Txtrapline

journalctl-with-name

Apr 20th, 2024
24
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 424.46 KB | None | 0 0
  1. Apr 20 15:26:14 localhost kernel: Linux version 6.1.62-1.qubes.fc37.x86_64 (mockbuild@2c90eb99ba994f74a70d51db283f91db) (gcc (GCC) 12.3.1 20230508 (Red Hat 12.3.1-1), GNU ld version 2.38-27.fc37) #1 SMP PREEMPT_DYNAMIC Tue Nov 14 06:16:38 GMT 2023
  2. Apr 20 15:26:14 localhost kernel: Command line: placeholder root=/dev/mapper/qubes_dom0-root ro rd.luks.uuid=luks-5241442a-6636-45da-8731-66d029364f3d rd.lvm.lv=qubes_dom0/root rd.lvm.lv=qubes_dom0/swap plymouth.ignore-serial-consoles 6.1.62-1.qubes.fc37.x86_64 x86_64 rhgb rd.qubes.hide_pci=01:00.0,01:00.1 quiet usbcore.authorized_default=0
  3. Apr 20 15:26:14 localhost kernel: Released 0 page(s)
  4. Apr 20 15:26:14 localhost kernel: BIOS-provided physical RAM map:
  5. Apr 20 15:26:14 localhost kernel: Xen: [mem 0x0000000000000000-0x000000000009dfff] usable
  6. Apr 20 15:26:14 localhost kernel: Xen: [mem 0x000000000009e000-0x000000000009efff] reserved
  7. Apr 20 15:26:14 localhost kernel: Xen: [mem 0x000000000009f000-0x000000000009ffff] usable
  8. Apr 20 15:26:14 localhost kernel: Xen: [mem 0x00000000000a0000-0x00000000000fffff] reserved
  9. Apr 20 15:26:14 localhost kernel: Xen: [mem 0x0000000000100000-0x0000000061e2afff] usable
  10. Apr 20 15:26:14 localhost kernel: Xen: [mem 0x0000000061e2b000-0x0000000061e2bfff] reserved
  11. Apr 20 15:26:14 localhost kernel: Xen: [mem 0x0000000061e2c000-0x0000000063e9bfff] usable
  12. Apr 20 15:26:14 localhost kernel: Xen: [mem 0x0000000063e9c000-0x0000000063e9cfff] reserved
  13. Apr 20 15:26:14 localhost kernel: Xen: [mem 0x0000000063e9d000-0x000000006e07cfff] usable
  14. Apr 20 15:26:14 localhost kernel: Xen: [mem 0x000000006e07d000-0x0000000071d7cfff] reserved
  15. Apr 20 15:26:14 localhost kernel: Xen: [mem 0x0000000071d7d000-0x0000000071ff0fff] ACPI data
  16. Apr 20 15:26:14 localhost kernel: Xen: [mem 0x0000000071ff1000-0x000000007261efff] ACPI NVS
  17. Apr 20 15:26:14 localhost kernel: Xen: [mem 0x000000007261f000-0x0000000073efefff] reserved
  18. Apr 20 15:26:14 localhost kernel: Xen: [mem 0x0000000073eff000-0x0000000073efffff] usable
  19. Apr 20 15:26:14 localhost kernel: Xen: [mem 0x0000000073f00000-0x0000000079ffffff] reserved
  20. Apr 20 15:26:14 localhost kernel: Xen: [mem 0x000000007a400000-0x000000007a7fffff] reserved
  21. Apr 20 15:26:14 localhost kernel: Xen: [mem 0x000000007b000000-0x00000000807fffff] reserved
  22. Apr 20 15:26:14 localhost kernel: Xen: [mem 0x00000000c0000000-0x00000000cfffffff] reserved
  23. Apr 20 15:26:14 localhost kernel: Xen: [mem 0x00000000fe000000-0x00000000fe010fff] reserved
  24. Apr 20 15:26:14 localhost kernel: Xen: [mem 0x00000000fec00000-0x00000000fec00fff] reserved
  25. Apr 20 15:26:14 localhost kernel: Xen: [mem 0x00000000fed00000-0x00000000fed00fff] reserved
  26. Apr 20 15:26:14 localhost kernel: Xen: [mem 0x00000000fed20000-0x00000000fed7ffff] reserved
  27. Apr 20 15:26:14 localhost kernel: Xen: [mem 0x00000000fed90000-0x00000000fed91fff] reserved
  28. Apr 20 15:26:14 localhost kernel: Xen: [mem 0x00000000fee00000-0x00000000feefffff] reserved
  29. Apr 20 15:26:14 localhost kernel: Xen: [mem 0x00000000ff000000-0x00000000ffffffff] reserved
  30. Apr 20 15:26:14 localhost kernel: Xen: [mem 0x0000000100000000-0x0000000191fe4fff] usable
  31. Apr 20 15:26:14 localhost kernel: NX (Execute Disable) protection: active
  32. Apr 20 15:26:14 localhost kernel: efi: EFI v2.80 by American Megatrends
  33. Apr 20 15:26:14 localhost kernel: efi: ACPI=0x71ff0000 ACPI 2.0=0x71ff0014 TPMFinalLog=0x724ec000 SMBIOS=0x73956000 SMBIOS 3.0=0x73955000 (MEMATTR=0x6b191298) may have been clobbered by Xen ESRT=0x71f4cc18
  34. Apr 20 15:26:14 localhost kernel: SMBIOS 3.5.0 present.
  35. Apr 20 15:26:14 localhost kernel: DMI: ASUS System Product Name/ROG STRIX Z790-E GAMING WIFI, BIOS 1501 10/05/2023
  36. Apr 20 15:26:14 localhost kernel: Hypervisor detected: Xen PV
  37. Apr 20 15:26:14 localhost kernel: tsc: Detected 3187.192 MHz processor
  38. Apr 20 15:26:14 localhost kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved
  39. Apr 20 15:26:14 localhost kernel: e820: remove [mem 0x000a0000-0x000fffff] usable
  40. Apr 20 15:26:14 localhost kernel: last_pfn = 0x191fe5 max_arch_pfn = 0x400000000
  41. Apr 20 15:26:14 localhost kernel: Disabled
  42. Apr 20 15:26:14 localhost kernel: x86/PAT: MTRRs disabled, skipping PAT initialization too.
  43. Apr 20 15:26:14 localhost kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT
  44. Apr 20 15:26:14 localhost kernel: last_pfn = 0x73f00 max_arch_pfn = 0x400000000
  45. Apr 20 15:26:14 localhost kernel: esrt: Reserving ESRT space from 0x0000000071f4cc18 to 0x0000000071f4ccf0.
  46. Apr 20 15:26:14 localhost kernel: Secure boot disabled
  47. Apr 20 15:26:14 localhost kernel: RAMDISK: [mem 0x08000000-0x0a619fff]
  48. Apr 20 15:26:14 localhost kernel: ACPI: Early table checksum verification disabled
  49. Apr 20 15:26:14 localhost kernel: ACPI: RSDP 0x0000000071FF0014 000024 (v02 ALASKA)
  50. Apr 20 15:26:14 localhost kernel: ACPI: XSDT 0x0000000071FEF728 0000FC (v01 ALASKA A M I 01072009 AMI 01000013)
  51. Apr 20 15:26:14 localhost kernel: ACPI: FACP 0x0000000071FEE000 000114 (v06 ALASKA A M I 01072009 AMI 01000013)
  52. Apr 20 15:26:14 localhost kernel: ACPI: DSDT 0x0000000071F62000 08BFBC (v02 ALASKA A M I 01072009 INTL 20200717)
  53. Apr 20 15:26:14 localhost kernel: ACPI: FACS 0x000000007261E000 000040
  54. Apr 20 15:26:14 localhost kernel: ACPI: FIDT 0x0000000071F61000 00009C (v01 ALASKA A M I 01072009 AMI 00010013)
  55. Apr 20 15:26:14 localhost kernel: ACPI: SSDT 0x0000000071F5F000 00038C (v02 PmaxDv Pmax_Dev 00000001 INTL 20200717)
  56. Apr 20 15:26:14 localhost kernel: ACPI: SSDT 0x0000000071F59000 005D34 (v02 CpuRef CpuSsdt 00003000 INTL 20200717)
  57. Apr 20 15:26:14 localhost kernel: ACPI: SSDT 0x0000000071F56000 002C11 (v02 SaSsdt SaSsdt 00003000 INTL 20200717)
  58. Apr 20 15:26:14 localhost kernel: ACPI: SSDT 0x0000000071F52000 00334F (v02 INTEL IgfxSsdt 00003000 INTL 20200717)
  59. Apr 20 15:26:14 localhost kernel: ACPI: HPET 0x0000000071F51000 000038 (v01 ALASKA A M I 01072009 AMI 01000013)
  60. Apr 20 15:26:14 localhost kernel: ACPI: APIC 0x0000000071F50000 0001DC (v05 ALASKA A M I 01072009 AMI 01000013)
  61. Apr 20 15:26:14 localhost kernel: ACPI: MCFG 0x0000000071F4F000 00003C (v01 ALASKA A M I 01072009 AMI 01000013)
  62. Apr 20 15:26:14 localhost kernel: ACPI: SSDT 0x0000000071F4D000 001F1A (v02 ALASKA Ther_Rvp 00001000 INTL 20200717)
  63. Apr 20 15:26:14 localhost kernel: ACPI: NHLT 0x0000000071F4B000 00002D (v00 ALASKA A M I 01072009 AMI 01000013)
  64. Apr 20 15:26:14 localhost kernel: ACPI: LPIT 0x0000000071F4A000 0000CC (v01 ALASKA A M I 01072009 AMI 01000013)
  65. Apr 20 15:26:14 localhost kernel: ACPI: SSDT 0x0000000071F46000 002357 (v02 ALASKA TbtTypeC 00000000 INTL 20200717)
  66. Apr 20 15:26:14 localhost kernel: ACPI: SSDT 0x0000000071F43000 002A83 (v02 ALASKA PtidDevc 00001000 INTL 20200717)
  67. Apr 20 15:26:14 localhost kernel: ACPI: DBGP 0x0000000071F42000 000034 (v01 ALASKA A M I 01072009 AMI 01000013)
  68. Apr 20 15:26:14 localhost kernel: ACPI: DBG2 0x0000000071F41000 000054 (v00 ALASKA A M I 01072009 AMI 01000013)
  69. Apr 20 15:26:14 localhost kernel: ACPI: SSDT 0x0000000071F40000 000C1F (v02 ALASKA UsbCTabl 00001000 INTL 20200717)
  70. Apr 20 15:26:14 localhost kernel: ACPI: RMAD 0x0000000071F3F000 000088 (v01 INTEL EDK2 00000002 01000013)
  71. Apr 20 15:26:14 localhost kernel: ACPI: FPDT 0x0000000071F3E000 000044 (v01 ALASKA A M I 01072009 AMI 01000013)
  72. Apr 20 15:26:14 localhost kernel: ACPI: SSDT 0x0000000071F3B000 002181 (v02 INTEL xh_rps14 00000000 INTL 20200717)
  73. Apr 20 15:26:14 localhost kernel: ACPI: SSDT 0x0000000071F37000 0039DA (v02 SocGpe SocGpe 00003000 INTL 20200717)
  74. Apr 20 15:26:14 localhost kernel: ACPI: SSDT 0x0000000071F33000 0039DA (v02 SocCmn SocCmn 00003000 INTL 20200717)
  75. Apr 20 15:26:14 localhost kernel: ACPI: BGRT 0x0000000071F32000 000038 (v01 ALASKA A M I 01072009 AMI 00010013)
  76. Apr 20 15:26:14 localhost kernel: ACPI: WPBT 0x0000000071DFD000 000040 (v01 ALASKA A M I 00000001 ASUS 00000001)
  77. Apr 20 15:26:14 localhost kernel: ACPI: TPM2 0x0000000071DFC000 00004C (v04 ALASKA A M I 00000001 AMI 00000000)
  78. Apr 20 15:26:14 localhost kernel: ACPI: PHAT 0x0000000071DFB000 000AA7 (v01 ALASKA A M I 00000005 MSFT 0100000D)
  79. Apr 20 15:26:14 localhost kernel: ACPI: WSMT 0x0000000071F49000 000028 (v01 ALASKA A M I 01072009 AMI 00010013)
  80. Apr 20 15:26:14 localhost kernel: ACPI: Reserving FACP table memory at [mem 0x71fee000-0x71fee113]
  81. Apr 20 15:26:14 localhost kernel: ACPI: Reserving DSDT table memory at [mem 0x71f62000-0x71fedfbb]
  82. Apr 20 15:26:14 localhost kernel: ACPI: Reserving FACS table memory at [mem 0x7261e000-0x7261e03f]
  83. Apr 20 15:26:14 localhost kernel: ACPI: Reserving FIDT table memory at [mem 0x71f61000-0x71f6109b]
  84. Apr 20 15:26:14 localhost kernel: ACPI: Reserving SSDT table memory at [mem 0x71f5f000-0x71f5f38b]
  85. Apr 20 15:26:14 localhost kernel: ACPI: Reserving SSDT table memory at [mem 0x71f59000-0x71f5ed33]
  86. Apr 20 15:26:14 localhost kernel: ACPI: Reserving SSDT table memory at [mem 0x71f56000-0x71f58c10]
  87. Apr 20 15:26:14 localhost kernel: ACPI: Reserving SSDT table memory at [mem 0x71f52000-0x71f5534e]
  88. Apr 20 15:26:14 localhost kernel: ACPI: Reserving HPET table memory at [mem 0x71f51000-0x71f51037]
  89. Apr 20 15:26:14 localhost kernel: ACPI: Reserving APIC table memory at [mem 0x71f50000-0x71f501db]
  90. Apr 20 15:26:14 localhost kernel: ACPI: Reserving MCFG table memory at [mem 0x71f4f000-0x71f4f03b]
  91. Apr 20 15:26:14 localhost kernel: ACPI: Reserving SSDT table memory at [mem 0x71f4d000-0x71f4ef19]
  92. Apr 20 15:26:14 localhost kernel: ACPI: Reserving NHLT table memory at [mem 0x71f4b000-0x71f4b02c]
  93. Apr 20 15:26:14 localhost kernel: ACPI: Reserving LPIT table memory at [mem 0x71f4a000-0x71f4a0cb]
  94. Apr 20 15:26:14 localhost kernel: ACPI: Reserving SSDT table memory at [mem 0x71f46000-0x71f48356]
  95. Apr 20 15:26:14 localhost kernel: ACPI: Reserving SSDT table memory at [mem 0x71f43000-0x71f45a82]
  96. Apr 20 15:26:14 localhost kernel: ACPI: Reserving DBGP table memory at [mem 0x71f42000-0x71f42033]
  97. Apr 20 15:26:14 localhost kernel: ACPI: Reserving DBG2 table memory at [mem 0x71f41000-0x71f41053]
  98. Apr 20 15:26:14 localhost kernel: ACPI: Reserving SSDT table memory at [mem 0x71f40000-0x71f40c1e]
  99. Apr 20 15:26:14 localhost kernel: ACPI: Reserving RMAD table memory at [mem 0x71f3f000-0x71f3f087]
  100. Apr 20 15:26:14 localhost kernel: ACPI: Reserving FPDT table memory at [mem 0x71f3e000-0x71f3e043]
  101. Apr 20 15:26:14 localhost kernel: ACPI: Reserving SSDT table memory at [mem 0x71f3b000-0x71f3d180]
  102. Apr 20 15:26:14 localhost kernel: ACPI: Reserving SSDT table memory at [mem 0x71f37000-0x71f3a9d9]
  103. Apr 20 15:26:14 localhost kernel: ACPI: Reserving SSDT table memory at [mem 0x71f33000-0x71f369d9]
  104. Apr 20 15:26:14 localhost kernel: ACPI: Reserving BGRT table memory at [mem 0x71f32000-0x71f32037]
  105. Apr 20 15:26:14 localhost kernel: ACPI: Reserving WPBT table memory at [mem 0x71dfd000-0x71dfd03f]
  106. Apr 20 15:26:14 localhost kernel: ACPI: Reserving TPM2 table memory at [mem 0x71dfc000-0x71dfc04b]
  107. Apr 20 15:26:14 localhost kernel: ACPI: Reserving PHAT table memory at [mem 0x71dfb000-0x71dfbaa6]
  108. Apr 20 15:26:14 localhost kernel: ACPI: Reserving WSMT table memory at [mem 0x71f49000-0x71f49027]
  109. Apr 20 15:26:14 localhost kernel: Setting APIC routing to Xen PV.
  110. Apr 20 15:26:14 localhost kernel: NUMA turned off
  111. Apr 20 15:26:14 localhost kernel: Faking a node at [mem 0x0000000000000000-0x0000000191fe4fff]
  112. Apr 20 15:26:14 localhost kernel: NODE_DATA(0) allocated [mem 0x6d887000-0x6d8b1fff]
  113. Apr 20 15:26:14 localhost kernel: Zone ranges:
  114. Apr 20 15:26:14 localhost kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff]
  115. Apr 20 15:26:14 localhost kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff]
  116. Apr 20 15:26:14 localhost kernel: Normal [mem 0x0000000100000000-0x0000000191fe4fff]
  117. Apr 20 15:26:14 localhost kernel: Device empty
  118. Apr 20 15:26:14 localhost kernel: Movable zone start for each node
  119. Apr 20 15:26:14 localhost kernel: Early memory node ranges
  120. Apr 20 15:26:14 localhost kernel: node 0: [mem 0x0000000000001000-0x000000000009dfff]
  121. Apr 20 15:26:14 localhost kernel: node 0: [mem 0x000000000009f000-0x000000000009ffff]
  122. Apr 20 15:26:14 localhost kernel: node 0: [mem 0x0000000000100000-0x0000000061e2afff]
  123. Apr 20 15:26:14 localhost kernel: node 0: [mem 0x0000000061e2c000-0x0000000063e9bfff]
  124. Apr 20 15:26:14 localhost kernel: node 0: [mem 0x0000000063e9d000-0x000000006e07cfff]
  125. Apr 20 15:26:14 localhost kernel: node 0: [mem 0x0000000073eff000-0x0000000073efffff]
  126. Apr 20 15:26:14 localhost kernel: node 0: [mem 0x0000000100000000-0x0000000191fe4fff]
  127. Apr 20 15:26:14 localhost kernel: Initmem setup node 0 [mem 0x0000000000001000-0x0000000191fe4fff]
  128. Apr 20 15:26:14 localhost kernel: On node 0, zone DMA: 1 pages in unavailable ranges
  129. Apr 20 15:26:14 localhost kernel: On node 0, zone DMA: 1 pages in unavailable ranges
  130. Apr 20 15:26:14 localhost kernel: On node 0, zone DMA: 96 pages in unavailable ranges
  131. Apr 20 15:26:14 localhost kernel: On node 0, zone DMA32: 1 pages in unavailable ranges
  132. Apr 20 15:26:14 localhost kernel: On node 0, zone DMA32: 1 pages in unavailable ranges
  133. Apr 20 15:26:14 localhost kernel: On node 0, zone DMA32: 24194 pages in unavailable ranges
  134. Apr 20 15:26:14 localhost kernel: On node 0, zone Normal: 16640 pages in unavailable ranges
  135. Apr 20 15:26:14 localhost kernel: On node 0, zone Normal: 24603 pages in unavailable ranges
  136. Apr 20 15:26:14 localhost kernel: p2m virtual area at (____ptrval____), size is 40000000
  137. Apr 20 15:26:14 localhost kernel: Remapped 597989 page(s)
  138. Apr 20 15:26:14 localhost kernel: Reserving Intel graphics memory at [mem 0x7c800000-0x807fffff]
  139. Apr 20 15:26:14 localhost kernel: ACPI: PM-Timer IO Port: 0x1808
  140. Apr 20 15:26:14 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1])
  141. Apr 20 15:26:14 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1])
  142. Apr 20 15:26:14 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1])
  143. Apr 20 15:26:14 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1])
  144. Apr 20 15:26:14 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1])
  145. Apr 20 15:26:14 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1])
  146. Apr 20 15:26:14 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1])
  147. Apr 20 15:26:14 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1])
  148. Apr 20 15:26:14 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1])
  149. Apr 20 15:26:14 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1])
  150. Apr 20 15:26:14 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1])
  151. Apr 20 15:26:14 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1])
  152. Apr 20 15:26:14 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1])
  153. Apr 20 15:26:14 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1])
  154. Apr 20 15:26:14 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1])
  155. Apr 20 15:26:14 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1])
  156. Apr 20 15:26:14 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0x11] high edge lint[0x1])
  157. Apr 20 15:26:14 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0x12] high edge lint[0x1])
  158. Apr 20 15:26:14 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0x13] high edge lint[0x1])
  159. Apr 20 15:26:14 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0x14] high edge lint[0x1])
  160. Apr 20 15:26:14 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0x15] high edge lint[0x1])
  161. Apr 20 15:26:14 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0x16] high edge lint[0x1])
  162. Apr 20 15:26:14 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0x17] high edge lint[0x1])
  163. Apr 20 15:26:14 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0x00] high edge lint[0x1])
  164. Apr 20 15:26:14 localhost kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119
  165. Apr 20 15:26:14 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl)
  166. Apr 20 15:26:14 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level)
  167. Apr 20 15:26:14 localhost kernel: ACPI: Using ACPI (MADT) for SMP configuration information
  168. Apr 20 15:26:14 localhost kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000
  169. Apr 20 15:26:14 localhost kernel: smpboot: Allowing 24 CPUs, 0 hotplug CPUs
  170. Apr 20 15:26:14 localhost kernel: [mem 0x80800000-0xbfffffff] available for PCI devices
  171. Apr 20 15:26:14 localhost kernel: Booting kernel on Xen
  172. Apr 20 15:26:14 localhost kernel: Xen version: 4.17.2 (preserve-AD)
  173. Apr 20 15:26:14 localhost kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns
  174. Apr 20 15:26:14 localhost kernel: setup_percpu: NR_CPUS:8192 nr_cpumask_bits:24 nr_cpu_ids:24 nr_node_ids:1
  175. Apr 20 15:26:14 localhost kernel: percpu: Embedded 62 pages/cpu s217088 r8192 d28672 u262144
  176. Apr 20 15:26:14 localhost kernel: pcpu-alloc: s217088 r8192 d28672 u262144 alloc=1*2097152
  177. Apr 20 15:26:14 localhost kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15
  178. Apr 20 15:26:14 localhost kernel: pcpu-alloc: [0] 16 17 18 19 20 21 22 23
  179. Apr 20 15:26:14 localhost kernel: xen: PV spinlocks enabled
  180. Apr 20 15:26:14 localhost kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear)
  181. Apr 20 15:26:14 localhost kernel: Fallback order for Node 0: 0
  182. Apr 20 15:26:14 localhost kernel: Built 1 zonelists, mobility grouping on. Total pages: 1032174
  183. Apr 20 15:26:14 localhost kernel: Policy zone: Normal
  184. Apr 20 15:26:14 localhost kernel: Kernel command line: placeholder root=/dev/mapper/qubes_dom0-root ro rd.luks.uuid=luks-5241442a-6636-45da-8731-66d029364f3d rd.lvm.lv=qubes_dom0/root rd.lvm.lv=qubes_dom0/swap plymouth.ignore-serial-consoles 6.1.62-1.qubes.fc37.x86_64 x86_64 rhgb rd.qubes.hide_pci=01:00.0,01:00.1 quiet usbcore.authorized_default=0
  185. Apr 20 15:26:14 localhost kernel: Unknown kernel command line parameters "placeholder x86_64 rhgb", will be passed to user space.
