@992.service: Deactivated successfully. Jul 08 16:15:21 dom0 systemd[1]: Stopped user-runtime-dir@992.service - User Runtime Directory /run/user/992. Jul 08 16:15:21 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:15:21 dom0 kernel: audit: type=1131 audit(1752009321.197:506): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:15:21 dom0 systemd[1]: Removed slice user-992.slice - User Slice of UID 992. Jul 08 16:15:21 dom0 systemd[1]: user-992.slice: Consumed 2.751s CPU time. Jul 08 16:15:21 dom0 systemd[8996]: Starting grub-boot-success.service - Mark boot as successful... Jul 08 16:15:21 dom0 systemd[8996]: Finished grub-boot-success.service - Mark boot as successful. Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.Available+: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+servicevm: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-trayicon-mode: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.List+: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.Available+: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+appmenus-dispvm: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-startup-timeout: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+root: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.Available+: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+template: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:21 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-startup-timeout: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+servicevm: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.List+: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.Available+: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+volatile: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.CheckWithTemplate+gui-emulated: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+appmenus-dispvm: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.List: sys-gui -> dom0: denied: no matching rule found Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0 Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: resolution = policy.evaluate(request) Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: rule = self.find_matching_rule(request) Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: raise AccessDenied("no matching rule found") Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred: Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: await call_socket_service(guivm, service, source_domain, params) Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: reader, writer = await asyncio.open_unix_connection(path) Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: transport, _ = await loop.create_unix_connection( Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: await self.sock_connect(sock, path) Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: return await fut Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^ Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: sock.connect(address) Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+kernel: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.CheckWithTemplate+gui: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.List: sys-gui -> dom0: denied: no matching rule found Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0 Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: resolution = policy.evaluate(request) Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: rule = self.find_matching_rule(request) Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: raise AccessDenied("no matching rule found") Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred: Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: await call_socket_service(guivm, service, source_domain, params) Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: reader, writer = await asyncio.open_unix_connection(path) Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: transport, _ = await loop.create_unix_connection( Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: await self.sock_connect(sock, path) Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: return await fut Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^ Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: sock.connect(address) Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.CheckWithTemplate+gui: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.List: sys-gui -> dom0: denied: no matching rule found Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: error calling qrexec-policy-agent in dom0 Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 372, in handle_request Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: resolution = policy.evaluate(request) Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1625, in evaluate Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: rule = self.find_matching_rule(request) Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/policy/parser.py", line 1634, in find_matching_rule Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: raise AccessDenied("no matching rule found") Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec.exc.AccessDenied: no matching rule found Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: During handling of the above exception, another exception occurred: Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: Traceback (most recent call last): Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/tools/qrexec_policy_exec.py", line 149, in notify Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: await call_socket_service(guivm, service, source_domain, params) Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib/python3.11/site-packages/qrexec/server.py", line 108, in call_socket_service_local Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: reader, writer = await asyncio.open_unix_connection(path) Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/streams.py", line 97, in open_unix_connection Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: transport, _ = await loop.create_unix_connection( Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/unix_events.py", line 259, in create_unix_connection Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: await self.sock_connect(sock, path) Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 634, in sock_connect Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: return await fut Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: ^^^^^^^^^ Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: File "/usr/lib64/python3.11/asyncio/selector_events.py", line 642, in _sock_connect Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: sock.connect(address) Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: ConnectionRefusedError: [Errno 111] Connection refused Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.CheckWithTemplate+rpc-clipboard: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.List+: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-allow-fullscreen: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.List+: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-allow-fullscreen: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.List+: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-override-redirect-protection: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.List+: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:22 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+root: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-override-redirect-protection: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.List+: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-override-redirect: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.List+: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+volatile: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.List+: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-override-redirect: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+kernel: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-allow-utf8-titles: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.List+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-allow-utf8-titles: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.List+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-net -> @adminvm: allowed to sys-gui Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.List+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-secure-copy-sequence: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+label: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:23 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-secure-copy-sequence: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.List+: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.List+: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.List+: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.label.Get+red: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-secure-paste-sequence: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+root: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.List+: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-secure-paste-sequence: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-windows-count-limit: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.List+: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+volatile: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.List+: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-windows-count-limit: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+kernel: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.List+: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-trayicon-mode: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.block.List+: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-trayicon-mode: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+root: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.usb.List+: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-startup-timeout: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+gui-default-startup-timeout: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:24 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.device.mic.List+: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+volatile: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.CheckWithTemplate+no-monitor-layout: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.Events+: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+kernel: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.CheckWithTemplate+no-monitor-layout: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.SetMonitorLayout+: sys-gui -> sys-net: allowed to sys-net Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.SetMonitorLayout+: sys-gui -> sys-usb: allowed to sys-usb Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+root: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+volatile: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+kernel: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+root: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+volatile: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+kernel: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.volume.Info+private: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:25 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.Stats+: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.Events+: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:26 dom0 systemd[8996]: Started dbus-:1.11-org.a11y.atspi.Registry@1.service. Jul 08 16:15:26 dom0 at-spi2-registryd[11516]: No protocol specified Jul 08 16:15:26 dom0 at-spi2-registr[11516]: Could not open X display Jul 08 16:15:26 dom0 at-spi2-registryd[11516]: SpiRegistry daemon is running with well-known name - org.a11y.atspi.Registry Jul 08 16:15:26 dom0 at-spi2-registryd[11516]: No protocol specified Jul 08 16:15:26 dom0 at-spi2-registr[11516]: AT-SPI: Cannot open default display Jul 08 16:15:26 dom0 systemd[8996]: dbus-:1.11-org.a11y.atspi.Registry@1.service: Main process exited, code=exited, status=1/FAILURE Jul 08 16:15:26 dom0 systemd[8996]: dbus-:1.11-org.a11y.atspi.Registry@1.service: Failed with result 'exit-code'. Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-gui-debian-12: allowed to dom0 Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-gui-fedora-41-xfce: allowed to dom0 Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-usb -> @adminvm: allowed to sys-gui Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.List+: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-net: allowed to dom0 Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.Get+label: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+internal: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.property.GetAll+: sys-gui -> sys-usb: allowed to dom0 Jul 08 16:15:26 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.CurrentState+: sys-gui -> unencrypted-browser: allowed to dom0 Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-favorites: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-initial-page: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.vm.feature.Get+menu-sort-running: sys-gui -> sys-gui: allowed to dom0 Jul 08 16:15:27 dom0 qrexec-policy-daemon[4334]: qrexec: admin.Events+: sys-gui -> @adminvm: allowed to dom0 Jul 08 16:15:34 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-firewall-localnet -> @adminvm: allowed to dom0 Jul 08 16:15:34 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-firewall-chocolatey -> @adminvm: allowed to dom0 Jul 08 16:15:34 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-firewall -> @adminvm: allowed to dom0 Jul 08 16:15:34 dom0 qrexec-policy-daemon[4334]: qrexec: qubes.WindowIconUpdater+: sys-firewall-full-internet -> @adminvm: allowed to dom0 Jul 08 16:15:42 dom0 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Jul 08 16:15:42 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:15:42 dom0 kernel: audit: type=1131 audit(1752009342.054:507): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 08 16:15:42 dom0 audit: BPF prog-id=73 op=UNLOAD Jul 08 16:15:42 dom0 audit: BPF prog-id=72 op=UNLOAD Jul 08 16:15:42 dom0 audit: BPF prog-id=71 op=UNLOAD Jul 08 16:15:42 dom0 kernel: audit: type=1334 audit(1752009342.074:508): prog-id=73 op=UNLOAD Jul 08 16:15:42 dom0 kernel: audit: type=1334 audit(1752009342.074:509): prog-id=72 op=UNLOAD Jul 08 16:15:42 dom0 kernel: audit: type=1334 audit(1752009342.074:510): prog-id=71 op=UNLOAD