  186. Apr 20 15:26:14 localhost kernel: random: crng init done
  187. Apr 20 15:26:14 localhost kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear)
  188. Apr 20 15:26:14 localhost kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear)
  189. Apr 20 15:26:14 localhost kernel: mem auto-init: stack:all(zero), heap alloc:on, heap free:on
  190. Apr 20 15:26:14 localhost kernel: mem auto-init: clearing system memory may take some time...
  191. Apr 20 15:26:14 localhost kernel: software IO TLB: area num 32.
  192. Apr 20 15:26:14 localhost kernel: Memory: 3928596K/4194300K available (18441K kernel code, 3244K rwdata, 7544K rodata, 3540K init, 18156K bss, 265452K reserved, 0K cma-reserved)
  193. Apr 20 15:26:14 localhost kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=24, Nodes=1
  194. Apr 20 15:26:14 localhost kernel: ftrace: allocating 53584 entries in 210 pages
  195. Apr 20 15:26:14 localhost kernel: ftrace: allocated 210 pages with 4 groups
  196. Apr 20 15:26:14 localhost kernel: Dynamic Preempt: voluntary
  197. Apr 20 15:26:14 localhost kernel: rcu: Preemptible hierarchical RCU implementation.
  198. Apr 20 15:26:14 localhost kernel: rcu: RCU restricting CPUs from NR_CPUS=8192 to nr_cpu_ids=24.
  199. Apr 20 15:26:14 localhost kernel: Trampoline variant of Tasks RCU enabled.
  200. Apr 20 15:26:14 localhost kernel: Rude variant of Tasks RCU enabled.
  201. Apr 20 15:26:14 localhost kernel: Tracing variant of Tasks RCU enabled.
  202. Apr 20 15:26:14 localhost kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies.
  203. Apr 20 15:26:14 localhost kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=24
  204. Apr 20 15:26:14 localhost kernel: NR_IRQS: 524544, nr_irqs: 2248, preallocated irqs: 16
  205. Apr 20 15:26:14 localhost kernel: xen:events: Using FIFO-based ABI
  206. Apr 20 15:26:14 localhost kernel: xen: --> pirq=1 -> irq=1 (gsi=1)
  207. Apr 20 15:26:14 localhost kernel: xen: --> pirq=2 -> irq=2 (gsi=2)
  208. Apr 20 15:26:14 localhost kernel: xen: --> pirq=3 -> irq=3 (gsi=3)
  209. Apr 20 15:26:14 localhost kernel: xen: --> pirq=4 -> irq=4 (gsi=4)
  210. Apr 20 15:26:14 localhost kernel: xen: --> pirq=5 -> irq=5 (gsi=5)
  211. Apr 20 15:26:14 localhost kernel: xen: --> pirq=6 -> irq=6 (gsi=6)
  212. Apr 20 15:26:14 localhost kernel: xen: --> pirq=7 -> irq=7 (gsi=7)
  213. Apr 20 15:26:14 localhost kernel: xen: --> pirq=8 -> irq=8 (gsi=8)
  214. Apr 20 15:26:14 localhost kernel: xen: --> pirq=9 -> irq=9 (gsi=9)
  215. Apr 20 15:26:14 localhost kernel: xen: --> pirq=10 -> irq=10 (gsi=10)
  216. Apr 20 15:26:14 localhost kernel: xen: --> pirq=11 -> irq=11 (gsi=11)
  217. Apr 20 15:26:14 localhost kernel: xen: --> pirq=12 -> irq=12 (gsi=12)
  218. Apr 20 15:26:14 localhost kernel: xen: --> pirq=13 -> irq=13 (gsi=13)
  219. Apr 20 15:26:14 localhost kernel: xen: --> pirq=14 -> irq=14 (gsi=14)
  220. Apr 20 15:26:14 localhost kernel: xen: --> pirq=15 -> irq=15 (gsi=15)
  221. Apr 20 15:26:14 localhost kernel: rcu: srcu_init: Setting srcu_struct sizes based on contention.
  222. Apr 20 15:26:14 localhost kernel: kfence: initialized - using 2097152 bytes for 255 objects at 0x(____ptrval____)-0x(____ptrval____)
  223. Apr 20 15:26:14 localhost kernel: Console: colour dummy device 80x25
  224. Apr 20 15:26:14 localhost kernel: printk: console [tty0] enabled
  225. Apr 20 15:26:14 localhost kernel: printk: console [hvc0] enabled
  226. Apr 20 15:26:14 localhost kernel: ACPI: Core revision 20220331
  227. Apr 20 15:26:14 localhost kernel: ACPI BIOS Warning (bug): Incorrect checksum in table [BGRT] - 0xA8, should be 0xAD (20220331/tbprint-174)
  228. Apr 20 15:26:14 localhost kernel: clocksource: xen: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns
  229. Apr 20 15:26:14 localhost kernel: Xen: using vcpuop timer interface
  230. Apr 20 15:26:14 localhost kernel: installing Xen timer for CPU 0
  231. Apr 20 15:26:14 localhost kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x2df106bba01, max_idle_ns: 440795268242 ns
  232. Apr 20 15:26:14 localhost kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 6374.38 BogoMIPS (lpj=3187192)
  233. Apr 20 15:26:14 localhost kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0
  234. Apr 20 15:26:14 localhost kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0
  235. Apr 20 15:26:14 localhost kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization
  236. Apr 20 15:26:14 localhost kernel: Spectre V2 : Mitigation: Enhanced IBRS
  237. Apr 20 15:26:14 localhost kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch
  238. Apr 20 15:26:14 localhost kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT
  239. Apr 20 15:26:14 localhost kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier
  240. Apr 20 15:26:14 localhost kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl
  241. Apr 20 15:26:14 localhost kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers'
  242. Apr 20 15:26:14 localhost kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers'
  243. Apr 20 15:26:14 localhost kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers'
  244. Apr 20 15:26:14 localhost kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256
  245. Apr 20 15:26:14 localhost kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'compacted' format.
  246. Apr 20 15:26:14 localhost kernel: Freeing SMP alternatives memory: 48K
  247. Apr 20 15:26:14 localhost kernel: pid_max: default: 32768 minimum: 301
  248. Apr 20 15:26:14 localhost kernel: LSM: Security Framework initializing
  249. Apr 20 15:26:14 localhost kernel: Yama: becoming mindful.
  250. Apr 20 15:26:14 localhost kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear)
  251. Apr 20 15:26:14 localhost kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear)
  252. Apr 20 15:26:14 localhost kernel: cpu 0 spinlock event irq 121
  253. Apr 20 15:26:14 localhost kernel: VPMU disabled by hypervisor.
  254. Apr 20 15:26:14 localhost kernel: cblist_init_generic: Setting adjustable number of callback queues.
  255. Apr 20 15:26:14 localhost kernel: cblist_init_generic: Setting shift to 5 and lim to 1.
  256. Apr 20 15:26:14 localhost kernel: cblist_init_generic: Setting adjustable number of callback queues.
  257. Apr 20 15:26:14 localhost kernel: cblist_init_generic: Setting shift to 5 and lim to 1.
  258. Apr 20 15:26:14 localhost kernel: cblist_init_generic: Setting adjustable number of callback queues.
  259. Apr 20 15:26:14 localhost kernel: cblist_init_generic: Setting shift to 5 and lim to 1.
  260. Apr 20 15:26:14 localhost kernel: Performance Events: unsupported p6 CPU model 183 no PMU driver, software events only.
  261. Apr 20 15:26:14 localhost kernel: signal: max sigframe size: 1776
  262. Apr 20 15:26:14 localhost kernel: rcu: Hierarchical SRCU implementation.
  263. Apr 20 15:26:14 localhost kernel: rcu: Max phase no-delay instances is 400.
  264. Apr 20 15:26:14 localhost kernel: NMI watchdog: Perf NMI watchdog permanently disabled
  265. Apr 20 15:26:14 localhost kernel: smp: Bringing up secondary CPUs ...
  266. Apr 20 15:26:14 localhost kernel: installing Xen timer for CPU 1
  267. Apr 20 15:26:14 localhost kernel: cpu 1 spinlock event irq 131
  268. Apr 20 15:26:14 localhost kernel: installing Xen timer for CPU 2
  269. Apr 20 15:26:14 localhost kernel: cpu 2 spinlock event irq 137
  270. Apr 20 15:26:14 localhost kernel: installing Xen timer for CPU 3
  271. Apr 20 15:26:14 localhost kernel: cpu 3 spinlock event irq 143
  272. Apr 20 15:26:14 localhost kernel: installing Xen timer for CPU 4
  273. Apr 20 15:26:14 localhost kernel: cpu 4 spinlock event irq 149
  274. Apr 20 15:26:14 localhost kernel: installing Xen timer for CPU 5
  275. Apr 20 15:26:14 localhost kernel: cpu 5 spinlock event irq 155
  276. Apr 20 15:26:14 localhost kernel: installing Xen timer for CPU 6
  277. Apr 20 15:26:14 localhost kernel: cpu 6 spinlock event irq 161
  278. Apr 20 15:26:14 localhost kernel: installing Xen timer for CPU 7
  279. Apr 20 15:26:14 localhost kernel: cpu 7 spinlock event irq 167
  280. Apr 20 15:26:14 localhost kernel: installing Xen timer for CPU 8
  281. Apr 20 15:26:14 localhost kernel: cpu 8 spinlock event irq 173
  282. Apr 20 15:26:14 localhost kernel: installing Xen timer for CPU 9
  283. Apr 20 15:26:14 localhost kernel: cpu 9 spinlock event irq 179
  284. Apr 20 15:26:14 localhost kernel: installing Xen timer for CPU 10
  285. Apr 20 15:26:14 localhost kernel: cpu 10 spinlock event irq 185
  286. Apr 20 15:26:14 localhost kernel: installing Xen timer for CPU 11
  287. Apr 20 15:26:14 localhost kernel: cpu 11 spinlock event irq 191
  288. Apr 20 15:26:14 localhost kernel: installing Xen timer for CPU 12
  289. Apr 20 15:26:14 localhost kernel: cpu 12 spinlock event irq 197
  290. Apr 20 15:26:14 localhost kernel: installing Xen timer for CPU 13
  291. Apr 20 15:26:14 localhost kernel: cpu 13 spinlock event irq 203
  292. Apr 20 15:26:14 localhost kernel: installing Xen timer for CPU 14
  293. Apr 20 15:26:14 localhost kernel: cpu 14 spinlock event irq 209
  294. Apr 20 15:26:14 localhost kernel: installing Xen timer for CPU 15
  295. Apr 20 15:26:14 localhost kernel: cpu 15 spinlock event irq 215
  296. Apr 20 15:26:14 localhost kernel: installing Xen timer for CPU 16
  297. Apr 20 15:26:14 localhost kernel: cpu 16 spinlock event irq 221
  298. Apr 20 15:26:14 localhost kernel: installing Xen timer for CPU 17
  299. Apr 20 15:26:14 localhost kernel: cpu 17 spinlock event irq 227
  300. Apr 20 15:26:14 localhost kernel: installing Xen timer for CPU 18
  301. Apr 20 15:26:14 localhost kernel: cpu 18 spinlock event irq 233
  302. Apr 20 15:26:14 localhost kernel: installing Xen timer for CPU 19
  303. Apr 20 15:26:14 localhost kernel: cpu 19 spinlock event irq 239
  304. Apr 20 15:26:14 localhost kernel: installing Xen timer for CPU 20
  305. Apr 20 15:26:14 localhost kernel: cpu 20 spinlock event irq 245
  306. Apr 20 15:26:14 localhost kernel: installing Xen timer for CPU 21
  307. Apr 20 15:26:14 localhost kernel: cpu 21 spinlock event irq 251
  308. Apr 20 15:26:14 localhost kernel: installing Xen timer for CPU 22
  309. Apr 20 15:26:14 localhost kernel: cpu 22 spinlock event irq 257
  310. Apr 20 15:26:14 localhost kernel: installing Xen timer for CPU 23
  311. Apr 20 15:26:14 localhost kernel: cpu 23 spinlock event irq 263
  312. Apr 20 15:26:14 localhost kernel: smp: Brought up 1 node, 24 CPUs
  313. Apr 20 15:26:14 localhost kernel: smpboot: Max logical packages: 1
  314. Apr 20 15:26:14 localhost kernel: devtmpfs: initialized
  315. Apr 20 15:26:14 localhost kernel: x86/mm: Memory block size: 128MB
  316. Apr 20 15:26:14 localhost kernel: ACPI: PM: Registering ACPI NVS region [mem 0x71ff1000-0x7261efff] (6479872 bytes)
  317. Apr 20 15:26:14 localhost kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns
  318. Apr 20 15:26:14 localhost kernel: futex hash table entries: 8192 (order: 7, 524288 bytes, linear)
  319. Apr 20 15:26:14 localhost kernel: pinctrl core: initialized pinctrl subsystem
  320. Apr 20 15:26:14 localhost kernel: PM: RTC time: 20:26:14, date: 2024-04-20
  321. Apr 20 15:26:14 localhost kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family
  322. Apr 20 15:26:14 localhost kernel: xen:grant_table: Grant tables using version 1 layout
  323. Apr 20 15:26:14 localhost kernel: Grant table initialized
  324. Apr 20 15:26:14 localhost kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations
  325. Apr 20 15:26:14 localhost kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations
  326. Apr 20 15:26:14 localhost kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations
  327. Apr 20 15:26:14 localhost kernel: audit: initializing netlink subsys (disabled)
  328. Apr 20 15:26:14 localhost kernel: audit: type=2000 audit(1713644774.179:1): state=initialized audit_enabled=0 res=1
  329. Apr 20 15:26:14 localhost kernel: thermal_sys: Registered thermal governor 'fair_share'
  330. Apr 20 15:26:14 localhost kernel: thermal_sys: Registered thermal governor 'bang_bang'
  331. Apr 20 15:26:14 localhost kernel: thermal_sys: Registered thermal governor 'step_wise'
  332. Apr 20 15:26:14 localhost kernel: thermal_sys: Registered thermal governor 'user_space'
  333. Apr 20 15:26:14 localhost kernel: ACPI FADT declares the system doesn't support PCIe ASPM, so disable it
  334. Apr 20 15:26:14 localhost kernel: PCI: MMCONFIG for domain 0000 [bus 00-e0] at [mem 0xc0000000-0xce0fffff] (base 0xc0000000)
  335. Apr 20 15:26:14 localhost kernel: PCI: MMCONFIG at [mem 0xc0000000-0xce0fffff] reserved in E820
  336. Apr 20 15:26:14 localhost kernel: PCI: Using configuration type 1 for base access
  337. Apr 20 15:26:14 localhost kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible.
  338. Apr 20 15:26:14 localhost kernel: cryptd: max_cpu_qlen set to 1000
  339. Apr 20 15:26:14 localhost kernel: raid6: skipped pq benchmark and selected avx2x4
  340. Apr 20 15:26:14 localhost kernel: raid6: using avx2x2 recovery algorithm
  341. Apr 20 15:26:14 localhost kernel: ACPI: Added _OSI(Module Device)
  342. Apr 20 15:26:14 localhost kernel: ACPI: Added _OSI(Processor Device)
  343. Apr 20 15:26:14 localhost kernel: ACPI: Added _OSI(3.0 _SCP Extensions)
  344. Apr 20 15:26:14 localhost kernel: ACPI: Added _OSI(Processor Aggregator Device)
  345. Apr 20 15:26:14 localhost kernel: ACPI: 12 ACPI AML tables successfully acquired and loaded
  346. Apr 20 15:26:14 localhost kernel: xen: registering gsi 9 triggering 0 polarity 0
  347. Apr 20 15:26:14 localhost kernel: ACPI: Dynamic OEM Table Load:
  348. Apr 20 15:26:14 localhost kernel: ACPI: SSDT 0xFFFF888101D8F000 000394 (v02 PmRef Cpu0Cst 00003001 INTL 20200717)
  349. Apr 20 15:26:14 localhost kernel: ACPI: Dynamic OEM Table Load:
  350. Apr 20 15:26:14 localhost kernel: ACPI: SSDT 0xFFFF888101D9F800 000647 (v02 PmRef Cpu0Ist 00003000 INTL 20200717)
  351. Apr 20 15:26:14 localhost kernel: ACPI: Dynamic OEM Table Load:
  352. Apr 20 15:26:14 localhost kernel: ACPI: SSDT 0xFFFF8881008C6400 0001AB (v02 PmRef Cpu0Psd 00003000 INTL 20200717)
  353. Apr 20 15:26:14 localhost kernel: ACPI: Dynamic OEM Table Load:
  354. Apr 20 15:26:14 localhost kernel: ACPI: SSDT 0xFFFF888101D9E000 0004B5 (v02 PmRef Cpu0Hwp 00003000 INTL 20200717)
  355. Apr 20 15:26:14 localhost kernel: ACPI: Dynamic OEM Table Load:
  356. Apr 20 15:26:14 localhost kernel: ACPI: SSDT 0xFFFF88810244E000 001BAF (v02 PmRef ApIst 00003000 INTL 20200717)
  357. Apr 20 15:26:14 localhost kernel: ACPI: Dynamic OEM Table Load:
  358. Apr 20 15:26:14 localhost kernel: ACPI: SSDT 0xFFFF88810244C000 001038 (v02 PmRef ApHwp 00003000 INTL 20200717)
  359. Apr 20 15:26:14 localhost kernel: ACPI: Dynamic OEM Table Load:
  360. Apr 20 15:26:14 localhost kernel: ACPI: SSDT 0xFFFF88810244A000 001349 (v02 PmRef ApPsd 00003000 INTL 20200717)
  361. Apr 20 15:26:14 localhost kernel: ACPI: Dynamic OEM Table Load:
  362. Apr 20 15:26:14 localhost kernel: ACPI: SSDT 0xFFFF888101D93000 000FBB (v02 PmRef ApCst 00003000 INTL 20200717)
  363. Apr 20 15:26:14 localhost kernel: ACPI: EC: EC started
  364. Apr 20 15:26:14 localhost kernel: ACPI: EC: interrupt blocked
  365. Apr 20 15:26:14 localhost kernel: ACPI: EC: EC_CMD/EC_SC=0x66, EC_DATA=0x62
  366. Apr 20 15:26:14 localhost kernel: ACPI: \_SB_.PC00.LPCB.EC0_: Boot DSDT EC used to handle transactions
  367. Apr 20 15:26:14 localhost kernel: ACPI: Interpreter enabled
  368. Apr 20 15:26:14 localhost kernel: ACPI: PM: (supports S0 S3 S5)
  369. Apr 20 15:26:14 localhost kernel: ACPI: Using IOAPIC for interrupt routing
  370. Apr 20 15:26:14 localhost kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug
  371. Apr 20 15:26:14 localhost kernel: PCI: Ignoring E820 reservations for host bridge windows
  372. Apr 20 15:26:14 localhost kernel: ACPI: Enabled 6 GPEs in block 00 to 7F
  373. Apr 20 15:26:14 localhost kernel: ACPI: PM: Power Resource [WRST]
  374. Apr 20 15:26:14 localhost kernel: ACPI: PM: Power Resource [DRST]
  375. Apr 20 15:26:14 localhost kernel: ACPI: PM: Power Resource [PRBT]
  376. Apr 20 15:26:14 localhost kernel: ACPI: PM: Power Resource [WRST]
  377. Apr 20 15:26:14 localhost kernel: ACPI: PM: Power Resource [FN00]
  378. Apr 20 15:26:14 localhost kernel: ACPI: PM: Power Resource [FN01]
  379. Apr 20 15:26:14 localhost kernel: ACPI: PM: Power Resource [FN02]
  380. Apr 20 15:26:14 localhost kernel: ACPI: PM: Power Resource [FN03]
  381. Apr 20 15:26:14 localhost kernel: ACPI: PM: Power Resource [FN04]
  382. Apr 20 15:26:14 localhost kernel: ACPI: PM: Power Resource [PIN]
  383. Apr 20 15:26:14 localhost kernel: ACPI: PCI Root Bridge [PC00] (domain 0000 [bus 00-e0])
  384. Apr 20 15:26:14 localhost kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI EDR HPX-Type3]
  385. Apr 20 15:26:14 localhost kernel: acpi PNP0A08:00: _OSC: OS now controls [PME AER PCIeCapability LTR DPC]
  386. Apr 20 15:26:14 localhost kernel: acpi PNP0A08:00: FADT indicates ASPM is unsupported, using BIOS configuration
  387. Apr 20 15:26:14 localhost kernel: PCI host bridge to bus 0000:00
  388. Apr 20 15:26:14 localhost kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window]
  389. Apr 20 15:26:14 localhost kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window]
  390. Apr 20 15:26:14 localhost kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window]
  391. Apr 20 15:26:14 localhost kernel: pci_bus 0000:00: root bus resource [mem 0x000e0000-0x000effff window]
  392. Apr 20 15:26:14 localhost kernel: pci_bus 0000:00: root bus resource [mem 0x80800000-0xbfffffff window]
  393. Apr 20 15:26:14 localhost kernel: pci_bus 0000:00: root bus resource [mem 0x4000000000-0x7fffffffff window]
  394. Apr 20 15:26:14 localhost kernel: pci_bus 0000:00: root bus resource [bus 00-e0]
  395. Apr 20 15:26:14 localhost kernel: pci 0000:00:00.0: [8086:a700] type 00 class 0x060000
  396. Apr 20 15:26:14 localhost kernel: pci 0000:00:01.0: [8086:a70d] type 01 class 0x060400
  397. Apr 20 15:26:14 localhost kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold
  398. Apr 20 15:26:14 localhost kernel: pci 0000:00:01.0: PTM enabled (root), 4ns granularity
  399. Apr 20 15:26:14 localhost kernel: pci 0000:00:01.1: [8086:a72d] type 01 class 0x060400
  400. Apr 20 15:26:14 localhost kernel: pci 0000:00:01.1: PME# supported from D0 D3hot D3cold
  401. Apr 20 15:26:14 localhost kernel: pci 0000:00:01.1: PTM enabled (root), 4ns granularity
  402. Apr 20 15:26:14 localhost kernel: pci 0000:00:02.0: [8086:a780] type 00 class 0x030000
  403. Apr 20 15:26:14 localhost kernel: pci 0000:00:02.0: reg 0x10: [mem 0x6806000000-0x6806ffffff 64bit]
  404. Apr 20 15:26:14 localhost kernel: pci 0000:00:02.0: reg 0x18: [mem 0x4000000000-0x400fffffff 64bit pref]
  405. Apr 20 15:26:14 localhost kernel: pci 0000:00:02.0: reg 0x20: [io 0x5000-0x503f]
  406. Apr 20 15:26:14 localhost kernel: pci 0000:00:02.0: BAR 2: assigned to efifb
  407. Apr 20 15:26:14 localhost kernel: pci 0000:00:02.0: DMAR: Skip IOMMU disabling for graphics
  408. Apr 20 15:26:14 localhost kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff]
  409. Apr 20 15:26:14 localhost kernel: pci 0000:00:02.0: reg 0x344: [mem 0x00000000-0x00ffffff 64bit]
  410. Apr 20 15:26:14 localhost kernel: pci 0000:00:02.0: VF(n) BAR0 space: [mem 0x00000000-0x06ffffff 64bit] (contains BAR0 for 7 VFs)
  411. Apr 20 15:26:14 localhost kernel: pci 0000:00:02.0: reg 0x34c: [mem 0x00000000-0x1fffffff 64bit pref]
  412. Apr 20 15:26:14 localhost kernel: pci 0000:00:02.0: VF(n) BAR2 space: [mem 0x00000000-0xdfffffff 64bit pref] (contains BAR2 for 7 VFs)
  413. Apr 20 15:26:14 localhost kernel: pci 0000:00:0a.0: [8086:a77d] type 00 class 0x118000
  414. Apr 20 15:26:14 localhost kernel: pci 0000:00:0a.0: reg 0x10: [mem 0x6807210000-0x6807217fff 64bit]
  415. Apr 20 15:26:14 localhost kernel: pci 0000:00:0a.0: enabling Extended Tags
  416. Apr 20 15:26:14 localhost kernel: pci 0000:00:0e.0: [8086:a77f] type 00 class 0x010400
  417. Apr 20 15:26:14 localhost kernel: pci 0000:00:0e.0: reg 0x10: [mem 0x6804000000-0x6805ffffff 64bit]
  418. Apr 20 15:26:14 localhost kernel: pci 0000:00:0e.0: reg 0x18: [mem 0x82000000-0x83ffffff]
  419. Apr 20 15:26:14 localhost kernel: pci 0000:00:0e.0: reg 0x20: [mem 0x6807100000-0x68071fffff 64bit]
  420. Apr 20 15:26:14 localhost kernel: pci 0000:00:14.0: [8086:7a60] type 00 class 0x0c0330
  421. Apr 20 15:26:14 localhost kernel: pci 0000:00:14.0: reg 0x10: [mem 0x6807200000-0x680720ffff 64bit]
  422. Apr 20 15:26:14 localhost kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold
  423. Apr 20 15:26:14 localhost kernel: pci 0000:00:14.2: [8086:7a27] type 00 class 0x050000
  424. Apr 20 15:26:14 localhost kernel: pci 0000:00:14.2: reg 0x10: [mem 0x6807224000-0x6807227fff 64bit]
  425. Apr 20 15:26:14 localhost kernel: pci 0000:00:14.2: reg 0x18: [mem 0x680722d000-0x680722dfff 64bit]
  426. Apr 20 15:26:14 localhost kernel: pci 0000:00:15.0: [8086:7a4c] type 00 class 0x0c8000
  427. Apr 20 15:26:14 localhost kernel: pci 0000:00:15.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit]
  428. Apr 20 15:26:14 localhost kernel: pci 0000:00:15.1: [8086:7a4d] type 00 class 0x0c8000
  429. Apr 20 15:26:14 localhost kernel: pci 0000:00:15.1: reg 0x10: [mem 0x00000000-0x00000fff 64bit]
  430. Apr 20 15:26:14 localhost kernel: pci 0000:00:15.2: [8086:7a4e] type 00 class 0x0c8000
  431. Apr 20 15:26:14 localhost kernel: pci 0000:00:15.2: reg 0x10: [mem 0x00000000-0x00000fff 64bit]
  432. Apr 20 15:26:14 localhost kernel: pci 0000:00:16.0: [8086:7a68] type 00 class 0x078000
  433. Apr 20 15:26:14 localhost kernel: pci 0000:00:16.0: reg 0x10: [mem 0x6807229000-0x6807229fff 64bit]
  434. Apr 20 15:26:14 localhost kernel: pci 0000:00:16.0: PME# supported from D3hot
  435. Apr 20 15:26:14 localhost kernel: pci 0000:00:17.0: [8086:7a62] type 00 class 0x010601
  436. Apr 20 15:26:14 localhost kernel: pci 0000:00:17.0: reg 0x10: [mem 0x86000000-0x86001fff]
  437. Apr 20 15:26:14 localhost kernel: pci 0000:00:17.0: reg 0x14: [mem 0x86003000-0x860030ff]
  438. Apr 20 15:26:14 localhost kernel: pci 0000:00:17.0: reg 0x18: [io 0x5090-0x5097]
  439. Apr 20 15:26:14 localhost kernel: pci 0000:00:17.0: reg 0x1c: [io 0x5080-0x5083]
  440. Apr 20 15:26:14 localhost kernel: pci 0000:00:17.0: reg 0x20: [io 0x5060-0x507f]
  441. Apr 20 15:26:14 localhost kernel: pci 0000:00:17.0: reg 0x24: [mem 0x86002000-0x860027ff]
  442. Apr 20 15:26:14 localhost kernel: pci 0000:00:17.0: PME# supported from D3hot
  443. Apr 20 15:26:14 localhost kernel: pci 0000:00:1a.0: [8086:7a48] type 01 class 0x060400
  444. Apr 20 15:26:14 localhost kernel: pci 0000:00:1a.0: PME# supported from D0 D3hot D3cold
  445. Apr 20 15:26:14 localhost kernel: pci 0000:00:1b.0: [8086:7a40] type 01 class 0x060400
  446. Apr 20 15:26:14 localhost kernel: pci 0000:00:1b.0: PME# supported from D0 D3hot D3cold
  447. Apr 20 15:26:14 localhost kernel: pci 0000:00:1c.0: [8086:7a38] type 01 class 0x060400
  448. Apr 20 15:26:14 localhost kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold
  449. Apr 20 15:26:14 localhost kernel: pci 0000:00:1c.0: PTM enabled (root), 4ns granularity
  450. Apr 20 15:26:14 localhost kernel: pci 0000:00:1c.3: [8086:7a3b] type 01 class 0x060400
  451. Apr 20 15:26:14 localhost kernel: pci 0000:00:1c.3: PME# supported from D0 D3hot D3cold
  452. Apr 20 15:26:14 localhost kernel: pci 0000:00:1c.3: PTM enabled (root), 4ns granularity
  453. Apr 20 15:26:14 localhost kernel: pci 0000:00:1d.0: [8086:7a30] type 01 class 0x060400
  454. Apr 20 15:26:14 localhost kernel: pci 0000:00:1d.0: PME# supported from D0 D3hot D3cold
  455. Apr 20 15:26:14 localhost kernel: pci 0000:00:1d.0: PTM enabled (root), 4ns granularity
  456. Apr 20 15:26:14 localhost kernel: pci 0000:00:1f.0: [8086:7a04] type 00 class 0x060100
  457. Apr 20 15:26:14 localhost kernel: pci 0000:00:1f.3: [8086:7a50] type 00 class 0x040300
  458. Apr 20 15:26:14 localhost kernel: pci 0000:00:1f.3: reg 0x10: [mem 0x6807220000-0x6807223fff 64bit]
  459. Apr 20 15:26:14 localhost kernel: pci 0000:00:1f.3: reg 0x20: [mem 0x6807000000-0x68070fffff 64bit]
  460. Apr 20 15:26:14 localhost kernel: pci 0000:00:1f.3: PME# supported from D3hot D3cold
  461. Apr 20 15:26:14 localhost kernel: pci 0000:00:1f.4: [8086:7a23] type 00 class 0x0c0500
  462. Apr 20 15:26:14 localhost kernel: pci 0000:00:1f.4: reg 0x10: [mem 0x6807228000-0x68072280ff 64bit]
  463. Apr 20 15:26:14 localhost kernel: pci 0000:00:1f.4: reg 0x20: [io 0xefa0-0xefbf]
  464. Apr 20 15:26:14 localhost kernel: pci 0000:00:1f.5: [8086:7a24] type 00 class 0x0c8000
  465. Apr 20 15:26:14 localhost kernel: pci 0000:00:1f.5: reg 0x10: [mem 0xfe010000-0xfe010fff]
  466. Apr 20 15:26:14 localhost kernel: pci 0000:01:00.0: [10de:2684] type 00 class 0x030000
  467. Apr 20 15:26:14 localhost kernel: pci 0000:01:00.0: reg 0x10: [mem 0x84000000-0x84ffffff]
  468. Apr 20 15:26:14 localhost kernel: pci 0000:01:00.0: reg 0x14: [mem 0x6000000000-0x67ffffffff 64bit pref]
  469. Apr 20 15:26:14 localhost kernel: pci 0000:01:00.0: reg 0x1c: [mem 0x6800000000-0x6801ffffff 64bit pref]
  470. Apr 20 15:26:14 localhost kernel: pci 0000:01:00.0: reg 0x24: [io 0x4000-0x407f]
  471. Apr 20 15:26:14 localhost kernel: pci 0000:01:00.0: reg 0x30: [mem 0x85000000-0x8507ffff pref]
  472. Apr 20 15:26:14 localhost kernel: pci 0000:01:00.0: PME# supported from D0 D3hot
  473. Apr 20 15:26:14 localhost kernel: pci 0000:01:00.0: 126.024 Gb/s available PCIe bandwidth, limited by 16.0 GT/s PCIe x8 link at 0000:00:01.0 (capable of 252.048 Gb/s with 16.0 GT/s PCIe x16 link)
  474. Apr 20 15:26:14 localhost kernel: pci 0000:01:00.1: [10de:22ba] type 00 class 0x040300
  475. Apr 20 15:26:14 localhost kernel: pci 0000:01:00.1: reg 0x10: [mem 0x85080000-0x85083fff]
  476. Apr 20 15:26:14 localhost kernel: pci 0000:00:01.0: PCI bridge to [bus 01]
  477. Apr 20 15:26:14 localhost kernel: pci 0000:00:01.0: bridge window [io 0x4000-0x4fff]
  478. Apr 20 15:26:14 localhost kernel: pci 0000:00:01.0: bridge window [mem 0x84000000-0x850fffff]
  479. Apr 20 15:26:14 localhost kernel: pci 0000:00:01.0: bridge window [mem 0x6000000000-0x6801ffffff 64bit pref]
  480. Apr 20 15:26:14 localhost kernel: pci 0000:02:00.0: [144d:a80c] type 00 class 0x010802
  481. Apr 20 15:26:14 localhost kernel: pci 0000:02:00.0: reg 0x10: [mem 0x85f00000-0x85f03fff 64bit]
  482. Apr 20 15:26:14 localhost kernel: pci 0000:00:01.1: PCI bridge to [bus 02]
  483. Apr 20 15:26:14 localhost kernel: pci 0000:00:01.1: bridge window [mem 0x85f00000-0x85ffffff]
  484. Apr 20 15:26:14 localhost kernel: pci 0000:00:1a.0: PCI bridge to [bus 03]
  485. Apr 20 15:26:14 localhost kernel: pci 0000:00:1a.0: bridge window [io 0x3000-0x3fff]
  486. Apr 20 15:26:14 localhost kernel: pci 0000:00:1a.0: bridge window [mem 0x85100000-0x85afffff]
  487. Apr 20 15:26:14 localhost kernel: pci 0000:00:1a.0: bridge window [mem 0x6802100000-0x6802afffff 64bit pref]
  488. Apr 20 15:26:14 localhost kernel: pci 0000:00:1b.0: PCI bridge to [bus 04]
  489. Apr 20 15:26:14 localhost kernel: pci 0000:05:00.0: [8086:2725] type 00 class 0x028000
  490. Apr 20 15:26:14 localhost kernel: pci 0000:05:00.0: reg 0x10: [mem 0x85e00000-0x85e03fff 64bit]
  491. Apr 20 15:26:14 localhost kernel: pci 0000:05:00.0: PME# supported from D0 D3hot D3cold
  492. Apr 20 15:26:14 localhost kernel: pci 0000:00:1c.0: PCI bridge to [bus 05]
  493. Apr 20 15:26:14 localhost kernel: pci 0000:00:1c.0: bridge window [mem 0x85e00000-0x85efffff]
  494. Apr 20 15:26:14 localhost kernel: pci 0000:06:00.0: [8086:125c] type 00 class 0x020000
  495. Apr 20 15:26:14 localhost kernel: pci 0000:06:00.0: reg 0x10: [mem 0x85b00000-0x85bfffff]
  496. Apr 20 15:26:14 localhost kernel: pci 0000:06:00.0: reg 0x1c: [mem 0x85c00000-0x85c03fff]
  497. Apr 20 15:26:14 localhost kernel: pci 0000:06:00.0: PME# supported from D0 D3hot D3cold
  498. Apr 20 15:26:14 localhost kernel: pci 0000:00:1c.3: PCI bridge to [bus 06]
  499. Apr 20 15:26:14 localhost kernel: pci 0000:00:1c.3: bridge window [mem 0x85b00000-0x85cfffff]
  500. Apr 20 15:26:14 localhost kernel: pci 0000:07:00.0: [15b7:5030] type 00 class 0x010802
  501. Apr 20 15:26:14 localhost kernel: pci 0000:07:00.0: reg 0x10: [mem 0x85d00000-0x85d03fff 64bit]
  502. Apr 20 15:26:14 localhost kernel: pci 0000:00:1d.0: PCI bridge to [bus 07]
  503. Apr 20 15:26:14 localhost kernel: pci 0000:00:1d.0: bridge window [mem 0x85d00000-0x85dfffff]
  504. Apr 20 15:26:14 localhost kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 0
  505. Apr 20 15:26:14 localhost kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 1
  506. Apr 20 15:26:14 localhost kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 0
  507. Apr 20 15:26:14 localhost kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 0
  508. Apr 20 15:26:14 localhost kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 0
  509. Apr 20 15:26:14 localhost kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 0
  510. Apr 20 15:26:14 localhost kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 0
  511. Apr 20 15:26:14 localhost kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 0
  512. Apr 20 15:26:14 localhost kernel: xen: registering gsi 14 triggering 0 polarity 1
  513. Apr 20 15:26:14 localhost kernel: ACPI: EC: interrupt unblocked
  514. Apr 20 15:26:14 localhost kernel: ACPI: EC: event unblocked
  515. Apr 20 15:26:14 localhost kernel: ACPI: EC: EC_CMD/EC_SC=0x66, EC_DATA=0x62
  516. Apr 20 15:26:14 localhost kernel: ACPI: EC: GPE=0x7
  517. Apr 20 15:26:14 localhost kernel: ACPI: \_SB_.PC00.LPCB.EC0_: Boot DSDT EC initialization complete
  518. Apr 20 15:26:14 localhost kernel: ACPI: \_SB_.PC00.LPCB.EC0_: EC: Used to handle transactions and events
  519. Apr 20 15:26:14 localhost kernel: xen:balloon: Initialising balloon driver
  520. Apr 20 15:26:14 localhost kernel: iommu: Default domain type: Translated
  521. Apr 20 15:26:14 localhost kernel: iommu: DMA domain TLB invalidation policy: lazy mode
  522. Apr 20 15:26:14 localhost kernel: SCSI subsystem initialized
  523. Apr 20 15:26:14 localhost kernel: libata version 3.00 loaded.
  524. Apr 20 15:26:14 localhost kernel: ACPI: bus type USB registered
  525. Apr 20 15:26:14 localhost kernel: usbcore: registered new interface driver usbfs
  526. Apr 20 15:26:14 localhost kernel: usbcore: registered new interface driver hub
  527. Apr 20 15:26:14 localhost kernel: usbcore: registered new device driver usb
  528. Apr 20 15:26:14 localhost kernel: pps_core: LinuxPPS API ver. 1 registered
  529. Apr 20 15:26:14 localhost kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti <[email protected]>
  530. Apr 20 15:26:14 localhost kernel: PTP clock support registered
  531. Apr 20 15:26:14 localhost kernel: EDAC MC: Ver: 3.0.0
  532. Apr 20 15:26:14 localhost kernel: Registered efivars operations
  533. Apr 20 15:26:14 localhost kernel: NetLabel: Initializing
  534. Apr 20 15:26:14 localhost kernel: NetLabel: domain hash size = 128
  535. Apr 20 15:26:14 localhost kernel: NetLabel: protocols = UNLABELED CIPSOv4 CALIPSO
  536. Apr 20 15:26:14 localhost kernel: NetLabel: unlabeled traffic allowed by default
  537. Apr 20 15:26:14 localhost kernel: mctp: management component transport protocol core
  538. Apr 20 15:26:14 localhost kernel: NET: Registered PF_MCTP protocol family
  539. Apr 20 15:26:14 localhost kernel: PCI: Using ACPI for IRQ routing
  540. Apr 20 15:26:14 localhost kernel: PCI: pci_cache_line_size set to 64 bytes
  541. Apr 20 15:26:14 localhost kernel: pci 0000:00:1f.5: can't claim BAR 0 [mem 0xfe010000-0xfe010fff]: no compatible bridge window
  542. Apr 20 15:26:14 localhost kernel: e820: reserve RAM buffer [mem 0x0009e000-0x0009ffff]
  543. Apr 20 15:26:14 localhost kernel: e820: reserve RAM buffer [mem 0x61e2b000-0x63ffffff]
  544. Apr 20 15:26:14 localhost kernel: e820: reserve RAM buffer [mem 0x63e9c000-0x63ffffff]
  545. Apr 20 15:26:14 localhost kernel: e820: reserve RAM buffer [mem 0x6e07d000-0x6fffffff]
  546. Apr 20 15:26:14 localhost kernel: e820: reserve RAM buffer [mem 0x73f00000-0x73ffffff]
  547. Apr 20 15:26:14 localhost kernel: e820: reserve RAM buffer [mem 0x191fe5000-0x193ffffff]
  548. Apr 20 15:26:14 localhost kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device
  549. Apr 20 15:26:14 localhost kernel: pci 0000:00:02.0: vgaarb: bridge control possible
  550. Apr 20 15:26:14 localhost kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none
  551. Apr 20 15:26:14 localhost kernel: pci 0000:01:00.0: vgaarb: bridge control possible
  552. Apr 20 15:26:14 localhost kernel: pci 0000:01:00.0: vgaarb: VGA device added: decodes=io+mem,owns=none,locks=none
  553. Apr 20 15:26:14 localhost kernel: vgaarb: loaded
  554. Apr 20 15:26:14 localhost kernel: clocksource: Switched to clocksource tsc-early
  555. Apr 20 15:26:14 localhost kernel: VFS: Disk quotas dquot_6.6.0
  556. Apr 20 15:26:14 localhost kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes)
  557. Apr 20 15:26:14 localhost kernel: hugetlbfs: disabling because there are no supported hugepage sizes
  558. Apr 20 15:26:14 localhost kernel: pnp: PnP ACPI init
  559. Apr 20 15:26:14 localhost kernel: system 00:00: [io 0x0290-0x029f] has been reserved
  560. Apr 20 15:26:14 localhost kernel: system 00:00: [io 0x0b00-0x0b1f] has been reserved
  561. Apr 20 15:26:14 localhost kernel: system 00:01: [io 0x0680-0x069f] has been reserved
  562. Apr 20 15:26:14 localhost kernel: system 00:01: [io 0x164e-0x164f] has been reserved
  563. Apr 20 15:26:14 localhost kernel: system 00:02: [io 0x1854-0x1857] has been reserved
  564. Apr 20 15:26:14 localhost kernel: pnp 00:03: disabling [mem 0xc0000000-0xcfffffff] because it overlaps 0000:00:02.0 BAR 9 [mem 0x00000000-0xdfffffff 64bit pref]
  565. Apr 20 15:26:14 localhost kernel: system 00:03: [mem 0xfedc0000-0xfedc7fff] has been reserved
  566. Apr 20 15:26:14 localhost kernel: system 00:03: [mem 0xfeda0000-0xfeda0fff] has been reserved
  567. Apr 20 15:26:14 localhost kernel: system 00:03: [mem 0xfeda1000-0xfeda1fff] has been reserved
  568. Apr 20 15:26:14 localhost kernel: system 00:03: [mem 0xfed20000-0xfed7ffff] could not be reserved
  569. Apr 20 15:26:14 localhost kernel: system 00:03: [mem 0xfed90000-0xfed93fff] could not be reserved
  570. Apr 20 15:26:14 localhost kernel: system 00:03: [mem 0xfed45000-0xfed8ffff] could not be reserved
  571. Apr 20 15:26:14 localhost kernel: system 00:03: [mem 0xfee00000-0xfeefffff] has been reserved
  572. Apr 20 15:26:14 localhost kernel: system 00:04: [io 0x2000-0x20fe] has been reserved
  573. Apr 20 15:26:14 localhost kernel: pnp: PnP ACPI: found 6 devices
  574. Apr 20 15:26:14 localhost kernel: PM-Timer failed consistency check (0xffffff) - aborting.
  575. Apr 20 15:26:14 localhost kernel: NET: Registered PF_INET protocol family
  576. Apr 20 15:26:14 localhost kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear)
  577. Apr 20 15:26:14 localhost kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear)
  578. Apr 20 15:26:14 localhost kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear)
  579. Apr 20 15:26:14 localhost kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear)
  580. Apr 20 15:26:14 localhost kernel: TCP bind hash table entries: 32768 (order: 8, 1048576 bytes, linear)
  581. Apr 20 15:26:14 localhost kernel: TCP: Hash tables configured (established 32768 bind 32768)
  582. Apr 20 15:26:14 localhost kernel: MPTCP token hash table entries: 4096 (order: 4, 98304 bytes, linear)
  583. Apr 20 15:26:14 localhost kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear)
  584. Apr 20 15:26:14 localhost kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear)
  585. Apr 20 15:26:14 localhost kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family
  586. Apr 20 15:26:14 localhost kernel: NET: Registered PF_XDP protocol family
  587. Apr 20 15:26:14 localhost kernel: pci 0000:00:02.0: BAR 9: assigned [mem 0x4020000000-0x40ffffffff 64bit pref]
  588. Apr 20 15:26:14 localhost kernel: pci 0000:00:02.0: BAR 7: assigned [mem 0x4010000000-0x4016ffffff 64bit]
  589. Apr 20 15:26:14 localhost kernel: pci 0000:00:15.0: BAR 0: assigned [mem 0x4017000000-0x4017000fff 64bit]
  590. Apr 20 15:26:14 localhost kernel: pci 0000:00:15.1: BAR 0: assigned [mem 0x4017001000-0x4017001fff 64bit]
  591. Apr 20 15:26:14 localhost kernel: pci 0000:00:15.2: BAR 0: assigned [mem 0x4017002000-0x4017002fff 64bit]
  592. Apr 20 15:26:14 localhost kernel: pci 0000:00:1f.5: BAR 0: assigned [mem 0x80800000-0x80800fff]
  593. Apr 20 15:26:14 localhost kernel: pci 0000:00:01.0: PCI bridge to [bus 01]
  594. Apr 20 15:26:14 localhost kernel: pci 0000:00:01.0: bridge window [io 0x4000-0x4fff]
  595. Apr 20 15:26:14 localhost kernel: pci 0000:00:01.0: bridge window [mem 0x84000000-0x850fffff]
  596. Apr 20 15:26:14 localhost kernel: pci 0000:00:01.0: bridge window [mem 0x6000000000-0x6801ffffff 64bit pref]
  597. Apr 20 15:26:14 localhost kernel: pci 0000:00:01.1: PCI bridge to [bus 02]
  598. Apr 20 15:26:14 localhost kernel: pci 0000:00:01.1: bridge window [mem 0x85f00000-0x85ffffff]
  599. Apr 20 15:26:14 localhost kernel: pci 0000:00:1a.0: PCI bridge to [bus 03]
  600. Apr 20 15:26:14 localhost kernel: pci 0000:00:1a.0: bridge window [io 0x3000-0x3fff]
  601. Apr 20 15:26:14 localhost kernel: pci 0000:00:1a.0: bridge window [mem 0x85100000-0x85afffff]
  602. Apr 20 15:26:14 localhost kernel: pci 0000:00:1a.0: bridge window [mem 0x6802100000-0x6802afffff 64bit pref]
  603. Apr 20 15:26:14 localhost kernel: pci 0000:00:1b.0: PCI bridge to [bus 04]
  604. Apr 20 15:26:14 localhost kernel: pci 0000:00:1c.0: PCI bridge to [bus 05]
  605. Apr 20 15:26:14 localhost kernel: pci 0000:00:1c.0: bridge window [mem 0x85e00000-0x85efffff]
  606. Apr 20 15:26:14 localhost kernel: pci 0000:00:1c.3: PCI bridge to [bus 06]
  607. Apr 20 15:26:14 localhost kernel: pci 0000:00:1c.3: bridge window [mem 0x85b00000-0x85cfffff]
  608. Apr 20 15:26:14 localhost kernel: pci 0000:00:1d.0: PCI bridge to [bus 07]
  609. Apr 20 15:26:14 localhost kernel: pci 0000:00:1d.0: bridge window [mem 0x85d00000-0x85dfffff]
  610. Apr 20 15:26:14 localhost kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window]
  611. Apr 20 15:26:14 localhost kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window]
  612. Apr 20 15:26:14 localhost kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window]
  613. Apr 20 15:26:14 localhost kernel: pci_bus 0000:00: resource 7 [mem 0x000e0000-0x000effff window]
  614. Apr 20 15:26:14 localhost kernel: pci_bus 0000:00: resource 8 [mem 0x80800000-0xbfffffff window]
  615. Apr 20 15:26:14 localhost kernel: pci_bus 0000:00: resource 9 [mem 0x4000000000-0x7fffffffff window]
  616. Apr 20 15:26:14 localhost kernel: pci_bus 0000:01: resource 0 [io 0x4000-0x4fff]
  617. Apr 20 15:26:14 localhost kernel: pci_bus 0000:01: resource 1 [mem 0x84000000-0x850fffff]
  618. Apr 20 15:26:14 localhost kernel: pci_bus 0000:01: resource 2 [mem 0x6000000000-0x6801ffffff 64bit pref]
  619. Apr 20 15:26:14 localhost kernel: pci_bus 0000:02: resource 1 [mem 0x85f00000-0x85ffffff]
  620. Apr 20 15:26:14 localhost kernel: pci_bus 0000:03: resource 0 [io 0x3000-0x3fff]
  621. Apr 20 15:26:14 localhost kernel: pci_bus 0000:03: resource 1 [mem 0x85100000-0x85afffff]
  622. Apr 20 15:26:14 localhost kernel: pci_bus 0000:03: resource 2 [mem 0x6802100000-0x6802afffff 64bit pref]
  623. Apr 20 15:26:14 localhost kernel: pci_bus 0000:05: resource 1 [mem 0x85e00000-0x85efffff]
  624. Apr 20 15:26:14 localhost kernel: pci_bus 0000:06: resource 1 [mem 0x85b00000-0x85cfffff]
  625. Apr 20 15:26:14 localhost kernel: pci_bus 0000:07: resource 1 [mem 0x85d00000-0x85dfffff]
  626. Apr 20 15:26:14 localhost kernel: xen: registering gsi 16 triggering 0 polarity 1
  627. Apr 20 15:26:14 localhost kernel: xen: --> pirq=16 -> irq=16 (gsi=16)
  628. Apr 20 15:26:14 localhost kernel: pci 0000:01:00.1: extending delay after power-on from D3hot to 20 msec
  629. Apr 20 15:26:14 localhost kernel: pci 0000:01:00.1: D0 power state depends on 0000:01:00.0
  630. Apr 20 15:26:14 localhost kernel: PCI: CLS 64 bytes, default 64
  631. Apr 20 15:26:14 localhost kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB)
  632. Apr 20 15:26:14 localhost kernel: software IO TLB: mapped [mem 0x000000018d000000-0x0000000191000000] (64MB)
  633. Apr 20 15:26:14 localhost kernel: Trying to unpack rootfs image as initramfs...
  634. Apr 20 15:26:14 localhost kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x2df106bba01, max_idle_ns: 440795268242 ns
  635. Apr 20 15:26:14 localhost kernel: clocksource: Switched to clocksource tsc
  636. Apr 20 15:26:14 localhost kernel: platform rtc_cmos: registered platform RTC device (no PNP device found)
  637. Apr 20 15:26:14 localhost kernel: Initialise system trusted keyrings
  638. Apr 20 15:26:14 localhost kernel: Key type blacklist registered
  639. Apr 20 15:26:14 localhost kernel: workingset: timestamp_bits=36 max_order=20 bucket_order=0
  640. Apr 20 15:26:14 localhost kernel: zbud: loaded
  641. Apr 20 15:26:14 localhost kernel: integrity: Platform Keyring initialized
  642. Apr 20 15:26:14 localhost kernel: integrity: Machine keyring initialized
  643. Apr 20 15:26:14 localhost kernel: NET: Registered PF_ALG protocol family
  644. Apr 20 15:26:14 localhost kernel: xor: automatically using best checksumming function avx
  645. Apr 20 15:26:14 localhost kernel: Key type asymmetric registered
  646. Apr 20 15:26:14 localhost kernel: Asymmetric key parser 'x509' registered
  647. Apr 20 15:26:14 localhost kernel: Freeing initrd memory: 39016K
  648. Apr 20 15:26:14 localhost kernel: alg: self-tests for CTR-KDF (hmac(sha256)) passed
  649. Apr 20 15:26:14 localhost kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 245)
  650. Apr 20 15:26:14 localhost kernel: io scheduler mq-deadline registered
  651. Apr 20 15:26:14 localhost kernel: io scheduler kyber registered
  652. Apr 20 15:26:14 localhost kernel: io scheduler bfq registered
  653. Apr 20 15:26:14 localhost kernel: atomic64_test: passed for x86-64 platform with CX8 and with SSE
  654. Apr 20 15:26:14 localhost kernel: xen: registering gsi 16 triggering 0 polarity 1
  655. Apr 20 15:26:14 localhost kernel: Already setup the GSI :16
  656. Apr 20 15:26:14 localhost kernel: pcieport 0000:00:01.0: PME: Signaling with IRQ 266
  657. Apr 20 15:26:14 localhost kernel: pcieport 0000:00:01.0: AER: enabled with IRQ 266
  658. Apr 20 15:26:14 localhost kernel: xen: registering gsi 17 triggering 0 polarity 1
  659. Apr 20 15:26:14 localhost kernel: xen: --> pirq=17 -> irq=17 (gsi=17)
  660. Apr 20 15:26:14 localhost kernel: pcieport 0000:00:01.1: PME: Signaling with IRQ 267
  661. Apr 20 15:26:14 localhost kernel: pcieport 0000:00:01.1: AER: enabled with IRQ 267
  662. Apr 20 15:26:14 localhost kernel: pcieport 0000:00:1a.0: PME: Signaling with IRQ 268
  663. Apr 20 15:26:14 localhost kernel: pcieport 0000:00:1b.0: PME: Signaling with IRQ 269
  664. Apr 20 15:26:14 localhost kernel: xen: registering gsi 16 triggering 0 polarity 1
  665. Apr 20 15:26:14 localhost kernel: Already setup the GSI :16
  666. Apr 20 15:26:14 localhost kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 270
  667. Apr 20 15:26:14 localhost kernel: pcieport 0000:00:1c.0: AER: enabled with IRQ 270
  668. Apr 20 15:26:14 localhost kernel: xen: registering gsi 19 triggering 0 polarity 1
  669. Apr 20 15:26:14 localhost kernel: xen: --> pirq=19 -> irq=19 (gsi=19)
  670. Apr 20 15:26:14 localhost kernel: pcieport 0000:00:1c.3: PME: Signaling with IRQ 271
  671. Apr 20 15:26:14 localhost kernel: pcieport 0000:00:1c.3: AER: enabled with IRQ 271
  672. Apr 20 15:26:14 localhost kernel: xen: registering gsi 16 triggering 0 polarity 1
  673. Apr 20 15:26:14 localhost kernel: Already setup the GSI :16
  674. Apr 20 15:26:14 localhost kernel: pcieport 0000:00:1d.0: PME: Signaling with IRQ 272
  675. Apr 20 15:26:14 localhost kernel: pcieport 0000:00:1d.0: AER: enabled with IRQ 272
  676. Apr 20 15:26:14 localhost kernel: Monitor-Mwait will be used to enter C-1 state
  677. Apr 20 15:26:14 localhost kernel: Monitor-Mwait will be used to enter C-2 state
  678. Apr 20 15:26:14 localhost kernel: Monitor-Mwait will be used to enter C-3 state
  679. Apr 20 15:26:14 localhost kernel: ACPI: \_SB_.PR00: Found 3 idle states
  680. Apr 20 15:26:14 localhost kernel: intel_idle: intel_idle yielding to none
  681. Apr 20 15:26:14 localhost kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input0
  682. Apr 20 15:26:14 localhost kernel: ACPI: button: Sleep Button [SLPB]
  683. Apr 20 15:26:14 localhost kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input1
  684. Apr 20 15:26:14 localhost kernel: ACPI: button: Power Button [PWRB]
  685. Apr 20 15:26:14 localhost kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2
  686. Apr 20 15:26:14 localhost kernel: ACPI: button: Power Button [PWRF]
  687. Apr 20 15:26:14 localhost kernel: ACPI: \_SB_.PR00: Found 3 idle states
  688. Apr 20 15:26:14 localhost kernel: ACPI: \_SB_.PR01: Found 3 idle states
  689. Apr 20 15:26:14 localhost kernel: ACPI: \_SB_.PR02: Found 3 idle states
  690. Apr 20 15:26:14 localhost kernel: ACPI: \_SB_.PR03: Found 3 idle states
  691. Apr 20 15:26:14 localhost kernel: ACPI: \_SB_.PR04: Found 3 idle states
  692. Apr 20 15:26:14 localhost kernel: ACPI: \_SB_.PR05: Found 3 idle states
  693. Apr 20 15:26:14 localhost kernel: ACPI: \_SB_.PR06: Found 3 idle states
  694. Apr 20 15:26:14 localhost kernel: ACPI: \_SB_.PR07: Found 3 idle states
  695. Apr 20 15:26:14 localhost kernel: ACPI: \_SB_.PR08: Found 3 idle states
  696. Apr 20 15:26:14 localhost kernel: ACPI: \_SB_.PR09: Found 3 idle states
  697. Apr 20 15:26:14 localhost kernel: ACPI: \_SB_.PR10: Found 3 idle states
  698. Apr 20 15:26:14 localhost kernel: ACPI: \_SB_.PR11: Found 3 idle states
  699. Apr 20 15:26:14 localhost kernel: ACPI: \_SB_.PR12: Found 3 idle states
  700. Apr 20 15:26:14 localhost kernel: ACPI: \_SB_.PR13: Found 3 idle states
  701. Apr 20 15:26:14 localhost kernel: ACPI: \_SB_.PR14: Found 3 idle states
  702. Apr 20 15:26:14 localhost kernel: ACPI: \_SB_.PR15: Found 3 idle states
  703. Apr 20 15:26:14 localhost kernel: ACPI: \_SB_.PR16: Found 3 idle states
  704. Apr 20 15:26:14 localhost kernel: ACPI: \_SB_.PR17: Found 3 idle states
  705. Apr 20 15:26:14 localhost kernel: ACPI: \_SB_.PR18: Found 3 idle states
  706. Apr 20 15:26:14 localhost kernel: ACPI: \_SB_.PR19: Found 3 idle states
  707. Apr 20 15:26:14 localhost kernel: ACPI: \_SB_.PR20: Found 3 idle states
  708. Apr 20 15:26:14 localhost kernel: ACPI: \_SB_.PR21: Found 3 idle states
  709. Apr 20 15:26:14 localhost kernel: ACPI: \_SB_.PR22: Found 3 idle states
  710. Apr 20 15:26:14 localhost kernel: ACPI: \_SB_.PR23: Found 3 idle states
  711. Apr 20 15:26:14 localhost kernel: thermal LNXTHERM:00: registered as thermal_zone0
  712. Apr 20 15:26:14 localhost kernel: ACPI: thermal: Thermal Zone [TZ00] (28 C)
  713. Apr 20 15:26:14 localhost kernel: Serial: 8250/16550 driver, 32 ports, IRQ sharing enabled
  714. Apr 20 15:26:14 localhost kernel: serial8250: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A
  715. Apr 20 15:26:14 localhost kernel: hpet_acpi_add: no address or irqs in _CRS
  716. Apr 20 15:26:14 localhost kernel: Non-volatile memory driver v1.3
  717. Apr 20 15:26:14 localhost kernel: Linux agpgart interface v0.103
  718. Apr 20 15:26:14 localhost kernel: ACPI: bus type drm_connector registered
  719. Apr 20 15:26:14 localhost kernel: intel-lpss 0000:00:15.0: enabling device (0004 -> 0006)
  720. Apr 20 15:26:14 localhost kernel: xen: registering gsi 27 triggering 0 polarity 1
  721. Apr 20 15:26:14 localhost kernel: xen: --> pirq=27 -> irq=27 (gsi=27)
  722. Apr 20 15:26:14 localhost kernel: intel-lpss 0000:00:15.1: enabling device (0004 -> 0006)
  723. Apr 20 15:26:14 localhost kernel: xen: registering gsi 40 triggering 0 polarity 1
  724. Apr 20 15:26:14 localhost kernel: xen: --> pirq=40 -> irq=40 (gsi=40)
  725. Apr 20 15:26:14 localhost kernel: i2c i2c-1: Failed to register i2c client ITE8853:00 at 0x40 (-16)
  726. Apr 20 15:26:14 localhost kernel: intel-lpss 0000:00:15.2: enabling device (0004 -> 0006)
  727. Apr 20 15:26:14 localhost kernel: xen: registering gsi 29 triggering 0 polarity 1
  728. Apr 20 15:26:14 localhost kernel: xen: --> pirq=29 -> irq=29 (gsi=29)
  729. Apr 20 15:26:14 localhost kernel: ahci 0000:00:17.0: version 3.0
  730. Apr 20 15:26:14 localhost kernel: ahci 0000:00:17.0: enabling device (0000 -> 0003)
  731. Apr 20 15:26:14 localhost kernel: xen: registering gsi 16 triggering 0 polarity 1
  732. Apr 20 15:26:14 localhost kernel: Already setup the GSI :16
  733. Apr 20 15:26:14 localhost kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 4 ports 6 Gbps 0xf0 impl SATA mode
  734. Apr 20 15:26:14 localhost kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf led clo only pio slum part ems deso sadm sds
  735. Apr 20 15:26:14 localhost kernel: scsi host0: ahci
  736. Apr 20 15:26:14 localhost kernel: scsi host1: ahci
  737. Apr 20 15:26:14 localhost kernel: scsi host2: ahci
  738. Apr 20 15:26:14 localhost kernel: scsi host3: ahci
  739. Apr 20 15:26:14 localhost kernel: scsi host4: ahci
  740. Apr 20 15:26:14 localhost kernel: scsi host5: ahci
  741. Apr 20 15:26:14 localhost kernel: scsi host6: ahci
  742. Apr 20 15:26:14 localhost kernel: scsi host7: ahci
  743. Apr 20 15:26:14 localhost kernel: ata1: DUMMY
  744. Apr 20 15:26:14 localhost kernel: ata2: DUMMY
  745. Apr 20 15:26:14 localhost kernel: ata3: DUMMY
  746. Apr 20 15:26:14 localhost kernel: ata4: DUMMY
  747. Apr 20 15:26:14 localhost kernel: ata5: SATA max UDMA/133 abar m2048@0x86002000 port 0x86002300 irq 274
  748. Apr 20 15:26:14 localhost kernel: ata6: SATA max UDMA/133 abar m2048@0x86002000 port 0x86002380 irq 274
  749. Apr 20 15:26:14 localhost kernel: ata7: SATA max UDMA/133 abar m2048@0x86002000 port 0x86002400 irq 274
  750. Apr 20 15:26:14 localhost kernel: ata8: SATA max UDMA/133 abar m2048@0x86002000 port 0x86002480 irq 274
  751. Apr 20 15:26:14 localhost kernel: usbcore: registered new interface driver usbserial_generic
  752. Apr 20 15:26:14 localhost kernel: usbserial: USB Serial support registered for generic
  753. Apr 20 15:26:14 localhost kernel: i8042: PNP: No PS/2 controller found.
  754. Apr 20 15:26:14 localhost kernel: mousedev: PS/2 mouse device common for all mice
  755. Apr 20 15:26:14 localhost kernel: rtc_cmos rtc_cmos: RTC can wake from S4
  756. Apr 20 15:26:14 localhost kernel: rtc_cmos rtc_cmos: registered as rtc0
  757. Apr 20 15:26:14 localhost kernel: rtc_cmos rtc_cmos: setting system clock to 2024-04-20T20:26:14 UTC (1713644774)
  758. Apr 20 15:26:14 localhost kernel: rtc_cmos rtc_cmos: alarms up to one month, y3k, 114 bytes nvram
  759. Apr 20 15:26:14 localhost kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log.
  760. Apr 20 15:26:14 localhost kernel: device-mapper: uevent: version 1.0.3
  761. Apr 20 15:26:14 localhost kernel: device-mapper: ioctl: 4.47.0-ioctl (2022-07-28) initialised: [email protected]
  762. Apr 20 15:26:14 localhost kernel: intel_pstate: CPU model not supported
  763. Apr 20 15:26:14 localhost kernel: sysfb: VRAM smaller than advertised
  764. Apr 20 15:26:14 localhost kernel: efifb: probing for efifb
  765. Apr 20 15:26:14 localhost kernel: efifb: No BGRT, not showing boot graphics
  766. Apr 20 15:26:14 localhost kernel: efifb: framebuffer at 0x4000000000, using 16200k, total 16200k
  767. Apr 20 15:26:14 localhost kernel: efifb: mode is 3840x1080x32, linelength=15360, pages=1
  768. Apr 20 15:26:14 localhost kernel: efifb: scrolling: redraw
  769. Apr 20 15:26:14 localhost kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0
  770. Apr 20 15:26:14 localhost kernel: fbcon: Deferring console take-over
  771. Apr 20 15:26:14 localhost kernel: fb0: EFI VGA frame buffer device
  772. Apr 20 15:26:14 localhost kernel: pstore: Registered efi as persistent store backend
  773. Apr 20 15:26:14 localhost kernel: hid: raw HID events driver (C) Jiri Kosina
  774. Apr 20 15:26:14 localhost kernel: usbcore: registered new interface driver usbhid
  775. Apr 20 15:26:14 localhost kernel: usbhid: USB HID core driver
  776. Apr 20 15:26:14 localhost kernel: drop_monitor: Initializing network drop monitor service
  777. Apr 20 15:26:14 localhost kernel: Initializing XFRM netlink socket
  778. Apr 20 15:26:14 localhost kernel: NET: Registered PF_INET6 protocol family
  779. Apr 20 15:26:14 localhost kernel: Segment Routing with IPv6
  780. Apr 20 15:26:14 localhost kernel: RPL Segment Routing with IPv6
  781. Apr 20 15:26:14 localhost kernel: In-situ OAM (IOAM) with IPv6
  782. Apr 20 15:26:14 localhost kernel: mip6: Mobile IPv6
  783. Apr 20 15:26:14 localhost kernel: NET: Registered PF_PACKET protocol family
  784. Apr 20 15:26:14 localhost kernel: IPI shorthand broadcast: enabled
  785. Apr 20 15:26:14 localhost kernel: AVX2 version of gcm_enc/dec engaged.
  786. Apr 20 15:26:14 localhost kernel: AES CTR mode by8 optimization enabled
  787. Apr 20 15:26:14 localhost kernel: sched_clock: Marking stable (1416350137, 46906578)->(1474183783, -10927068)
  788. Apr 20 15:26:14 localhost kernel: registered taskstats version 1
  789. Apr 20 15:26:14 localhost kernel: Loading compiled-in X.509 certificates
  790. Apr 20 15:26:14 localhost kernel: Loaded X.509 cert 'Build time autogenerated kernel key: 3c7de4cb38cbce65ccddae94ef3d00e5ae8517ed'
  791. Apr 20 15:26:14 localhost kernel: zswap: loaded using pool lzo/zbud
  792. Apr 20 15:26:14 localhost kernel: page_owner is disabled
  793. Apr 20 15:26:14 localhost kernel: Key type .fscrypt registered
  794. Apr 20 15:26:14 localhost kernel: Key type fscrypt-provisioning registered
  795. Apr 20 15:26:14 localhost kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=yes, fsverity=yes
  796. Apr 20 15:26:14 localhost kernel: pstore: Using crash dump compression: deflate
  797. Apr 20 15:26:14 localhost kernel: Key type big_key registered
  798. Apr 20 15:26:14 localhost kernel: Key type trusted registered
  799. Apr 20 15:26:14 localhost kernel: Key type encrypted registered
  800. Apr 20 15:26:14 localhost kernel: integrity: Loading X.509 certificate: UEFI:db
  801. Apr 20 15:26:14 localhost kernel: integrity: Loaded X.509 cert 'ASUSTeK MotherBoard SW Key Certificate: da83b990422ebc8c441f8d8b039a65a2'
  802. Apr 20 15:26:14 localhost kernel: integrity: Loading X.509 certificate: UEFI:db
  803. Apr 20 15:26:14 localhost kernel: integrity: Loaded X.509 cert 'ASUSTeK Notebook SW Key Certificate: b8e581e4df77a5bb4282d5ccfc00c071'
  804. Apr 20 15:26:14 localhost kernel: integrity: Loading X.509 certificate: UEFI:db
  805. Apr 20 15:26:14 localhost kernel: integrity: Loaded X.509 cert 'Microsoft Corporation UEFI CA 2011: 13adbf4309bd82709c8cd54f316ed522988a1bd4'
  806. Apr 20 15:26:14 localhost kernel: integrity: Loading X.509 certificate: UEFI:db
  807. Apr 20 15:26:14 localhost kernel: integrity: Loaded X.509 cert 'Microsoft Windows Production PCA 2011: a92902398e16c49778cd90f99e4f9ae17c55af53'
  808. Apr 20 15:26:14 localhost kernel: integrity: Loading X.509 certificate: UEFI:db
  809. Apr 20 15:26:14 localhost kernel: integrity: Loaded X.509 cert 'Canonical Ltd. Master Certificate Authority: ad91990bc22ab1f517048c23b6655a268e345a63'
  810. Apr 20 15:26:14 localhost kernel: Loading compiled-in module X.509 certificates
  811. Apr 20 15:26:14 localhost kernel: Loaded X.509 cert 'Build time autogenerated kernel key: 3c7de4cb38cbce65ccddae94ef3d00e5ae8517ed'
  812. Apr 20 15:26:14 localhost kernel: ima: Allocated hash algorithm: sha256
  813. Apr 20 15:26:14 localhost kernel: ima: No architecture policies found
  814. Apr 20 15:26:14 localhost kernel: evm: Initialising EVM extended attributes:
  815. Apr 20 15:26:14 localhost kernel: evm: security.selinux
  816. Apr 20 15:26:14 localhost kernel: evm: security.SMACK64 (disabled)
  817. Apr 20 15:26:14 localhost kernel: evm: security.SMACK64EXEC (disabled)
  818. Apr 20 15:26:14 localhost kernel: evm: security.SMACK64TRANSMUTE (disabled)
  819. Apr 20 15:26:14 localhost kernel: evm: security.SMACK64MMAP (disabled)
  820. Apr 20 15:26:14 localhost kernel: evm: security.apparmor
  821. Apr 20 15:26:14 localhost kernel: evm: security.ima
  822. Apr 20 15:26:14 localhost kernel: evm: security.capability
  823. Apr 20 15:26:14 localhost kernel: evm: HMAC attrs: 0x1
  824. Apr 20 15:26:14 localhost kernel: alg: No test for 842 (842-scomp)
  825. Apr 20 15:26:14 localhost kernel: alg: No test for 842 (842-generic)
  826. Apr 20 15:26:14 localhost kernel: PM: Magic number: 4:986:447
  827. Apr 20 15:26:14 localhost kernel: RAS: Correctable Errors collector initialized.
  828. Apr 20 15:26:14 localhost kernel: ata6: SATA link down (SStatus 4 SControl 300)
  829. Apr 20 15:26:14 localhost kernel: ata7: SATA link down (SStatus 4 SControl 300)
  830. Apr 20 15:26:14 localhost kernel: ata8: SATA link down (SStatus 4 SControl 300)
  831. Apr 20 15:26:14 localhost kernel: ata5: SATA link down (SStatus 4 SControl 300)
  832. Apr 20 15:26:14 localhost kernel: Freeing unused decrypted memory: 2036K
  833. Apr 20 15:26:14 localhost kernel: Freeing unused kernel image (initmem) memory: 3540K
  834. Apr 20 15:26:14 localhost kernel: Write protecting the kernel read-only data: 28672k
  835. Apr 20 15:26:14 localhost kernel: Freeing unused kernel image (text/rodata gap) memory: 2036K
  836. Apr 20 15:26:14 localhost kernel: Freeing unused kernel image (rodata/data gap) memory: 648K
  837. Apr 20 15:26:14 localhost kernel: rodata_test: all tests were successful
  838. Apr 20 15:26:14 localhost kernel: Run /init as init process
  839. Apr 20 15:26:14 localhost kernel: with arguments:
  840. Apr 20 15:26:14 localhost kernel: /init
  841. Apr 20 15:26:14 localhost kernel: placeholder
  842. Apr 20 15:26:14 localhost kernel: x86_64
  843. Apr 20 15:26:14 localhost kernel: rhgb
  844. Apr 20 15:26:14 localhost kernel: with environment:
  845. Apr 20 15:26:14 localhost kernel: HOME=/
  846. Apr 20 15:26:14 localhost kernel: TERM=linux
  847. Apr 20 15:26:14 localhost systemd[1]: systemd 251.19-1.fc37 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP -GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS +FIDO2 +IDN2 -IDN -IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 +PWQUALITY +P11KIT +QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD +BPF_FRAMEWORK +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified)
  848. Apr 20 15:26:14 localhost systemd[1]: Detected virtualization xen.
  849. Apr 20 15:26:14 localhost systemd[1]: Detected architecture x86-64.
  850. Apr 20 15:26:14 localhost systemd[1]: Running in initial RAM disk.
  851. Apr 20 15:26:14 localhost systemd[1]: No hostname configured, using default hostname.
  852. Apr 20 15:26:14 localhost systemd[1]: Hostname set to <localhost>.
  853. Apr 20 15:26:14 localhost systemd[1]: Failed to open libbpf, cgroup BPF features disabled: Operation not supported
  854. Apr 20 15:26:14 localhost systemd[1]: Queued start job for default target initrd.target.
  855. Apr 20 15:26:14 localhost systemd[1]: Created slice system-systemd\x2dcryptsetup.slice - Slice /system/systemd-cryptsetup.
  856. Apr 20 15:26:14 localhost systemd[1]: Reached target initrd-usr-fs.target - Initrd /usr File System.
  857. Apr 20 15:26:14 localhost systemd[1]: Reached target local-fs.target - Local File Systems.
  858. Apr 20 15:26:14 localhost systemd[1]: Reached target slices.target - Slice Units.
  859. Apr 20 15:26:14 localhost systemd[1]: Reached target swap.target - Swaps.
  860. Apr 20 15:26:14 localhost systemd[1]: Reached target timers.target - Timer Units.
  861. Apr 20 15:26:14 localhost systemd[1]: Listening on systemd-journald-audit.socket - Journal Audit Socket.
  862. Apr 20 15:26:14 localhost systemd[1]: Listening on systemd-journald-dev-log.socket - Journal Socket (/dev/log).
  863. Apr 20 15:26:14 localhost systemd[1]: Listening on systemd-journald.socket - Journal Socket.
  864. Apr 20 15:26:14 localhost systemd[1]: Listening on systemd-udevd-control.socket - udev Control Socket.
  865. Apr 20 15:26:14 localhost systemd[1]: Listening on systemd-udevd-kernel.socket - udev Kernel Socket.
  866. Apr 20 15:26:14 localhost systemd[1]: Reached target sockets.target - Socket Units.
  867. Apr 20 15:26:14 localhost systemd[1]: Starting kmod-static-nodes.service - Create List of Static Device Nodes...
  868. Apr 20 15:26:14 localhost systemd[1]: memstrack.service - Memstrack Anylazing Service was skipped because all trigger condition checks failed.
  869. Apr 20 15:26:14 localhost systemd[1]: Starting systemd-journald.service - Journal Service...
  870. Apr 20 15:26:14 localhost systemd[1]: Starting systemd-modules-load.service - Load Kernel Modules...
  871. Apr 20 15:26:14 localhost systemd[1]: Starting systemd-vconsole-setup.service - Setup Virtual Console...
  872. Apr 20 15:26:14 localhost systemd[1]: Finished kmod-static-nodes.service - Create List of Static Device Nodes.
  873. Apr 20 15:26:14 localhost systemd[1]: Starting systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev...
  874. Apr 20 15:26:14 localhost kernel: alua: device handler registered
  875. Apr 20 15:26:14 localhost kernel: emc: device handler registered
  876. Apr 20 15:26:14 localhost kernel: rdac: device handler registered
  877. Apr 20 15:26:14 localhost kernel: xen:xen_evtchn: Event-channel device installed
  878. Apr 20 15:26:14 localhost systemd[1]: Finished systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev.
  879. Apr 20 15:26:14 localhost kernel: audit: type=1130 audit(1713644774.947:2): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  880. Apr 20 15:26:14 localhost kernel: xen_pciback: backend is vpci
  881. Apr 20 15:26:14 localhost kernel: xen_acpi_processor: Uploading Xen processor PM info
  882. Apr 20 15:26:14 localhost systemd[1]: Finished systemd-modules-load.service - Load Kernel Modules.
  883. Apr 20 15:26:14 localhost kernel: audit: type=1130 audit(1713644774.963:3): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  884. Apr 20 15:26:14 localhost systemd[1]: Starting systemd-sysctl.service - Apply Kernel Variables...
  885. Apr 20 15:26:14 localhost systemd-journald[399]: Journal started
  886. Apr 20 15:26:14 localhost systemd-journald[399]: Runtime Journal (/run/log/journal/5e0ed3df2d7f445c9b1c749edb877185) is 8.0M, max 77.6M, 69.6M free.
  887. Apr 20 15:26:14 localhost audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  888. Apr 20 15:26:14 localhost audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  889. Apr 20 15:26:14 localhost systemd-modules-load[400]: Module 'msr' is built in
  890. Apr 20 15:26:14 localhost audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  891. Apr 20 15:26:14 localhost systemd-modules-load[400]: Inserted module 'dm_multipath'
  892. Apr 20 15:26:14 localhost systemd-modules-load[400]: Inserted module 'uinput'
  893. Apr 20 15:26:14 localhost systemd-modules-load[400]: Inserted module 'scsi_dh_alua'
  894. Apr 20 15:26:14 localhost systemd-modules-load[400]: Inserted module 'scsi_dh_emc'
  895. Apr 20 15:26:14 localhost audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  896. Apr 20 15:26:14 localhost systemd-modules-load[400]: Inserted module 'scsi_dh_rdac'
  897. Apr 20 15:26:14 localhost systemd-modules-load[400]: Inserted module 'xen_evtchn'
  898. Apr 20 15:26:14 localhost systemd-modules-load[400]: Inserted module 'xen_gntdev'
  899. Apr 20 15:26:14 localhost systemd-modules-load[400]: Inserted module 'xen_gntalloc'
  900. Apr 20 15:26:14 localhost systemd-modules-load[400]: Inserted module 'xen_blkback'
  901. Apr 20 15:26:14 localhost systemd-modules-load[400]: Inserted module 'xen_pciback'
  902. Apr 20 15:26:14 localhost systemd-modules-load[400]: Inserted module 'xen_privcmd'
  903. Apr 20 15:26:14 localhost systemd-modules-load[400]: Inserted module 'xen_acpi_processor'
  904. Apr 20 15:26:14 localhost systemd[1]: Finished systemd-sysctl.service - Apply Kernel Variables.
  905. Apr 20 15:26:14 localhost systemd[1]: Started systemd-journald.service - Journal Service.
  906. Apr 20 15:26:14 localhost kernel: audit: type=1130 audit(1713644774.970:4): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  907. Apr 20 15:26:14 localhost kernel: audit: type=1130 audit(1713644774.970:5): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  908. Apr 20 15:26:14 localhost systemd[1]: Starting systemd-tmpfiles-setup.service - Create Volatile Files and Directories...
  909. Apr 20 15:26:14 localhost systemd[1]: Finished systemd-tmpfiles-setup.service - Create Volatile Files and Directories.
  910. Apr 20 15:26:14 localhost audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  911. Apr 20 15:26:14 localhost kernel: audit: type=1130 audit(1713644774.978:6): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  912. Apr 20 15:26:14 localhost systemd[1]: Finished systemd-vconsole-setup.service - Setup Virtual Console.
  913. Apr 20 15:26:14 localhost audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  914. Apr 20 15:26:14 localhost systemd[1]: dracut-cmdline-ask.service - dracut ask for additional cmdline parameters was skipped because all trigger condition checks failed.
  915. Apr 20 15:26:14 localhost kernel: audit: type=1130 audit(1713644774.987:7): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  916. Apr 20 15:26:14 localhost systemd[1]: Starting dracut-cmdline.service - dracut cmdline hook...
  917. Apr 20 15:26:15 localhost dracut-cmdline[418]: dracut-4.2 (R4.2) dracut-059-5.fc37
  918. Apr 20 15:26:15 localhost dracut-cmdline[418]: Using kernel command line parameters: placeholder root=/dev/mapper/qubes_dom0-root ro rd.luks.uuid=luks-5241442a-6636-45da-8731-66d029364f3d rd.lvm.lv=qubes_dom0/root rd.lvm.lv=qubes_dom0/swap plymouth.ignore-serial-consoles 6.1.62-1.qubes.fc37.x86_64 x86_64 rhgb rd.qubes.hide_pci=01:00.0,01:00.1 quiet usbcore.authorized_default=0
  919. Apr 20 15:26:15 localhost kernel: pciback 0000:05:00.0: xen_pciback: seizing device
  920. Apr 20 15:26:15 localhost kernel: pciback 0000:05:00.0: enabling device (0000 -> 0002)
  921. Apr 20 15:26:15 localhost kernel: xen: registering gsi 16 triggering 0 polarity 1
  922. Apr 20 15:26:15 localhost kernel: Already setup the GSI :16
  923. Apr 20 15:26:15 localhost kernel: pciback 0000:06:00.0: xen_pciback: seizing device
  924. Apr 20 15:26:15 localhost kernel: pciback 0000:06:00.0: enabling device (0000 -> 0002)
  925. Apr 20 15:26:15 localhost kernel: xen: registering gsi 19 triggering 0 polarity 1
  926. Apr 20 15:26:15 localhost kernel: Already setup the GSI :19
  927. Apr 20 15:26:15 localhost kernel: pciback 0000:01:00.0: xen_pciback: seizing device
  928. Apr 20 15:26:15 localhost kernel: xen: registering gsi 16 triggering 0 polarity 1
  929. Apr 20 15:26:15 localhost kernel: Already setup the GSI :16
  930. Apr 20 15:26:15 localhost kernel: pciback 0000:01:00.1: xen_pciback: seizing device
  931. Apr 20 15:26:15 localhost kernel: pciback 0000:01:00.1: enabling device (0000 -> 0002)
  932. Apr 20 15:26:15 localhost kernel: xen: registering gsi 17 triggering 0 polarity 1
  933. Apr 20 15:26:15 localhost kernel: Already setup the GSI :17
  934. Apr 20 15:26:15 localhost dracut-cmdline[418]: Restricting USB in dom0 via usbguard.
  935. Apr 20 15:26:15 localhost systemd[1]: Reloading.
  936. Apr 20 15:26:15 localhost audit: BPF prog-id=6 op=LOAD
  937. Apr 20 15:26:15 localhost audit: BPF prog-id=3 op=UNLOAD
  938. Apr 20 15:26:15 localhost audit: BPF prog-id=7 op=LOAD
  939. Apr 20 15:26:15 localhost audit: BPF prog-id=8 op=LOAD
  940. Apr 20 15:26:15 localhost audit: BPF prog-id=4 op=UNLOAD
  941. Apr 20 15:26:15 localhost audit: BPF prog-id=5 op=UNLOAD
  942. Apr 20 15:26:15 localhost kernel: audit: type=1334 audit(1713644775.506:8): prog-id=6 op=LOAD
  943. Apr 20 15:26:15 localhost kernel: audit: type=1334 audit(1713644775.506:9): prog-id=3 op=UNLOAD
  944. Apr 20 15:26:15 localhost kernel: audit: type=1334 audit(1713644775.506:10): prog-id=7 op=LOAD
  945. Apr 20 15:26:15 localhost audit: BPF prog-id=9 op=LOAD
  946. Apr 20 15:26:15 localhost audit: BPF prog-id=10 op=LOAD
  947. Apr 20 15:26:15 localhost audit: BPF prog-id=11 op=LOAD
  948. Apr 20 15:26:15 localhost systemd[1]: Starting usbguard.service - USBGuard daemon...
  949. Apr 20 15:26:15 localhost usbguard-daemon[515]: [1713644775.553] (W) PERMISSIONS CHECK ON POLICY FILE ARE TURNED OFF!
  950. Apr 20 15:26:15 localhost systemd[1]: Started usbguard.service - USBGuard daemon.
  951. Apr 20 15:26:15 localhost audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=usbguard comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  952. Apr 20 15:26:15 localhost systemd-escape[558]: Input 'luks-5241442a-6636-45da-8731-66d029364f3d' is not an absolute file system path, escaping is likely not going to be reversible.
  953. Apr 20 15:26:15 localhost systemd[1]: Finished dracut-cmdline.service - dracut cmdline hook.
  954. Apr 20 15:26:15 localhost audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  955. Apr 20 15:26:15 localhost systemd[1]: Starting dracut-pre-udev.service - dracut pre-udev hook...
  956. Apr 20 15:26:15 localhost systemd[1]: Finished dracut-pre-udev.service - dracut pre-udev hook.
  957. Apr 20 15:26:15 localhost audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  958. Apr 20 15:26:15 localhost audit: BPF prog-id=12 op=LOAD
  959. Apr 20 15:26:15 localhost audit: BPF prog-id=13 op=LOAD
  960. Apr 20 15:26:15 localhost systemd[1]: Starting systemd-udevd.service - Rule-based Manager for Device Events and Files...
  961. Apr 20 15:26:16 localhost systemd-udevd[613]: Using default interface naming scheme 'v251'.
  962. Apr 20 15:26:16 localhost systemd[1]: Started systemd-udevd.service - Rule-based Manager for Device Events and Files.
  963. Apr 20 15:26:16 localhost audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  964. Apr 20 15:26:16 localhost systemd[1]: dracut-pre-trigger.service - dracut pre-trigger hook was skipped because all trigger condition checks failed.
  965. Apr 20 15:26:16 localhost systemd[1]: Starting systemd-udev-trigger.service - Coldplug All udev Devices...
  966. Apr 20 15:26:16 localhost systemd[1]: Created slice system-modprobe.slice - Slice /system/modprobe.
  967. Apr 20 15:26:16 localhost systemd[1]: Starting [email protected] - Load Kernel Module configfs...
  968. Apr 20 15:26:16 localhost systemd[1]: [email protected]: Deactivated successfully.
  969. Apr 20 15:26:16 localhost systemd[1]: Finished [email protected] - Load Kernel Module configfs.
  970. Apr 20 15:26:16 localhost audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  971. Apr 20 15:26:16 localhost audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  972. Apr 20 15:26:16 localhost systemd[1]: Mounting sys-kernel-config.mount - Kernel Configuration File System...
  973. Apr 20 15:26:16 localhost systemd[1]: Mounted sys-kernel-config.mount - Kernel Configuration File System.
  974. Apr 20 15:26:16 localhost kernel: acpi PNP0C14:06: duplicate WMI GUID 97845ED0-4E6D-11DE-8A39-0800200C9A66 (first instance was on PNP0C14:02)
  975. Apr 20 15:26:16 localhost systemd[1]: Finished systemd-udev-trigger.service - Coldplug All udev Devices.
  976. Apr 20 15:26:16 localhost audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  977. Apr 20 15:26:16 localhost systemd[1]: Starting dracut-initqueue.service - dracut initqueue hook...
  978. Apr 20 15:26:16 localhost systemd[1]: Starting plymouth-start.service - Show Plymouth Boot Screen...
  979. Apr 20 15:26:16 localhost systemd[1]: Received SIGRTMIN+20 from PID 650 (plymouthd).
  980. Apr 20 15:26:16 localhost kernel: vmd 0000:00:0e.0: enabling device (0000 -> 0002)
  981. Apr 20 15:26:16 localhost systemd[1]: Started plymouth-start.service - Show Plymouth Boot Screen.
  982. Apr 20 15:26:16 localhost audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=plymouth-start comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  983. Apr 20 15:26:16 localhost systemd[1]: systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch was skipped because of a failed condition check (ConditionPathExists=!/run/plymouth/pid).
  984. Apr 20 15:26:16 localhost systemd[1]: Started systemd-ask-password-plymouth.path - Forward Password Requests to Plymouth Directory Watch.
  985. Apr 20 15:26:16 localhost systemd[1]: Reached target paths.target - Path Units.
  986. Apr 20 15:26:16 localhost kernel: vmd 0000:00:0e.0: PCI host bridge to bus 10000:e0
  987. Apr 20 15:26:16 localhost kernel: pci_bus 10000:e0: root bus resource [bus e0-ff]
  988. Apr 20 15:26:16 localhost kernel: pci_bus 10000:e0: root bus resource [mem 0x82000000-0x83ffffff]
  989. Apr 20 15:26:16 localhost kernel: pci_bus 10000:e0: root bus resource [mem 0x6807102000-0x68071fffff 64bit]
  990. Apr 20 15:26:16 localhost kernel: vmd 0000:00:0e.0: Bound to PCI domain 10000
  991. Apr 20 15:26:16 localhost kernel: nvme 0000:02:00.0: platform quirk: setting simple suspend
  992. Apr 20 15:26:16 localhost kernel: nvme nvme0: pci function 0000:02:00.0
  993. Apr 20 15:26:16 localhost kernel: nvme 0000:07:00.0: platform quirk: setting simple suspend
  994. Apr 20 15:26:16 localhost kernel: nvme nvme1: pci function 0000:07:00.0
  995. Apr 20 15:26:16 localhost kernel: xen: registering gsi 17 triggering 0 polarity 1
  996. Apr 20 15:26:16 localhost kernel: xen: registering gsi 16 triggering 0 polarity 1
  997. Apr 20 15:26:16 localhost kernel: Already setup the GSI :17
  998. Apr 20 15:26:16 localhost kernel: Already setup the GSI :16
  999. Apr 20 15:26:16 localhost kernel: nvme nvme0: Shutdown timeout set to 10 seconds
  1000. Apr 20 15:26:16 localhost kernel: nvme nvme0: 16/0/0 default/read/poll queues
  1001. Apr 20 15:26:16 localhost kernel: nvme0n1: p1 p2 p3
  1002. Apr 20 15:26:16 localhost systemd[1]: Reloading.
  1003. Apr 20 15:26:16 localhost kernel: nvme nvme1: 24/0/0 default/read/poll queues
  1004. Apr 20 15:26:16 localhost kernel: nvme1n1: p1 p2 p3
  1005. Apr 20 15:26:16 localhost kernel: xen: registering gsi 16 triggering 0 polarity 1
  1006. Apr 20 15:26:16 localhost kernel: Already setup the GSI :16
  1007. Apr 20 15:26:16 localhost kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller
  1008. Apr 20 15:26:16 localhost kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1
  1009. Apr 20 15:26:16 localhost kernel: xhci_hcd 0000:00:14.0: hcc params 0x20007fc1 hci version 0x120 quirks 0x0000000200009810
  1010. Apr 20 15:26:16 localhost kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller
  1011. Apr 20 15:26:16 localhost kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2
  1012. Apr 20 15:26:16 localhost kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.2 Enhanced SuperSpeed
  1013. Apr 20 15:26:16 localhost kernel: usb usb1: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 6.01
  1014. Apr 20 15:26:16 localhost kernel: usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1
  1015. Apr 20 15:26:16 localhost kernel: usb usb1: Product: xHCI Host Controller
  1016. Apr 20 15:26:16 localhost kernel: usb usb1: Manufacturer: Linux 6.1.62-1.qubes.fc37.x86_64 xhci-hcd
  1017. Apr 20 15:26:16 localhost kernel: usb usb1: SerialNumber: 0000:00:14.0
  1018. Apr 20 15:26:16 localhost kernel: hub 1-0:1.0: USB hub found
  1019. Apr 20 15:26:16 localhost kernel: hub 1-0:1.0: 16 ports detected
  1020. Apr 20 15:26:16 localhost kernel: usb usb2: New USB device found, idVendor=1d6b, idProduct=0003, bcdDevice= 6.01
  1021. Apr 20 15:26:16 localhost kernel: usb usb2: New USB device strings: Mfr=3, Product=2, SerialNumber=1
  1022. Apr 20 15:26:16 localhost kernel: usb usb2: Product: xHCI Host Controller
  1023. Apr 20 15:26:16 localhost kernel: usb usb2: Manufacturer: Linux 6.1.62-1.qubes.fc37.x86_64 xhci-hcd
  1024. Apr 20 15:26:16 localhost kernel: usb usb2: SerialNumber: 0000:00:14.0
  1025. Apr 20 15:26:16 localhost kernel: hub 2-0:1.0: USB hub found
  1026. Apr 20 15:26:16 localhost kernel: hub 2-0:1.0: 8 ports detected
  1027. Apr 20 15:26:16 localhost kernel: usb: port power management may be unreliable
  1028. Apr 20 15:26:16 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:14.0/usb1" device_rule=616C6C6F7720696420316436623A30303032206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362312220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1029. Apr 20 15:26:16 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1" target="allow" device_rule=616C6C6F7720696420316436623A30303032206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362312220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1030. Apr 20 15:26:16 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:14.0/usb2" device_rule=616C6C6F7720696420316436623A30303033206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362322220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1031. Apr 20 15:26:16 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb2" target="allow" device_rule=616C6C6F7720696420316436623A30303033206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362322220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1032. Apr 20 15:26:16 localhost kernel: ACPI Warning: \_SB.PC00.PEG1.PEGP._DSM: Argument #4 type mismatch - Found [Buffer], ACPI requires [Package] (20220331/nsarguments-61)
  1033. Apr 20 15:26:16 localhost kernel: ACPI: \_SB_.PC00.PEG1.PEGP: failed to evaluate _DSM
  1034. Apr 20 15:26:16 localhost audit: BPF prog-id=14 op=LOAD
  1035. Apr 20 15:26:16 localhost audit: BPF prog-id=15 op=LOAD
  1036. Apr 20 15:26:16 localhost audit: BPF prog-id=12 op=UNLOAD
  1037. Apr 20 15:26:16 localhost audit: BPF prog-id=13 op=UNLOAD
  1038. Apr 20 15:26:16 localhost audit: BPF prog-id=16 op=LOAD
  1039. Apr 20 15:26:16 localhost audit: BPF prog-id=9 op=UNLOAD
  1040. Apr 20 15:26:16 localhost audit: BPF prog-id=17 op=LOAD
  1041. Apr 20 15:26:16 localhost audit: BPF prog-id=18 op=LOAD
  1042. Apr 20 15:26:16 localhost audit: BPF prog-id=10 op=UNLOAD
  1043. Apr 20 15:26:16 localhost audit: BPF prog-id=11 op=UNLOAD
  1044. Apr 20 15:26:16 localhost audit: BPF prog-id=19 op=LOAD
  1045. Apr 20 15:26:16 localhost audit: BPF prog-id=6 op=UNLOAD
  1046. Apr 20 15:26:16 localhost audit: BPF prog-id=20 op=LOAD
  1047. Apr 20 15:26:16 localhost audit: BPF prog-id=21 op=LOAD
  1048. Apr 20 15:26:16 localhost audit: BPF prog-id=7 op=UNLOAD
  1049. Apr 20 15:26:16 localhost audit: BPF prog-id=8 op=UNLOAD
  1050. Apr 20 15:26:16 localhost systemd[1]: Found device dev-disk-by\x2duuid-5241442a\x2d6636\x2d45da\x2d8731\x2d66d029364f3d.device - Samsung SSD 990 PRO 2TB 3.
  1051. Apr 20 15:26:16 localhost kernel: usb 1-1: new high-speed USB device number 2 using xhci_hcd
  1052. Apr 20 15:26:16 localhost kernel: xen: registering gsi 16 triggering 0 polarity 1
  1053. Apr 20 15:26:16 localhost kernel: Already setup the GSI :16
  1054. Apr 20 15:26:16 localhost kernel: i915 0000:00:02.0: [drm] VT-d active for gfx access
  1055. Apr 20 15:26:16 localhost systemd[1]: Starting systemd-cryptsetup@luks\x2d5241442a\x2d6636\x2d45da\x2d8731\x2d66d029364f3d.service - Cryptography Setup for luks-5241442a-6636-45da-8731-66d029364f3d...
  1056. Apr 20 15:26:16 localhost kernel: i915 0000:00:02.0: vgaarb: deactivate vga console
  1057. Apr 20 15:26:16 localhost systemd[1]: Started systemd-ask-password-plymouth.service - Forward Password Requests to Plymouth.
  1058. Apr 20 15:26:16 localhost audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-ask-password-plymouth comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1059. Apr 20 15:26:16 localhost kernel: tmpfs: Unsupported parameter 'huge'
  1060. Apr 20 15:26:16 localhost kernel: i915 0000:00:02.0: [drm] Transparent Hugepage support is recommended for optimal performance on this platform!
  1061. Apr 20 15:26:16 localhost kernel: i915 0000:00:02.0: vgaarb: changed VGA decodes: olddecodes=io+mem,decodes=none:owns=io+mem
  1062. Apr 20 15:26:16 localhost kernel: i915 0000:00:02.0: [drm] Finished loading DMC firmware i915/adls_dmc_ver2_01.bin (v2.1)
  1063. Apr 20 15:26:16 localhost kernel: usb 1-1: New USB device found, idVendor=174c, idProduct=2074, bcdDevice= 0.01
  1064. Apr 20 15:26:16 localhost kernel: usb 1-1: New USB device strings: Mfr=2, Product=3, SerialNumber=0
  1065. Apr 20 15:26:16 localhost kernel: usb 1-1: Product: ASM107x
  1066. Apr 20 15:26:16 localhost kernel: usb 1-1: Manufacturer: ASUS TEK.
  1067. Apr 20 15:26:16 localhost kernel: usb 1-1: Device is not authorized for usage
  1068. Apr 20 15:26:16 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-1" device_rule=626C6F636B20696420313734633A32303734206E616D65202241534D3130377822207669612D706F72742022312D312220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1069. Apr 20 15:26:16 localhost kernel: hub 1-1:1.0: USB hub found
  1070. Apr 20 15:26:16 localhost kernel: hub 1-1:1.0: 4 ports detected
  1071. Apr 20 15:26:16 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-1" target="allow" device_rule=626C6F636B20696420313734633A32303734206E616D65202241534D3130377822207669612D706F72742022312D312220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1072. Apr 20 15:26:16 localhost usbguard-daemon[531]: Ignoring unknown UEvent action: sysfs_devpath=/devices/pci0000:00/0000:00:14.0/usb1/1-1 action=change
  1073. Apr 20 15:26:16 localhost kernel: usb 1-1: authorized to connect
  1074. Apr 20 15:26:16 localhost kernel: i915 0000:00:02.0: [drm] GuC firmware i915/tgl_guc_70.bin version 70.13.1
  1075. Apr 20 15:26:16 localhost kernel: i915 0000:00:02.0: [drm] HuC firmware i915/tgl_huc.bin version 7.9.3
  1076. Apr 20 15:26:16 localhost kernel: i915 0000:00:02.0: [drm] HuC authenticated
  1077. Apr 20 15:26:16 localhost kernel: i915 0000:00:02.0: [drm] GuC submission enabled
  1078. Apr 20 15:26:16 localhost kernel: i915 0000:00:02.0: [drm] GuC SLPC enabled
  1079. Apr 20 15:26:16 localhost kernel: i915 0000:00:02.0: [drm] GuC RC: enabled
  1080. Apr 20 15:26:16 localhost kernel: i915 0000:00:02.0: [drm] Protected Xe Path (PXP) protected content support initialized
  1081. Apr 20 15:26:16 localhost kernel: [drm] Initialized i915 1.6.0 20201103 for 0000:00:02.0 on minor 0
  1082. Apr 20 15:26:16 localhost kernel: ACPI: video: Video Device [GFX0] (multi-head: yes rom: no post: no)
  1083. Apr 20 15:26:16 localhost kernel: input: Video Bus as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0A08:00/LNXVIDEO:00/input/input3
  1084. Apr 20 15:26:16 localhost kernel: usb 2-1: new SuperSpeed USB device number 2 using xhci_hcd
  1085. Apr 20 15:26:16 localhost kernel: fbcon: i915drmfb (fb0) is primary device
  1086. Apr 20 15:26:16 localhost kernel: fbcon: Deferring console take-over
  1087. Apr 20 15:26:16 localhost kernel: i915 0000:00:02.0: [drm] fb0: i915drmfb frame buffer device
  1088. Apr 20 15:26:16 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:14.0/usb2/2-1" device_rule=626C6F636B20696420313734633A33303734206E616D65202241534D3130377822207669612D706F72742022322D312220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1089. Apr 20 15:26:16 localhost kernel: usb 2-1: New USB device found, idVendor=174c, idProduct=3074, bcdDevice= 0.01
  1090. Apr 20 15:26:16 localhost kernel: usb 2-1: New USB device strings: Mfr=2, Product=3, SerialNumber=0
  1091. Apr 20 15:26:16 localhost kernel: usb 2-1: Product: ASM107x
  1092. Apr 20 15:26:16 localhost kernel: usb 2-1: Manufacturer: ASUS TEK.
  1093. Apr 20 15:26:16 localhost kernel: usb 2-1: Device is not authorized for usage
  1094. Apr 20 15:26:16 localhost kernel: hub 2-1:1.0: USB hub found
  1095. Apr 20 15:26:16 localhost kernel: hub 2-1:1.0: 4 ports detected
  1096. Apr 20 15:26:16 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb2/2-1" target="allow" device_rule=626C6F636B20696420313734633A33303734206E616D65202241534D3130377822207669612D706F72742022322D312220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1097. Apr 20 15:26:16 localhost kernel: usb 2-1: authorized to connect
  1098. Apr 20 15:26:16 localhost usbguard-daemon[531]: Ignoring unknown UEvent action: sysfs_devpath=/devices/pci0000:00/0000:00:14.0/usb2/2-1 action=change
  1099. Apr 20 15:26:16 localhost kernel: usb 1-2: new high-speed USB device number 3 using xhci_hcd
  1100. Apr 20 15:26:17 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-2" device_rule=626C6F636B20696420306264613A35343230206E616D652022342D506F72742055534220322E302048756222207669612D706F72742022312D322220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1101. Apr 20 15:26:17 localhost kernel: usb 1-2: New USB device found, idVendor=0bda, idProduct=5420, bcdDevice= 1.63
  1102. Apr 20 15:26:17 localhost kernel: usb 1-2: New USB device strings: Mfr=1, Product=2, SerialNumber=0
  1103. Apr 20 15:26:17 localhost kernel: usb 1-2: Product: 4-Port USB 2.0 Hub
  1104. Apr 20 15:26:17 localhost kernel: usb 1-2: Manufacturer: Generic
  1105. Apr 20 15:26:17 localhost kernel: usb 1-2: Device is not authorized for usage
  1106. Apr 20 15:26:17 localhost kernel: hub 1-2:1.0: USB hub found
  1107. Apr 20 15:26:17 localhost kernel: hub 1-2:1.0: 4 ports detected
  1108. Apr 20 15:26:17 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-2" target="allow" device_rule=626C6F636B20696420306264613A35343230206E616D652022342D506F72742055534220322E302048756222207669612D706F72742022312D322220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1109. Apr 20 15:26:17 localhost usbguard-daemon[531]: Ignoring unknown UEvent action: sysfs_devpath=/devices/pci0000:00/0000:00:14.0/usb1/1-2 action=change
  1110. Apr 20 15:26:17 localhost kernel: usb 1-2: authorized to connect
  1111. Apr 20 15:26:17 localhost kernel: usb 2-2: new SuperSpeed Plus Gen 2x1 USB device number 3 using xhci_hcd
  1112. Apr 20 15:26:17 localhost kernel: usb 2-2: New USB device found, idVendor=0bda, idProduct=0420, bcdDevice= 1.63
  1113. Apr 20 15:26:17 localhost kernel: usb 2-2: New USB device strings: Mfr=1, Product=2, SerialNumber=0
  1114. Apr 20 15:26:17 localhost kernel: usb 2-2: Product: 4-Port USB 3.0 Hub
  1115. Apr 20 15:26:17 localhost kernel: usb 2-2: Manufacturer: Generic
  1116. Apr 20 15:26:17 localhost kernel: usb 2-2: Device is not authorized for usage
  1117. Apr 20 15:26:17 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:14.0/usb2/2-2" device_rule=626C6F636B20696420306264613A30343230206E616D652022342D506F72742055534220332E302048756222207669612D706F72742022322D322220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1118. Apr 20 15:26:17 localhost kernel: hub 2-2:1.0: USB hub found
  1119. Apr 20 15:26:17 localhost kernel: hub 2-2:1.0: 4 ports detected
  1120. Apr 20 15:26:17 localhost kernel: usb 2-2: authorized to connect
  1121. Apr 20 15:26:17 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb2/2-2" target="allow" device_rule=626C6F636B20696420306264613A30343230206E616D652022342D506F72742055534220332E302048756222207669612D706F72742022322D322220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1122. Apr 20 15:26:17 localhost usbguard-daemon[531]: Ignoring unknown UEvent action: sysfs_devpath=/devices/pci0000:00/0000:00:14.0/usb2/2-2 action=change
  1123. Apr 20 15:26:17 localhost kernel: usb 1-4: new high-speed USB device number 4 using xhci_hcd
  1124. Apr 20 15:26:17 localhost kernel: usb 2-1.2: new SuperSpeed USB device number 4 using xhci_hcd
  1125. Apr 20 15:26:18 localhost kernel: usb 2-1.2: New USB device found, idVendor=13fe, idProduct=5500, bcdDevice= 1.00
  1126. Apr 20 15:26:18 localhost kernel: usb 2-1.2: New USB device strings: Mfr=1, Product=2, SerialNumber=3
  1127. Apr 20 15:26:18 localhost kernel: usb 2-1.2: Product: Patriot Memory
  1128. Apr 20 15:26:18 localhost kernel: usb 2-1.2: Manufacturer:
  1129. Apr 20 15:26:18 localhost kernel: usb 2-1.2: SerialNumber: 9000746EB7272256
  1130. Apr 20 15:26:18 localhost kernel: usb 2-1.2: Device is not authorized for usage
  1131. Apr 20 15:26:18 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:14.0/usb2/2-1/2-1.2" device_rule=626C6F636B20696420313366653A35353030206E616D65202250617472696F74204D656D6F727922207669612D706F72742022322D312E322220776974682D696E746572666163652030383A30363A353020776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1132. Apr 20 15:26:18 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb2/2-1/2-1.2" target="block" device_rule=626C6F636B20696420313366653A35353030206E616D65202250617472696F74204D656D6F727922207669612D706F72742022322D312E322220776974682D696E746572666163652030383A30363A353020776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1133. Apr 20 15:26:18 localhost kernel: usb 2-4: new SuperSpeed USB device number 5 using xhci_hcd
  1134. Apr 20 15:26:18 localhost kernel: usb 2-4: New USB device found, idVendor=174c, idProduct=3074, bcdDevice= 0.01
  1135. Apr 20 15:26:18 localhost kernel: usb 2-4: New USB device strings: Mfr=2, Product=3, SerialNumber=0
  1136. Apr 20 15:26:18 localhost kernel: usb 2-4: Product: ASM107x
  1137. Apr 20 15:26:18 localhost kernel: usb 2-4: Manufacturer: ASUS TEK.
  1138. Apr 20 15:26:18 localhost kernel: usb 2-4: Device is not authorized for usage
  1139. Apr 20 15:26:18 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:14.0/usb2/2-4" device_rule=626C6F636B20696420313734633A33303734206E616D65202241534D3130377822207669612D706F72742022322D342220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1140. Apr 20 15:26:18 localhost kernel: hub 2-4:1.0: USB hub found
  1141. Apr 20 15:26:18 localhost kernel: hub 2-4:1.0: 4 ports detected
  1142. Apr 20 15:26:18 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb2/2-4" target="allow" device_rule=626C6F636B20696420313734633A33303734206E616D65202241534D3130377822207669612D706F72742022322D342220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1143. Apr 20 15:26:18 localhost kernel: usb 2-4: authorized to connect
  1144. Apr 20 15:26:18 localhost usbguard-daemon[531]: Ignoring unknown UEvent action: sysfs_devpath=/devices/pci0000:00/0000:00:14.0/usb2/2-4 action=change
  1145. Apr 20 15:26:18 localhost kernel: usb 1-2.3: new full-speed USB device number 5 using xhci_hcd
  1146. Apr 20 15:26:18 localhost kernel: usb 1-2.3: New USB device found, idVendor=046d, idProduct=c539, bcdDevice=39.04
  1147. Apr 20 15:26:18 localhost kernel: usb 1-2.3: New USB device strings: Mfr=1, Product=2, SerialNumber=0
  1148. Apr 20 15:26:18 localhost kernel: usb 1-2.3: Product: USB Receiver
  1149. Apr 20 15:26:18 localhost kernel: usb 1-2.3: Manufacturer: Logitech
  1150. Apr 20 15:26:18 localhost kernel: usb 1-2.3: Device is not authorized for usage
  1151. Apr 20 15:26:18 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-2/1-2.3" device_rule=626C6F636B20696420303436643A63353339206E616D65202255534220526563656976657222207669612D706F72742022312D322E332220776974682D696E74657266616365207B2030333A30313A30312030333A30313A30322030333A30303A3030207D20776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1152. Apr 20 15:26:18 localhost kernel: input: Logitech USB Receiver as /devices/pci0000:00/0000:00:14.0/usb1/1-2/1-2.3/1-2.3:1.0/0003:046D:C539.0001/input/input4
  1153. Apr 20 15:26:18 localhost kernel: hid-generic 0003:046D:C539.0001: input,hidraw0: USB HID v1.11 Keyboard [Logitech USB Receiver] on usb-0000:00:14.0-2.3/input0
  1154. Apr 20 15:26:18 localhost kernel: input: Logitech USB Receiver Mouse as /devices/pci0000:00/0000:00:14.0/usb1/1-2/1-2.3/1-2.3:1.1/0003:046D:C539.0002/input/input5
  1155. Apr 20 15:26:18 localhost kernel: input: Logitech USB Receiver Consumer Control as /devices/pci0000:00/0000:00:14.0/usb1/1-2/1-2.3/1-2.3:1.1/0003:046D:C539.0002/input/input6
  1156. Apr 20 15:26:18 localhost kernel: usb 1-2.4: new full-speed USB device number 6 using xhci_hcd
  1157. Apr 20 15:26:18 localhost kernel: input: Logitech USB Receiver System Control as /devices/pci0000:00/0000:00:14.0/usb1/1-2/1-2.3/1-2.3:1.1/0003:046D:C539.0002/input/input7
  1158. Apr 20 15:26:18 localhost kernel: hid-generic 0003:046D:C539.0002: input,hiddev96,hidraw1: USB HID v1.11 Mouse [Logitech USB Receiver] on usb-0000:00:14.0-2.3/input1
  1159. Apr 20 15:26:18 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-2/1-2.3" target="allow" device_rule=626C6F636B20696420303436643A63353339206E616D65202255534220526563656976657222207669612D706F72742022312D322E332220776974682D696E74657266616365207B2030333A30313A30312030333A30313A30322030333A30303A3030207D20776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1160. Apr 20 15:26:18 localhost kernel: hid-generic 0003:046D:C539.0003: hiddev97,hidraw2: USB HID v1.11 Device [Logitech USB Receiver] on usb-0000:00:14.0-2.3/input2
  1161. Apr 20 15:26:18 localhost kernel: usb 1-2.3: authorized to connect
  1162. Apr 20 15:26:18 localhost usbguard-daemon[531]: Ignoring unknown UEvent action: sysfs_devpath=/devices/pci0000:00/0000:00:14.0/usb1/1-2/1-2.3 action=change
  1163. Apr 20 15:26:18 localhost kernel: usb 1-2.4: New USB device found, idVendor=046d, idProduct=c547, bcdDevice= 4.02
  1164. Apr 20 15:26:18 localhost kernel: usb 1-2.4: New USB device strings: Mfr=1, Product=2, SerialNumber=0
  1165. Apr 20 15:26:18 localhost kernel: usb 1-2.4: Product: USB Receiver
  1166. Apr 20 15:26:18 localhost kernel: usb 1-2.4: Manufacturer: Logitech
  1167. Apr 20 15:26:18 localhost kernel: usb 1-2.4: Device is not authorized for usage
  1168. Apr 20 15:26:18 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-2/1-2.4" device_rule=626C6F636B20696420303436643A63353437206E616D65202255534220526563656976657222207669612D706F72742022312D322E342220776974682D696E74657266616365207B2030333A30313A30322030333A30313A30312030333A30303A3030207D20776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1169. Apr 20 15:26:18 localhost kernel: input: Logitech USB Receiver as /devices/pci0000:00/0000:00:14.0/usb1/1-2/1-2.4/1-2.4:1.0/0003:046D:C547.0004/input/input9
  1170. Apr 20 15:26:18 localhost kernel: hid-generic 0003:046D:C547.0004: input,hidraw0: USB HID v1.11 Mouse [Logitech USB Receiver] on usb-0000:00:14.0-2.4/input0
  1171. Apr 20 15:26:18 localhost kernel: logitech-djreceiver 0003:046D:C539.0001: hidraw3: USB HID v1.11 Keyboard [Logitech USB Receiver] on usb-0000:00:14.0-2.3/input0
  1172. Apr 20 15:26:18 localhost kernel: input: Logitech USB Receiver Keyboard as /devices/pci0000:00/0000:00:14.0/usb1/1-2/1-2.4/1-2.4:1.1/0003:046D:C547.0005/input/input10
  1173. Apr 20 15:26:18 localhost kernel: usb 2-4.1: new SuperSpeed USB device number 6 using xhci_hcd
  1174. Apr 20 15:26:18 localhost kernel: hid-generic 0003:046D:C547.0005: input,hidraw4: USB HID v1.11 Keyboard [Logitech USB Receiver] on usb-0000:00:14.0-2.4/input1
  1175. Apr 20 15:26:18 localhost kernel: hid-generic 0003:046D:C547.0006: hiddev98,hidraw5: USB HID v1.11 Device [Logitech USB Receiver] on usb-0000:00:14.0-2.4/input2
  1176. Apr 20 15:26:18 localhost kernel: usb 1-2.4: authorized to connect
  1177. Apr 20 15:26:18 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-2/1-2.4" target="allow" device_rule=626C6F636B20696420303436643A63353437206E616D65202255534220526563656976657222207669612D706F72742022312D322E342220776974682D696E74657266616365207B2030333A30313A30322030333A30313A30312030333A30303A3030207D20776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1178. Apr 20 15:26:18 localhost usbguard-daemon[531]: Ignoring unknown UEvent action: sysfs_devpath=/devices/pci0000:00/0000:00:14.0/usb1/1-2/1-2.4 action=change
  1179. Apr 20 15:26:18 localhost kernel: usb 2-4.1: New USB device found, idVendor=05e3, idProduct=0620, bcdDevice=93.91
  1180. Apr 20 15:26:18 localhost kernel: usb 2-4.1: New USB device strings: Mfr=1, Product=2, SerialNumber=0
  1181. Apr 20 15:26:18 localhost kernel: usb 2-4.1: Product: USB3.2 Hub
  1182. Apr 20 15:26:18 localhost kernel: usb 2-4.1: Manufacturer: GenesysLogic
  1183. Apr 20 15:26:18 localhost kernel: usb 2-4.1: Device is not authorized for usage
  1184. Apr 20 15:26:18 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:14.0/usb2/2-4/2-4.1" device_rule=626C6F636B20696420303565333A30363230206E616D652022555342332E322048756222207669612D706F72742022322D342E312220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1185. Apr 20 15:26:18 localhost kernel: hub 2-4.1:1.0: USB hub found
  1186. Apr 20 15:26:18 localhost kernel: hub 2-4.1:1.0: 4 ports detected
  1187. Apr 20 15:26:18 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb2/2-4/2-4.1" target="allow" device_rule=626C6F636B20696420303565333A30363230206E616D652022555342332E322048756222207669612D706F72742022322D342E312220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1188. Apr 20 15:26:18 localhost kernel: usb 2-4.1: authorized to connect
  1189. Apr 20 15:26:18 localhost usbguard-daemon[531]: Ignoring unknown UEvent action: sysfs_devpath=/devices/pci0000:00/0000:00:14.0/usb2/2-4/2-4.1 action=change
  1190. Apr 20 15:26:18 localhost kernel: logitech-djreceiver 0003:046D:C539.0002: hiddev96,hidraw1: USB HID v1.11 Mouse [Logitech USB Receiver] on usb-0000:00:14.0-2.3/input1
  1191. Apr 20 15:26:18 localhost kernel: logitech-djreceiver 0003:046D:C539.0003: hiddev97,hidraw2: USB HID v1.11 Device [Logitech USB Receiver] on usb-0000:00:14.0-2.3/input2
  1192. Apr 20 15:26:18 localhost kernel: logitech-djreceiver 0003:046D:C539.0003: device of type eQUAD Lightspeed 1 (0x0c) connected on slot 1
  1193. Apr 20 15:26:18 localhost kernel: input: Logitech Wireless Mouse PID:4067 Keyboard as /devices/pci0000:00/0000:00:14.0/usb1/1-2/1-2.3/1-2.3:1.2/0003:046D:C539.0003/0003:046D:4067.0007/input/input11
  1194. Apr 20 15:26:18 localhost kernel: input: Logitech Wireless Mouse PID:4067 Mouse as /devices/pci0000:00/0000:00:14.0/usb1/1-2/1-2.3/1-2.3:1.2/0003:046D:C539.0003/0003:046D:4067.0007/input/input12
  1195. Apr 20 15:26:18 localhost kernel: hid-generic 0003:046D:4067.0007: input,hidraw6: USB HID v1.11 Keyboard [Logitech Wireless Mouse PID:4067] on usb-0000:00:14.0-2.3/input2:1
  1196. Apr 20 15:26:18 localhost kernel: input: Logitech G903 as /devices/pci0000:00/0000:00:14.0/usb1/1-2/1-2.3/1-2.3:1.2/0003:046D:C539.0003/0003:046D:4067.0007/input/input16
  1197. Apr 20 15:26:18 localhost kernel: logitech-hidpp-device 0003:046D:4067.0007: input,hidraw6: USB HID v1.11 Keyboard [Logitech G903] on usb-0000:00:14.0-2.3/input2:1
  1198. Apr 20 15:26:19 localhost kernel: usb 1-4: New USB device found, idVendor=0b05, idProduct=1a52, bcdDevice= 0.03
  1199. Apr 20 15:26:19 localhost kernel: usb 1-4: New USB device strings: Mfr=3, Product=1, SerialNumber=0
  1200. Apr 20 15:26:19 localhost kernel: usb 1-4: Product: USB Audio
  1201. Apr 20 15:26:19 localhost kernel: usb 1-4: Manufacturer: Generic
  1202. Apr 20 15:26:19 localhost kernel: usb 1-4: Device is not authorized for usage
  1203. Apr 20 15:26:19 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-4" device_rule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exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1204. Apr 20 15:26:19 localhost kernel: kauditd_printk_skb: 55 callbacks suppressed
  1205. Apr 20 15:26:19 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-4" target="block" device_rule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exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1206. Apr 20 15:26:19 localhost kernel: audit: type=1137 audit(1713644779.606:66): pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-4" device_rule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
  1207. Apr 20 15:26:19 localhost kernel: audit: type=1137 audit(1713644779.607:67): pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-4" target="block" device_rule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
  1208. Apr 20 15:26:19 localhost kernel: usb 1-5: new high-speed USB device number 7 using xhci_hcd
  1209. Apr 20 15:26:19 localhost kernel: usb 1-5: New USB device found, idVendor=174c, idProduct=2074, bcdDevice= 0.01
  1210. Apr 20 15:26:19 localhost kernel: usb 1-5: New USB device strings: Mfr=2, Product=3, SerialNumber=0
  1211. Apr 20 15:26:19 localhost kernel: usb 1-5: Product: ASM107x
  1212. Apr 20 15:26:19 localhost kernel: usb 1-5: Manufacturer: ASUS TEK.
  1213. Apr 20 15:26:19 localhost kernel: usb 1-5: Device is not authorized for usage
  1214. Apr 20 15:26:19 localhost kernel: audit: type=1137 audit(1713644779.849:68): pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-5" device_rule=626C6F636B20696420313734633A32303734206E616D65202241534D3130377822207669612D706F72742022312D352220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1215. Apr 20 15:26:19 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-5" device_rule=626C6F636B20696420313734633A32303734206E616D65202241534D3130377822207669612D706F72742022312D352220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1216. Apr 20 15:26:19 localhost kernel: hub 1-5:1.0: USB hub found
  1217. Apr 20 15:26:19 localhost kernel: hub 1-5:1.0: 4 ports detected
  1218. Apr 20 15:26:19 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-5" target="allow" device_rule=626C6F636B20696420313734633A32303734206E616D65202241534D3130377822207669612D706F72742022312D352220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1219. Apr 20 15:26:19 localhost usbguard-daemon[531]: Ignoring unknown UEvent action: sysfs_devpath=/devices/pci0000:00/0000:00:14.0/usb1/1-5 action=change
  1220. Apr 20 15:26:19 localhost kernel: usb 1-5: authorized to connect
  1221. Apr 20 15:26:19 localhost kernel: audit: type=1137 audit(1713644779.857:69): pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-5" target="allow" device_rule=626C6F636B20696420313734633A32303734206E616D65202241534D3130377822207669612D706F72742022312D352220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1222. Apr 20 15:26:19 localhost kernel: usb 1-10: new high-speed USB device number 8 using xhci_hcd
  1223. Apr 20 15:26:20 localhost kernel: usb 1-10: New USB device found, idVendor=05e3, idProduct=0608, bcdDevice=60.90
  1224. Apr 20 15:26:20 localhost kernel: usb 1-10: New USB device strings: Mfr=0, Product=1, SerialNumber=0
  1225. Apr 20 15:26:20 localhost kernel: usb 1-10: Product: USB2.0 Hub
  1226. Apr 20 15:26:20 localhost kernel: usb 1-10: Device is not authorized for usage
  1227. Apr 20 15:26:20 localhost kernel: audit: type=1137 audit(1713644780.090:70): pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-10" device_rule=626C6F636B20696420303565333A30363038206E616D652022555342322E302048756222207669612D706F72742022312D31302220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1228. Apr 20 15:26:20 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-10" device_rule=626C6F636B20696420303565333A30363038206E616D652022555342322E302048756222207669612D706F72742022312D31302220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1229. Apr 20 15:26:20 localhost kernel: hub 1-10:1.0: USB hub found
  1230. Apr 20 15:26:20 localhost kernel: hub 1-10:1.0: 2 ports detected
  1231. Apr 20 15:26:20 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-10" target="allow" device_rule=626C6F636B20696420303565333A30363038206E616D652022555342322E302048756222207669612D706F72742022312D31302220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1232. Apr 20 15:26:20 localhost usbguard-daemon[531]: Ignoring unknown UEvent action: sysfs_devpath=/devices/pci0000:00/0000:00:14.0/usb1/1-10 action=change
  1233. Apr 20 15:26:20 localhost kernel: usb 1-10: authorized to connect
  1234. Apr 20 15:26:20 localhost kernel: audit: type=1137 audit(1713644780.096:71): pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-10" target="allow" device_rule=626C6F636B20696420303565333A30363038206E616D652022555342322E302048756222207669612D706F72742022312D31302220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1235. Apr 20 15:26:20 localhost kernel: usb 1-5.1: new high-speed USB device number 9 using xhci_hcd
  1236. Apr 20 15:26:20 localhost kernel: usb 1-5.1: New USB device found, idVendor=05e3, idProduct=0610, bcdDevice=93.91
  1237. Apr 20 15:26:20 localhost kernel: usb 1-5.1: New USB device strings: Mfr=1, Product=2, SerialNumber=0
  1238. Apr 20 15:26:20 localhost kernel: usb 1-5.1: Product: USB2.1 Hub
  1239. Apr 20 15:26:20 localhost kernel: usb 1-5.1: Manufacturer: GenesysLogic
  1240. Apr 20 15:26:20 localhost kernel: usb 1-5.1: Device is not authorized for usage
  1241. Apr 20 15:26:20 localhost kernel: audit: type=1137 audit(1713644780.268:72): pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-5/1-5.1" device_rule=626C6F636B20696420303565333A30363130206E616D652022555342322E312048756222207669612D706F72742022312D352E312220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1242. Apr 20 15:26:20 localhost kernel: hub 1-5.1:1.0: USB hub found
  1243. Apr 20 15:26:20 localhost kernel: hub 1-5.1:1.0: 4 ports detected
  1244. Apr 20 15:26:20 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-5/1-5.1" device_rule=626C6F636B20696420303565333A30363130206E616D652022555342322E312048756222207669612D706F72742022312D352E312220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1245. Apr 20 15:26:20 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-5/1-5.1" target="allow" device_rule=626C6F636B20696420303565333A30363130206E616D652022555342322E312048756222207669612D706F72742022312D352E312220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1246. Apr 20 15:26:20 localhost usbguard-daemon[531]: Ignoring unknown UEvent action: sysfs_devpath=/devices/pci0000:00/0000:00:14.0/usb1/1-5/1-5.1 action=change
  1247. Apr 20 15:26:20 localhost kernel: usb 1-5.1: authorized to connect
  1248. Apr 20 15:26:20 localhost kernel: audit: type=1137 audit(1713644780.275:73): pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-5/1-5.1" target="allow" device_rule=626C6F636B20696420303565333A30363130206E616D652022555342322E312048756222207669612D706F72742022312D352E312220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1249. Apr 20 15:26:20 localhost kernel: usb 1-11: new high-speed USB device number 10 using xhci_hcd
  1250. Apr 20 15:26:20 localhost kernel: usb 1-11: New USB device found, idVendor=0416, idProduct=7395, bcdDevice= 0.01
  1251. Apr 20 15:26:20 localhost kernel: usb 1-11: New USB device strings: Mfr=0, Product=2, SerialNumber=3
  1252. Apr 20 15:26:20 localhost kernel: usb 1-11: Product: LianLi-GA_II-LCD_v1.3
  1253. Apr 20 15:26:20 localhost kernel: usb 1-11: SerialNumber: 00000055FA92
  1254. Apr 20 15:26:20 localhost kernel: usb 1-11: Device is not authorized for usage
  1255. Apr 20 15:26:20 localhost kernel: audit: type=1137 audit(1713644780.507:74): pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-11" device_rule=626C6F636B20696420303431363A37333935206E616D6520224C69616E4C692D47415F49492D4C43445F76312E3322207669612D706F72742022312D31312220776974682D696E74657266616365207B2066663A30303A30302030333A30303A3030207D20776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1256. Apr 20 15:26:20 localhost kernel: audit: type=1137 audit(1713644780.508:75): pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-11" target="block" device_rule=626C6F636B20696420303431363A37333935206E616D6520224C69616E4C692D47415F49492D4C43445F76312E3322207669612D706F72742022312D31312220776974682D696E74657266616365207B2066663A30303A30302030333A30303A3030207D20776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1257. Apr 20 15:26:20 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-11" device_rule=626C6F636B20696420303431363A37333935206E616D6520224C69616E4C692D47415F49492D4C43445F76312E3322207669612D706F72742022312D31312220776974682D696E74657266616365207B2066663A30303A30302030333A30303A3030207D20776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1258. Apr 20 15:26:20 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-11" target="block" device_rule=626C6F636B20696420303431363A37333935206E616D6520224C69616E4C692D47415F49492D4C43445F76312E3322207669612D706F72742022312D31312220776974682D696E74657266616365207B2066663A30303A30302030333A30303A3030207D20776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1259. Apr 20 15:26:20 localhost kernel: usb 1-5.3: new high-speed USB device number 11 using xhci_hcd
  1260. Apr 20 15:26:20 localhost kernel: usb 1-5.3: New USB device found, idVendor=2708, idProduct=0001, bcdDevice= 2.07
  1261. Apr 20 15:26:20 localhost kernel: usb 1-5.3: New USB device strings: Mfr=1, Product=3, SerialNumber=0
  1262. Apr 20 15:26:20 localhost kernel: usb 1-5.3: Product: Audient iD22
  1263. Apr 20 15:26:20 localhost kernel: usb 1-5.3: Manufacturer: Audient
  1264. Apr 20 15:26:20 localhost kernel: usb 1-5.3: Device is not authorized for usage
  1265. Apr 20 15:26:20 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-5/1-5.3" device_rule=626C6F636B20696420323730383A30303031206E616D65202241756469656E74206944323222207669612D706F72742022312D352E332220776974682D696E74657266616365207B2030313A30313A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302066653A30313A30312030313A30313A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302066653A30313A3031207D20776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1266. Apr 20 15:26:20 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-5/1-5.3" target="block" device_rule=626C6F636B20696420323730383A30303031206E616D65202241756469656E74206944323222207669612D706F72742022312D352E332220776974682D696E74657266616365207B2030313A30313A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302066653A30313A30312030313A30313A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302066653A30313A3031207D20776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1267. Apr 20 15:26:20 localhost kernel: usb 1-10.1: new high-speed USB device number 12 using xhci_hcd
  1268. Apr 20 15:26:20 localhost kernel: usb 1-10.1: New USB device found, idVendor=1a40, idProduct=0101, bcdDevice= 1.11
  1269. Apr 20 15:26:20 localhost kernel: usb 1-10.1: New USB device strings: Mfr=0, Product=1, SerialNumber=0
  1270. Apr 20 15:26:20 localhost kernel: usb 1-10.1: Product: USB 2.0 Hub
  1271. Apr 20 15:26:20 localhost kernel: usb 1-10.1: Device is not authorized for usage
  1272. Apr 20 15:26:20 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-10/1-10.1" device_rule=626C6F636B20696420316134303A30313031206E616D65202255534220322E302048756222207669612D706F72742022312D31302E312220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1273. Apr 20 15:26:20 localhost kernel: hub 1-10.1:1.0: USB hub found
  1274. Apr 20 15:26:20 localhost kernel: hub 1-10.1:1.0: 4 ports detected
  1275. Apr 20 15:26:20 localhost kernel: usb 1-10.1: authorized to connect
  1276. Apr 20 15:26:20 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-10/1-10.1" target="allow" device_rule=626C6F636B20696420316134303A30313031206E616D65202255534220322E302048756222207669612D706F72742022312D31302E312220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1277. Apr 20 15:26:20 localhost usbguard-daemon[531]: Ignoring unknown UEvent action: sysfs_devpath=/devices/pci0000:00/0000:00:14.0/usb1/1-10/1-10.1 action=change
  1278. Apr 20 15:26:20 localhost kernel: usb 1-5.1.1: new full-speed USB device number 13 using xhci_hcd
  1279. Apr 20 15:26:21 localhost kernel: usb 1-5.1.1: New USB device found, idVendor=046d, idProduct=c53a, bcdDevice=40.03
  1280. Apr 20 15:26:21 localhost kernel: usb 1-5.1.1: New USB device strings: Mfr=1, Product=2, SerialNumber=0
  1281. Apr 20 15:26:21 localhost kernel: usb 1-5.1.1: Product: USB Receiver
  1282. Apr 20 15:26:21 localhost kernel: usb 1-5.1.1: Manufacturer: Logitech
  1283. Apr 20 15:26:21 localhost kernel: usb 1-5.1.1: Device is not authorized for usage
  1284. Apr 20 15:26:21 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-5/1-5.1/1-5.1.1" device_rule=626C6F636B20696420303436643A63353361206E616D65202255534220526563656976657222207669612D706F72742022312D352E312E312220776974682D696E74657266616365207B2030333A30313A30312030333A30313A30322030333A30303A3030207D20776974682D636F6E6E6563742D747970652022756E6B6E6F776E22 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1285. Apr 20 15:26:21 localhost kernel: logitech-djreceiver 0003:046D:C53A.0008: hidraw7: USB HID v1.11 Keyboard [Logitech USB Receiver] on usb-0000:00:14.0-5.1.1/input0
  1286. Apr 20 15:26:21 localhost kernel: logitech-djreceiver 0003:046D:C53A.0009: hidraw8: USB HID v1.11 Mouse [Logitech USB Receiver] on usb-0000:00:14.0-5.1.1/input1
  1287. Apr 20 15:26:21 localhost kernel: usb 1-13: new full-speed USB device number 14 using xhci_hcd
  1288. Apr 20 15:26:21 localhost kernel: logitech-djreceiver 0003:046D:C53A.000A: hiddev99,hidraw9: USB HID v1.11 Device [Logitech USB Receiver] on usb-0000:00:14.0-5.1.1/input2
  1289. Apr 20 15:26:21 localhost kernel: usb 1-5.1.1: authorized to connect
  1290. Apr 20 15:26:21 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-5/1-5.1/1-5.1.1" target="allow" device_rule=626C6F636B20696420303436643A63353361206E616D65202255534220526563656976657222207669612D706F72742022312D352E312E312220776974682D696E74657266616365207B2030333A30313A30312030333A30313A30322030333A30303A3030207D20776974682D636F6E6E6563742D747970652022756E6B6E6F776E22 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1291. Apr 20 15:26:21 localhost kernel: logitech-djreceiver 0003:046D:C53A.000A: device of type eQUAD Lightspeed 1.2 (0x11) connected on slot 1
  1292. Apr 20 15:26:21 localhost usbguard-daemon[531]: Ignoring unknown UEvent action: sysfs_devpath=/devices/pci0000:00/0000:00:14.0/usb1/1-5/1-5.1/1-5.1.1 action=change
  1293. Apr 20 15:26:21 localhost kernel: logitech-djreceiver 0003:046D:C53A.000A: device of type eQUAD Lightspeed 1 (0x0c) connected on slot 7
  1294. Apr 20 15:26:21 localhost kernel: logitech-hidpp-device 0003:046D:4099.000B: HID++ 4.2 device connected.
  1295. Apr 20 15:26:21 localhost kernel: usb 1-13: config 1 has an invalid interface number: 2 but max is 1
  1296. Apr 20 15:26:21 localhost kernel: usb 1-13: config 1 has no interface number 1
  1297. Apr 20 15:26:21 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-13" device_rule=626C6F636B20696420306230353A31396166206E616D65202241555241204C454420436F6E74726F6C6C657222207669612D706F72742022312D31332220776974682D696E74657266616365207B2066663A66663A66662030333A30303A3030207D20776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1298. Apr 20 15:26:21 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-13" target="block" device_rule=626C6F636B20696420306230353A31396166206E616D65202241555241204C454420436F6E74726F6C6C657222207669612D706F72742022312D31332220776974682D696E74657266616365207B2066663A66663A66662030333A30303A3030207D20776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1299. Apr 20 15:26:21 localhost kernel: usb 1-13: New USB device found, idVendor=0b05, idProduct=19af, bcdDevice= 1.00
  1300. Apr 20 15:26:21 localhost kernel: usb 1-13: New USB device strings: Mfr=1, Product=2, SerialNumber=3
  1301. Apr 20 15:26:21 localhost kernel: usb 1-13: Product: AURA LED Controller
  1302. Apr 20 15:26:21 localhost kernel: usb 1-13: Manufacturer: AsusTek Computer Inc.
  1303. Apr 20 15:26:21 localhost kernel: usb 1-13: SerialNumber: 9876543210
  1304. Apr 20 15:26:21 localhost kernel: usb 1-13: Device is not authorized for usage
  1305. Apr 20 15:26:21 localhost kernel: usb 1-10.2: new high-speed USB device number 15 using xhci_hcd
  1306. Apr 20 15:26:21 localhost kernel: input: Logitech G502 X PLUS as /devices/pci0000:00/0000:00:14.0/usb1/1-5/1-5.1/1-5.1.1/1-5.1.1:1.2/0003:046D:C53A.000A/0003:046D:4099.000B/input/input17
  1307. Apr 20 15:26:21 localhost kernel: logitech-hidpp-device 0003:046D:4099.000B: input,hidraw10: USB HID v1.11 Keyboard [Logitech G502 X PLUS] on usb-0000:00:14.0-5.1.1/input2:1
  1308. Apr 20 15:26:21 localhost kernel: logitech-hidpp-device 0003:046D:405F.000C: HID++ 4.2 device connected.
  1309. Apr 20 15:26:21 localhost kernel: usb 1-10.2: New USB device found, idVendor=1a40, idProduct=0101, bcdDevice= 1.11
  1310. Apr 20 15:26:21 localhost kernel: usb 1-10.2: New USB device strings: Mfr=0, Product=1, SerialNumber=0
  1311. Apr 20 15:26:21 localhost kernel: usb 1-10.2: Product: USB 2.0 Hub
  1312. Apr 20 15:26:21 localhost kernel: usb 1-10.2: Device is not authorized for usage
  1313. Apr 20 15:26:21 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-10/1-10.2" device_rule=626C6F636B20696420316134303A30313031206E616D65202255534220322E302048756222207669612D706F72742022312D31302E322220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1314. Apr 20 15:26:21 localhost kernel: input: Logitech Candy as /devices/pci0000:00/0000:00:14.0/usb1/1-5/1-5.1/1-5.1.1/1-5.1.1:1.2/0003:046D:C53A.000A/0003:046D:405F.000C/input/input18
  1315. Apr 20 15:26:21 localhost kernel: logitech-hidpp-device 0003:046D:405F.000C: input,hidraw11: USB HID v1.11 Keyboard [Logitech Candy] on usb-0000:00:14.0-5.1.1/input2:7
  1316. Apr 20 15:26:21 localhost kernel: hub 1-10.2:1.0: USB hub found
  1317. Apr 20 15:26:21 localhost kernel: hub 1-10.2:1.0: 4 ports detected
  1318. Apr 20 15:26:21 localhost kernel: usb 1-10.2: authorized to connect
  1319. Apr 20 15:26:21 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-10/1-10.2" target="allow" device_rule=626C6F636B20696420316134303A30313031206E616D65202255534220322E302048756222207669612D706F72742022312D31302E322220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1320. Apr 20 15:26:21 localhost usbguard-daemon[531]: Ignoring unknown UEvent action: sysfs_devpath=/devices/pci0000:00/0000:00:14.0/usb1/1-10/1-10.2 action=change
  1321. Apr 20 15:26:21 localhost kernel: usb 1-10.1.2: new full-speed USB device number 16 using xhci_hcd
  1322. Apr 20 15:26:21 localhost kernel: usb 1-10.1.2: New USB device found, idVendor=0cf2, idProduct=a200, bcdDevice= 1.00
  1323. Apr 20 15:26:21 localhost kernel: usb 1-10.1.2: New USB device strings: Mfr=1, Product=2, SerialNumber=3
  1324. Apr 20 15:26:21 localhost kernel: usb 1-10.1.2: Product: LianLi-Strimer Plus-1.5
  1325. Apr 20 15:26:21 localhost kernel: usb 1-10.1.2: Manufacturer: ENE
  1326. Apr 20 15:26:21 localhost kernel: usb 1-10.1.2: SerialNumber: 6243168001
  1327. Apr 20 15:26:21 localhost kernel: usb 1-10.1.2: Device is not authorized for usage
  1328. Apr 20 15:26:21 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-10/1-10.1/1-10.1.2" device_rule=626C6F636B20696420306366323A61323030206E616D6520224C69616E4C692D537472696D657220506C75732D312E3522207669612D706F72742022312D31302E312E322220776974682D696E74657266616365207B2066663A66663A66662030333A30303A3030207D20776974682D636F6E6E6563742D747970652022756E6B6E6F776E22 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1329. Apr 20 15:26:21 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-10/1-10.1/1-10.1.2" target="block" device_rule=626C6F636B20696420306366323A61323030206E616D6520224C69616E4C692D537472696D657220506C75732D312E3522207669612D706F72742022312D31302E312E322220776974682D696E74657266616365207B2066663A66663A66662030333A30303A3030207D20776974682D636F6E6E6563742D747970652022756E6B6E6F776E22 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1330. Apr 20 15:26:21 localhost kernel: usb 1-14: new full-speed USB device number 17 using xhci_hcd
  1331. Apr 20 15:26:22 localhost kernel: usb 1-14: New USB device found, idVendor=8087, idProduct=0032, bcdDevice= 0.00
  1332. Apr 20 15:26:22 localhost kernel: usb 1-14: New USB device strings: Mfr=0, Product=0, SerialNumber=0
  1333. Apr 20 15:26:22 localhost kernel: usb 1-14: Device is not authorized for usage
  1334. Apr 20 15:26:22 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-14" device_rule=626C6F636B20696420383038373A30303332206E616D65202222207669612D706F72742022312D31342220776974682D696E74657266616365207B2065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A3031207D20776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1335. Apr 20 15:26:22 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-14" target="block" device_rule=626C6F636B20696420383038373A30303332206E616D65202222207669612D706F72742022312D31342220776974682D696E74657266616365207B2065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A3031207D20776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1336. Apr 20 15:26:22 localhost kernel: usb 1-10.1.4: new full-speed USB device number 18 using xhci_hcd
  1337. Apr 20 15:26:22 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-10/1-10.1/1-10.1.4" device_rule=626C6F636B20696420306366323A61313032206E616D6520224C69616E4C692D534C2D696E66696E6974792D76312E3422207669612D706F72742022312D31302E312E342220776974682D696E74657266616365207B2066663A66663A66662030333A30303A3030207D20776974682D636F6E6E6563742D747970652022756E6B6E6F776E22 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1338. Apr 20 15:26:22 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-10/1-10.1/1-10.1.4" target="block" device_rule=626C6F636B20696420306366323A61313032206E616D6520224C69616E4C692D534C2D696E66696E6974792D76312E3422207669612D706F72742022312D31302E312E342220776974682D696E74657266616365207B2066663A66663A66662030333A30303A3030207D20776974682D636F6E6E6563742D747970652022756E6B6E6F776E22 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1339. Apr 20 15:26:22 localhost kernel: usb 1-10.1.4: New USB device found, idVendor=0cf2, idProduct=a102, bcdDevice= 1.00
  1340. Apr 20 15:26:22 localhost kernel: usb 1-10.1.4: New USB device strings: Mfr=1, Product=2, SerialNumber=3
  1341. Apr 20 15:26:22 localhost kernel: usb 1-10.1.4: Product: LianLi-SL-infinity-v1.4
  1342. Apr 20 15:26:22 localhost kernel: usb 1-10.1.4: Manufacturer: ENE
  1343. Apr 20 15:26:22 localhost kernel: usb 1-10.1.4: SerialNumber: 6243168001
  1344. Apr 20 15:26:22 localhost kernel: usb 1-10.1.4: Device is not authorized for usage
  1345. Apr 20 15:26:48 localhost systemd-cryptsetup[742]: Set cipher aes, mode xts-plain64, key size 512 bits for device /dev/disk/by-uuid/5241442a-6636-45da-8731-66d029364f3d.
  1346. Apr 20 15:26:49 localhost audit[742]: DM_CTRL module=crypt op=ctr ppid=1 pid=742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-cryptse" exe="/usr/lib/systemd/systemd-cryptsetup" dev=253:0 error_msg='success' res=1
  1347. Apr 20 15:26:49 localhost audit[742]: SYSCALL arch=c000003e syscall=16 success=yes exit=0 a0=4 a1=c138fd09 a2=62a4400f5bd0 a3=0 items=6 ppid=1 pid=742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-cryptse" exe="/usr/lib/systemd/systemd-cryptsetup" key=(null)
  1348. Apr 20 15:26:49 localhost audit: CWD cwd="/"
  1349. Apr 20 15:26:49 localhost audit: PATH item=0 name=(null) inode=1025 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
  1350. Apr 20 15:26:49 localhost audit: PATH item=1 name=(null) inode=28214 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
  1351. Apr 20 15:26:49 localhost audit: PATH item=2 name=(null) inode=26 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
  1352. Apr 20 15:26:49 localhost kernel: kauditd_printk_skb: 16 callbacks suppressed
  1353. Apr 20 15:26:49 localhost kernel: audit: type=1338 audit(1713644809.579:92): module=crypt op=ctr ppid=1 pid=742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-cryptse" exe="/usr/lib/systemd/systemd-cryptsetup" dev=253:0 error_msg='success' res=1
  1354. Apr 20 15:26:49 localhost kernel: audit: type=1300 audit(1713644809.579:92): arch=c000003e syscall=16 success=yes exit=0 a0=4 a1=c138fd09 a2=62a4400f5bd0 a3=0 items=6 ppid=1 pid=742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-cryptse" exe="/usr/lib/systemd/systemd-cryptsetup" key=(null)
  1355. Apr 20 15:26:49 localhost kernel: audit: type=1307 audit(1713644809.579:92): cwd="/"
  1356. Apr 20 15:26:49 localhost kernel: audit: type=1302 audit(1713644809.579:92): item=0 name=(null) inode=1025 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
  1357. Apr 20 15:26:49 localhost kernel: audit: type=1302 audit(1713644809.579:92): item=1 name=(null) inode=28214 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
  1358. Apr 20 15:26:49 localhost kernel: audit: type=1302 audit(1713644809.579:92): item=2 name=(null) inode=26 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
  1359. Apr 20 15:26:49 localhost kernel: audit: type=1302 audit(1713644809.579:92): item=3 name=(null) inode=28215 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
  1360. Apr 20 15:26:49 localhost kernel: audit: type=1302 audit(1713644809.579:92): item=4 name=(null) inode=28215 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
  1361. Apr 20 15:26:49 localhost kernel: audit: type=1302 audit(1713644809.579:92): item=5 name=(null) inode=28216 dev=00:07 mode=0100444 ouid=0 ogid=0 rdev=00:00 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
  1362. Apr 20 15:26:49 localhost kernel: audit: type=1327 audit(1713644809.579:92): proctitle=2F7573722F6C69622F73797374656D642F73797374656D642D6372797074736574757000617474616368006C756B732D35323431343432612D363633362D343564612D383733312D363664303239333634663364002F6465762F6469736B2F62792D757569642F35323431343432612D363633362D343564612D383733312D36
  1363. Apr 20 15:26:49 localhost audit: PATH item=3 name=(null) inode=28215 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
  1364. Apr 20 15:26:49 localhost audit: PATH item=4 name=(null) inode=28215 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
  1365. Apr 20 15:26:49 localhost audit: PATH item=5 name=(null) inode=28216 dev=00:07 mode=0100444 ouid=0 ogid=0 rdev=00:00 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
  1366. Apr 20 15:26:49 localhost audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D642D6372797074736574757000617474616368006C756B732D35323431343432612D363633362D343564612D383733312D363664303239333634663364002F6465762F6469736B2F62792D757569642F35323431343432612D363633362D343564612D383733312D36
  1367. Apr 20 15:26:49 localhost systemd[1]: Finished systemd-cryptsetup@luks\x2d5241442a\x2d6636\x2d45da\x2d8731\x2d66d029364f3d.service - Cryptography Setup for luks-5241442a-6636-45da-8731-66d029364f3d.
  1368. Apr 20 15:26:49 localhost audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-cryptsetup@luks\x2d5241442a\x2d6636\x2d45da\x2d8731\x2d66d029364f3d comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1369. Apr 20 15:26:49 localhost systemd[1]: Reached target cryptsetup.target - Local Encrypted Volumes.
  1370. Apr 20 15:26:49 localhost systemd[1]: Reached target sysinit.target - System Initialization.
  1371. Apr 20 15:26:49 localhost systemd[1]: Reached target basic.target - Basic System.
  1372. Apr 20 15:26:49 localhost dracut-initqueue[1216]: Scanning devices dm-0 for LVM logical volumes qubes_dom0/root
  1373. Apr 20 15:26:49 localhost dracut-initqueue[1216]: qubes_dom0/swap
  1374. Apr 20 15:26:49 localhost dracut-initqueue[1238]: WARNING: File locking is disabled.
  1375. Apr 20 15:26:50 localhost dracut-initqueue[1216]: qubes_dom0/root thin
  1376. Apr 20 15:26:50 localhost dracut-initqueue[1216]: qubes_dom0/swap linear
  1377. Apr 20 15:26:50 localhost systemd[1]: Found device dev-mapper-qubes_dom0\x2droot.device - /dev/mapper/qubes_dom0-root.
  1378. Apr 20 15:26:50 localhost systemd[1]: Reached target initrd-root-device.target - Initrd Root Device.
  1379. Apr 20 15:26:50 localhost systemd[1]: Finished dracut-initqueue.service - dracut initqueue hook.
  1380. Apr 20 15:26:50 localhost audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1381. Apr 20 15:26:50 localhost systemd[1]: Reached target remote-fs-pre.target - Preparation for Remote File Systems.
  1382. Apr 20 15:26:50 localhost systemd[1]: Reached target remote-cryptsetup.target - Remote Encrypted Volumes.
  1383. Apr 20 15:26:50 localhost systemd[1]: Reached target remote-fs.target - Remote File Systems.
  1384. Apr 20 15:26:50 localhost systemd[1]: dracut-pre-mount.service - dracut pre-mount hook was skipped because all trigger condition checks failed.
  1385. Apr 20 15:26:50 localhost systemd[1]: Starting systemd-fsck-root.service - File System Check on /dev/mapper/qubes_dom0-root...
  1386. Apr 20 15:26:50 localhost systemd-fsck[1282]: /dev/mapper/qubes_dom0-root: clean, 120624/1310720 files, 1188282/5242880 blocks
  1387. Apr 20 15:26:50 localhost systemd[1]: Finished systemd-fsck-root.service - File System Check on /dev/mapper/qubes_dom0-root.
  1388. Apr 20 15:26:50 localhost audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1389. Apr 20 15:26:50 localhost systemd[1]: Mounting sysroot.mount - /sysroot...
  1390. Apr 20 15:26:50 localhost kernel: EXT4-fs (dm-4): mounted filesystem with ordered data mode. Quota mode: none.
  1391. Apr 20 15:26:50 localhost systemd[1]: Mounted sysroot.mount - /sysroot.
  1392. Apr 20 15:26:50 localhost systemd[1]: Reached target initrd-root-fs.target - Initrd Root File System.
  1393. Apr 20 15:26:50 localhost systemd[1]: Starting initrd-parse-etc.service - Reload Configuration from the Real Root...
  1394. Apr 20 15:26:50 localhost systemd[1]: Reloading.
  1395. Apr 20 15:26:50 localhost audit: BPF prog-id=22 op=LOAD
  1396. Apr 20 15:26:50 localhost audit: BPF prog-id=23 op=LOAD
  1397. Apr 20 15:26:50 localhost audit: BPF prog-id=14 op=UNLOAD
  1398. Apr 20 15:26:50 localhost audit: BPF prog-id=15 op=UNLOAD
  1399. Apr 20 15:26:50 localhost audit: BPF prog-id=24 op=LOAD
  1400. Apr 20 15:26:50 localhost audit: BPF prog-id=19 op=UNLOAD
  1401. Apr 20 15:26:50 localhost audit: BPF prog-id=25 op=LOAD
  1402. Apr 20 15:26:50 localhost audit: BPF prog-id=26 op=LOAD
  1403. Apr 20 15:26:50 localhost audit: BPF prog-id=20 op=UNLOAD
  1404. Apr 20 15:26:50 localhost audit: BPF prog-id=21 op=UNLOAD
  1405. Apr 20 15:26:50 localhost audit: BPF prog-id=27 op=LOAD
  1406. Apr 20 15:26:50 localhost audit: BPF prog-id=16 op=UNLOAD
  1407. Apr 20 15:26:50 localhost audit: BPF prog-id=28 op=LOAD
  1408. Apr 20 15:26:50 localhost audit: BPF prog-id=29 op=LOAD
  1409. Apr 20 15:26:50 localhost audit: BPF prog-id=17 op=UNLOAD
  1410. Apr 20 15:26:50 localhost audit: BPF prog-id=18 op=UNLOAD
  1411. Apr 20 15:26:50 localhost systemd[1]: initrd-parse-etc.service: Deactivated successfully.
  1412. Apr 20 15:26:50 localhost systemd[1]: Finished initrd-parse-etc.service - Reload Configuration from the Real Root.
  1413. Apr 20 15:26:50 localhost audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1414. Apr 20 15:26:50 localhost audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1415. Apr 20 15:26:50 localhost systemd[1]: Reached target initrd-fs.target - Initrd File Systems.
  1416. Apr 20 15:26:50 localhost systemd[1]: Reached target initrd.target - Initrd Default Target.
  1417. Apr 20 15:26:50 localhost systemd[1]: dracut-mount.service - dracut mount hook was skipped because all trigger condition checks failed.
  1418. Apr 20 15:26:50 localhost systemd[1]: Starting dracut-pre-pivot.service - dracut pre-pivot and cleanup hook...
  1419. Apr 20 15:26:50 localhost systemd[1]: Finished dracut-pre-pivot.service - dracut pre-pivot and cleanup hook.
  1420. Apr 20 15:26:50 localhost audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1421. Apr 20 15:26:50 localhost systemd[1]: Starting initrd-cleanup.service - Cleaning Up and Shutting Down Daemons...
  1422. Apr 20 15:26:50 localhost systemd[1]: Stopped target remote-cryptsetup.target - Remote Encrypted Volumes.
  1423. Apr 20 15:26:50 localhost systemd[1]: Stopped target timers.target - Timer Units.
  1424. Apr 20 15:26:50 localhost systemd[1]: dracut-pre-pivot.service: Deactivated successfully.
  1425. Apr 20 15:26:50 localhost systemd[1]: Stopped dracut-pre-pivot.service - dracut pre-pivot and cleanup hook.
  1426. Apr 20 15:26:50 localhost audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1427. Apr 20 15:26:50 localhost systemd[1]: Stopped target initrd.target - Initrd Default Target.
  1428. Apr 20 15:26:50 localhost systemd[1]: Stopped target basic.target - Basic System.
  1429. Apr 20 15:26:50 localhost systemd[1]: Stopped target initrd-root-device.target - Initrd Root Device.
  1430. Apr 20 15:26:50 localhost systemd[1]: Stopped target initrd-usr-fs.target - Initrd /usr File System.
  1431. Apr 20 15:26:50 localhost systemd[1]: Stopped target paths.target - Path Units.
  1432. Apr 20 15:26:50 localhost systemd[1]: Stopped target remote-fs.target - Remote File Systems.
  1433. Apr 20 15:26:50 localhost systemd[1]: Stopped target remote-fs-pre.target - Preparation for Remote File Systems.
  1434. Apr 20 15:26:50 localhost systemd[1]: Stopped target slices.target - Slice Units.
  1435. Apr 20 15:26:50 localhost systemd[1]: Stopped target sockets.target - Socket Units.
  1436. Apr 20 15:26:50 localhost systemd[1]: Stopped target sysinit.target - System Initialization.
  1437. Apr 20 15:26:50 localhost systemd[1]: Stopped target cryptsetup.target - Local Encrypted Volumes.
  1438. Apr 20 15:26:50 localhost systemd[1]: Stopped target swap.target - Swaps.
  1439. Apr 20 15:26:50 localhost systemd[1]: dracut-initqueue.service: Deactivated successfully.
  1440. Apr 20 15:26:50 localhost systemd[1]: Stopped dracut-initqueue.service - dracut initqueue hook.
  1441. Apr 20 15:26:50 localhost audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1442. Apr 20 15:26:50 localhost systemd[1]: dracut-initqueue.service: Consumed 4.002s CPU time.
  1443. Apr 20 15:26:50 localhost systemd[1]: Starting plymouth-switch-root.service - Plymouth switch root service...
  1444. Apr 20 15:26:50 localhost systemd[1]: systemd-sysctl.service: Deactivated successfully.
  1445. Apr 20 15:26:50 localhost systemd[1]: Stopped systemd-sysctl.service - Apply Kernel Variables.
  1446. Apr 20 15:26:50 localhost audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1447. Apr 20 15:26:50 localhost systemd[1]: systemd-modules-load.service: Deactivated successfully.
  1448. Apr 20 15:26:50 localhost systemd[1]: Stopped systemd-modules-load.service - Load Kernel Modules.
  1449. Apr 20 15:26:50 localhost audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1450. Apr 20 15:26:50 localhost systemd[1]: systemd-udev-trigger.service: Deactivated successfully.
  1451. Apr 20 15:26:50 localhost systemd[1]: Stopped systemd-udev-trigger.service - Coldplug All udev Devices.
  1452. Apr 20 15:26:50 localhost audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1453. Apr 20 15:26:50 localhost systemd[1]: Stopping systemd-udevd.service - Rule-based Manager for Device Events and Files...
  1454. Apr 20 15:26:50 localhost systemd[1]: Stopping usbguard.service - USBGuard daemon...
  1455. Apr 20 15:26:50 localhost systemd[1]: usbguard.service: Deactivated successfully.
  1456. Apr 20 15:26:50 localhost systemd[1]: Stopped usbguard.service - USBGuard daemon.
  1457. Apr 20 15:26:50 localhost audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=usbguard comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1458. Apr 20 15:26:50 localhost systemd[1]: systemd-udevd.service: Deactivated successfully.
  1459. Apr 20 15:26:50 localhost systemd[1]: Stopped systemd-udevd.service - Rule-based Manager for Device Events and Files.
  1460. Apr 20 15:26:50 localhost audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1461. Apr 20 15:26:50 localhost systemd[1]: systemd-udevd.service: Consumed 2.205s CPU time.
  1462. Apr 20 15:26:50 localhost systemd[1]: systemd-udevd-control.socket: Deactivated successfully.
  1463. Apr 20 15:26:50 localhost systemd[1]: Closed systemd-udevd-control.socket - udev Control Socket.
  1464. Apr 20 15:26:50 localhost systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully.
  1465. Apr 20 15:26:50 localhost systemd[1]: Closed systemd-udevd-kernel.socket - udev Kernel Socket.
  1466. Apr 20 15:26:50 localhost systemd[1]: dracut-pre-udev.service: Deactivated successfully.
  1467. Apr 20 15:26:50 localhost systemd[1]: Stopped dracut-pre-udev.service - dracut pre-udev hook.
  1468. Apr 20 15:26:50 localhost audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1469. Apr 20 15:26:50 localhost systemd[1]: dracut-cmdline.service: Deactivated successfully.
  1470. Apr 20 15:26:50 localhost systemd[1]: Stopped dracut-cmdline.service - dracut cmdline hook.
  1471. Apr 20 15:26:50 localhost audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1472. Apr 20 15:26:50 localhost systemd[1]: Starting initrd-udevadm-cleanup-db.service - Cleanup udev Database...
  1473. Apr 20 15:26:50 localhost systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully.
  1474. Apr 20 15:26:50 localhost systemd[1]: Stopped systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev.
  1475. Apr 20 15:26:50 localhost audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1476. Apr 20 15:26:50 localhost systemd[1]: kmod-static-nodes.service: Deactivated successfully.
  1477. Apr 20 15:26:50 localhost systemd[1]: Stopped kmod-static-nodes.service - Create List of Static Device Nodes.
  1478. Apr 20 15:26:50 localhost audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1479. Apr 20 15:26:50 localhost systemd[1]: systemd-tmpfiles-setup.service: Deactivated successfully.
  1480. Apr 20 15:26:50 localhost systemd[1]: Stopped systemd-tmpfiles-setup.service - Create Volatile Files and Directories.
  1481. Apr 20 15:26:50 localhost audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1482. Apr 20 15:26:50 localhost systemd[1]: Stopped target local-fs.target - Local File Systems.
  1483. Apr 20 15:26:50 localhost systemd[1]: initrd-cleanup.service: Deactivated successfully.
  1484. Apr 20 15:26:50 localhost systemd[1]: Finished initrd-cleanup.service - Cleaning Up and Shutting Down Daemons.
  1485. Apr 20 15:26:50 localhost audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1486. Apr 20 15:26:50 localhost audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1487. Apr 20 15:26:50 localhost systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully.
  1488. Apr 20 15:26:50 localhost systemd[1]: Finished initrd-udevadm-cleanup-db.service - Cleanup udev Database.
  1489. Apr 20 15:26:50 localhost audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1490. Apr 20 15:26:50 localhost audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1491. Apr 20 15:26:50 localhost systemd[1]: Reached target initrd-switch-root.target - Switch Root.
  1492. Apr 20 15:26:51 localhost audit: BPF prog-id=27 op=UNLOAD
  1493. Apr 20 15:26:51 localhost systemd[1]: Finished plymouth-switch-root.service - Plymouth switch root service.
  1494. Apr 20 15:26:51 localhost audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=plymouth-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1495. Apr 20 15:26:51 localhost systemd[1]: Starting initrd-switch-root.service - Switch Root...
  1496. Apr 20 15:26:51 localhost systemd[1]: Switching root.
  1497. Apr 20 15:26:51 localhost systemd-journald[399]: Journal stopped
  1498. Apr 20 15:26:51 dom0 systemd-journald[399]: Received SIGTERM from PID 1 (systemd).
  1499. Apr 20 15:26:51 dom0 systemd[1]: systemd 251.19-1.fc37 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP -GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS +FIDO2 +IDN2 -IDN -IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 +PWQUALITY +P11KIT +QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD +BPF_FRAMEWORK +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified)
  1500. Apr 20 15:26:51 dom0 systemd[1]: Detected virtualization xen.
  1501. Apr 20 15:26:51 dom0 systemd[1]: Detected architecture x86-64.
  1502. Apr 20 15:26:51 dom0 systemd[1]: Hostname set to <dom0>.
  1503. Apr 20 15:26:51 dom0 systemd[1]: bpf-lsm: BPF LSM hook not enabled in the kernel, BPF LSM not supported
  1504. Apr 20 15:26:51 dom0 systemd[1]: /usr/lib/systemd/system/qubesd.service:8: Standard output type syslog is obsolete, automatically updating to journal. Please update your unit file, and consider removing the setting altogether.
  1505. Apr 20 15:26:51 dom0 systemd[1]: /usr/lib/systemd/system/qubes-qmemman.service:7: Standard output type syslog is obsolete, automatically updating to journal. Please update your unit file, and consider removing the setting altogether.
  1506. Apr 20 15:26:51 dom0 systemd[1]: /usr/lib/systemd/system/qubes-db-dom0.service:9: Standard output type syslog is obsolete, automatically updating to journal. Please update your unit file, and consider removing the setting altogether.
  1507. Apr 20 15:26:51 dom0 systemd[1]: /usr/lib/systemd/system/qubes-core.service:8: Standard output type syslog is obsolete, automatically updating to journal. Please update your unit file, and consider removing the setting altogether.
  1508. Apr 20 15:26:51 dom0 systemd[1]: systemd-ask-password-plymouth.service: Deactivated successfully.
  1509. Apr 20 15:26:51 dom0 systemd[1]: initrd-switch-root.service: Deactivated successfully.
  1510. Apr 20 15:26:51 dom0 systemd[1]: Stopped initrd-switch-root.service - Switch Root.
  1511. Apr 20 15:26:51 dom0 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1.
  1512. Apr 20 15:26:51 dom0 systemd[1]: Created slice system-getty.slice - Slice /system/getty.
  1513. Apr 20 15:26:51 dom0 systemd[1]: Created slice system-qubes\x2dvm.slice - Slice /system/qubes-vm.
  1514. Apr 20 15:26:51 dom0 systemd[1]: Created slice system-serial\x2dgetty.slice - Slice /system/serial-getty.
  1515. Apr 20 15:26:51 dom0 systemd[1]: Created slice system-systemd\x2dfsck.slice - Slice /system/systemd-fsck.
  1516. Apr 20 15:26:51 dom0 systemd[1]: Created slice user.slice - User and Session Slice.
  1517. Apr 20 15:26:51 dom0 systemd[1]: systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch was skipped because of a failed condition check (ConditionPathExists=!/run/plymouth/pid).
  1518. Apr 20 15:26:51 dom0 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount - Arbitrary Executable File Formats File System Automount Point.
  1519. Apr 20 15:26:51 dom0 systemd[1]: Reached target blockdev@dev-mapper-luks\x2d5241442a\x2d6636\x2d45da\x2d8731\x2d66d029364f3d.target - Block Device Preparation for /dev/mapper/luks-5241442a-6636-45da-8731-66d029364f3d.
  1520. Apr 20 15:26:51 dom0 systemd[1]: Stopped target initrd-switch-root.target - Switch Root.
  1521. Apr 20 15:26:51 dom0 systemd[1]: Stopped target initrd-fs.target - Initrd File Systems.
  1522. Apr 20 15:26:51 dom0 systemd[1]: Stopped target initrd-root-fs.target - Initrd Root File System.
  1523. Apr 20 15:26:51 dom0 systemd[1]: Reached target integritysetup.target - Local Integrity Protected Volumes.
  1524. Apr 20 15:26:51 dom0 systemd[1]: Reached target remote-cryptsetup.target - Remote Encrypted Volumes.
  1525. Apr 20 15:26:51 dom0 systemd[1]: Reached target remote-fs.target - Remote File Systems.
  1526. Apr 20 15:26:51 dom0 systemd[1]: Reached target slices.target - Slice Units.
  1527. Apr 20 15:26:51 dom0 systemd[1]: Reached target veritysetup.target - Local Verity Protected Volumes.
  1528. Apr 20 15:26:51 dom0 systemd[1]: Listening on dm-event.socket - Device-mapper event daemon FIFOs.
  1529. Apr 20 15:26:51 dom0 systemd[1]: Listening on systemd-coredump.socket - Process Core Dump Socket.
  1530. Apr 20 15:26:51 dom0 systemd[1]: Listening on systemd-initctl.socket - initctl Compatibility Named Pipe.
  1531. Apr 20 15:26:51 dom0 systemd[1]: Listening on systemd-udevd-control.socket - udev Control Socket.
  1532. Apr 20 15:26:51 dom0 systemd[1]: Listening on systemd-udevd-kernel.socket - udev Kernel Socket.
  1533. Apr 20 15:26:51 dom0 systemd[1]: Listening on systemd-userdbd.socket - User Database Manager Socket.
  1534. Apr 20 15:26:51 dom0 systemd[1]: Activating swap dev-mapper-qubes_dom0\x2dswap.swap - /dev/mapper/qubes_dom0-swap...
  1535. Apr 20 15:26:51 dom0 systemd[1]: dev-hugepages.mount - Huge Pages File System was skipped because of a failed condition check (ConditionPathExists=/sys/kernel/mm/hugepages).
  1536. Apr 20 15:26:51 dom0 systemd[1]: Mounting dev-mqueue.mount - POSIX Message Queue File System...
  1537. Apr 20 15:26:51 dom0 systemd[1]: Mounting proc-xen.mount - Mount /proc/xen files...
  1538. Apr 20 15:26:51 dom0 kernel: Adding 4108284k swap on /dev/mapper/qubes_dom0-swap. Priority:-2 extents:1 across:4108284k SSFS
  1539. Apr 20 15:26:51 dom0 systemd[1]: Mounting sys-kernel-debug.mount - Kernel Debug File System...
  1540. Apr 20 15:26:51 dom0 systemd[1]: Mounting sys-kernel-tracing.mount - Kernel Trace File System...
  1541. Apr 20 15:26:51 dom0 systemd[1]: Starting kmod-static-nodes.service - Create List of Static Device Nodes...
  1542. Apr 20 15:26:51 dom0 systemd[1]: Starting lvm2-monitor.service - Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling...
  1543. Apr 20 15:26:51 dom0 systemd[1]: Starting [email protected] - Load Kernel Module configfs...
  1544. Apr 20 15:26:51 dom0 systemd[1]: Starting modprobe@dm_mod.service - Load Kernel Module dm_mod...
  1545. Apr 20 15:26:51 dom0 systemd[1]: Starting [email protected] - Load Kernel Module drm...
  1546. Apr 20 15:26:51 dom0 systemd[1]: Starting [email protected] - Load Kernel Module fuse...
  1547. Apr 20 15:26:51 dom0 systemd[1]: Starting [email protected] - Load Kernel Module loop...
  1548. Apr 20 15:26:51 dom0 systemd[1]: plymouth-switch-root.service: Deactivated successfully.
  1549. Apr 20 15:26:51 dom0 systemd[1]: Stopped plymouth-switch-root.service - Plymouth switch root service.
  1550. Apr 20 15:26:51 dom0 systemd[1]: Stopped systemd-journald.service - Journal Service.
  1551. Apr 20 15:26:51 dom0 systemd[1]: Starting systemd-journald.service - Journal Service...
  1552. Apr 20 15:26:51 dom0 systemd[1]: Starting systemd-modules-load.service - Load Kernel Modules...
  1553. Apr 20 15:26:51 dom0 kernel: fuse: init (API version 7.37)
  1554. Apr 20 15:26:51 dom0 systemd[1]: Starting systemd-network-generator.service - Generate network units from Kernel command line...
  1555. Apr 20 15:26:51 dom0 kernel: loop: module loaded
  1556. Apr 20 15:26:51 dom0 systemd[1]: Starting systemd-remount-fs.service - Remount Root and Kernel File Systems...
  1557. Apr 20 15:26:51 dom0 systemd[1]: Starting systemd-udev-trigger.service - Coldplug All udev Devices...
  1558. Apr 20 15:26:51 dom0 systemd[1]: Activated swap dev-mapper-qubes_dom0\x2dswap.swap - /dev/mapper/qubes_dom0-swap.
  1559. Apr 20 15:26:51 dom0 systemd[1]: Mounted dev-mqueue.mount - POSIX Message Queue File System.
  1560. Apr 20 15:26:51 dom0 systemd[1]: Mounted proc-xen.mount - Mount /proc/xen files.
  1561. Apr 20 15:26:51 dom0 systemd[1]: Mounted sys-kernel-debug.mount - Kernel Debug File System.
  1562. Apr 20 15:26:51 dom0 systemd[1]: Mounted sys-kernel-tracing.mount - Kernel Trace File System.
  1563. Apr 20 15:26:51 dom0 systemd[1]: Finished kmod-static-nodes.service - Create List of Static Device Nodes.
  1564. Apr 20 15:26:51 dom0 systemd[1]: [email protected]: Deactivated successfully.
  1565. Apr 20 15:26:51 dom0 systemd[1]: Finished [email protected] - Load Kernel Module configfs.
  1566. Apr 20 15:26:51 dom0 systemd[1]: modprobe@dm_mod.service: Deactivated successfully.
  1567. Apr 20 15:26:51 dom0 systemd[1]: Finished modprobe@dm_mod.service - Load Kernel Module dm_mod.
  1568. Apr 20 15:26:51 dom0 systemd[1]: [email protected]: Deactivated successfully.
  1569. Apr 20 15:26:51 dom0 systemd[1]: Finished [email protected] - Load Kernel Module drm.
  1570. Apr 20 15:26:51 dom0 systemd[1]: [email protected]: Deactivated successfully.
  1571. Apr 20 15:26:51 dom0 systemd[1]: Finished [email protected] - Load Kernel Module fuse.
  1572. Apr 20 15:26:51 dom0 systemd[1]: [email protected]: Deactivated successfully.
  1573. Apr 20 15:26:51 dom0 systemd[1]: Finished [email protected] - Load Kernel Module loop.
  1574. Apr 20 15:26:51 dom0 systemd[1]: Finished systemd-modules-load.service - Load Kernel Modules.
  1575. Apr 20 15:26:51 dom0 systemd[1]: Finished systemd-network-generator.service - Generate network units from Kernel command line.
  1576. Apr 20 15:26:51 dom0 systemd[1]: Reached target network-pre.target - Preparation for Network.
  1577. Apr 20 15:26:51 dom0 systemd[1]: Reached target swap.target - Swaps.
  1578. Apr 20 15:26:51 dom0 kernel: EXT4-fs (dm-4): re-mounted. Quota mode: none.
  1579. Apr 20 15:26:51 dom0 systemd[1]: Mounting sys-fs-fuse-connections.mount - FUSE Control File System...
  1580. Apr 20 15:26:51 dom0 systemd-journald[1380]: Journal started
  1581. Apr 20 15:26:51 dom0 systemd-journald[1380]: Runtime Journal (/run/log/journal/5e0ed3df2d7f445c9b1c749edb877185) is 8.0M, max 77.6M, 69.6M free.
  1582. Apr 20 15:26:51 dom0 audit: BPF prog-id=30 op=LOAD
  1583. Apr 20 15:26:51 dom0 audit: BPF prog-id=30 op=UNLOAD
  1584. Apr 20 15:26:51 dom0 audit: BPF prog-id=31 op=LOAD
  1585. Apr 20 15:26:51 dom0 audit: BPF prog-id=31 op=UNLOAD
  1586. Apr 20 15:26:51 dom0 audit: BPF prog-id=32 op=LOAD
  1587. Apr 20 15:26:51 dom0 audit: BPF prog-id=32 op=UNLOAD
  1588. Apr 20 15:26:51 dom0 audit: BPF prog-id=33 op=LOAD
  1589. Apr 20 15:26:51 dom0 audit: BPF prog-id=33 op=UNLOAD
  1590. Apr 20 15:26:51 dom0 audit: BPF prog-id=34 op=LOAD
  1591. Apr 20 15:26:51 dom0 audit: BPF prog-id=34 op=UNLOAD
  1592. Apr 20 15:26:51 dom0 audit: BPF prog-id=35 op=LOAD
  1593. Apr 20 15:26:51 dom0 audit: BPF prog-id=36 op=LOAD
  1594. Apr 20 15:26:51 dom0 audit: BPF prog-id=35 op=UNLOAD
  1595. Apr 20 15:26:51 dom0 audit: BPF prog-id=36 op=UNLOAD
  1596. Apr 20 15:26:51 dom0 audit: BPF prog-id=37 op=LOAD
  1597. Apr 20 15:26:51 dom0 audit: BPF prog-id=37 op=UNLOAD
  1598. Apr 20 15:26:51 dom0 audit: BPF prog-id=38 op=LOAD
  1599. Apr 20 15:26:51 dom0 audit: BPF prog-id=38 op=UNLOAD
  1600. Apr 20 15:26:51 dom0 audit: BPF prog-id=39 op=LOAD
  1601. Apr 20 15:26:51 dom0 audit: BPF prog-id=39 op=UNLOAD
  1602. Apr 20 15:26:51 dom0 audit: BPF prog-id=40 op=LOAD
  1603. Apr 20 15:26:51 dom0 audit: BPF prog-id=40 op=UNLOAD
  1604. Apr 20 15:26:51 dom0 audit: BPF prog-id=41 op=LOAD
  1605. Apr 20 15:26:51 dom0 audit: BPF prog-id=42 op=LOAD
  1606. Apr 20 15:26:51 dom0 audit: BPF prog-id=42 op=UNLOAD
  1607. Apr 20 15:26:51 dom0 audit: BPF prog-id=43 op=LOAD
  1608. Apr 20 15:26:51 dom0 audit: BPF prog-id=41 op=UNLOAD
  1609. Apr 20 15:26:51 dom0 audit: BPF prog-id=43 op=UNLOAD
  1610. Apr 20 15:26:51 dom0 audit: BPF prog-id=44 op=LOAD
  1611. Apr 20 15:26:51 dom0 audit: BPF prog-id=24 op=UNLOAD
  1612. Apr 20 15:26:51 dom0 audit: BPF prog-id=45 op=LOAD
  1613. Apr 20 15:26:51 dom0 audit: BPF prog-id=46 op=LOAD
  1614. Apr 20 15:26:51 dom0 audit: BPF prog-id=25 op=UNLOAD
  1615. Apr 20 15:26:51 dom0 audit: BPF prog-id=26 op=UNLOAD
  1616. Apr 20 15:26:51 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1617. Apr 20 15:26:51 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-ask-password-plymouth comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1618. Apr 20 15:26:51 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1619. Apr 20 15:26:51 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1620. Apr 20 15:26:51 dom0 audit: BPF prog-id=44 op=UNLOAD
  1621. Apr 20 15:26:51 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=plymouth-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1622. Apr 20 15:26:51 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1623. Apr 20 15:26:51 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1624. Apr 20 15:26:51 dom0 audit: BPF prog-id=47 op=LOAD
  1625. Apr 20 15:26:51 dom0 audit: BPF prog-id=48 op=LOAD
  1626. Apr 20 15:26:51 dom0 audit: BPF prog-id=49 op=LOAD
  1627. Apr 20 15:26:51 dom0 audit: BPF prog-id=45 op=UNLOAD
  1628. Apr 20 15:26:51 dom0 audit: BPF prog-id=46 op=UNLOAD
  1629. Apr 20 15:26:51 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1630. Apr 20 15:26:51 dom0 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 res=1
  1631. Apr 20 15:26:51 dom0 audit[1380]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffc4c426cf0 a2=4000 a3=7ffc4c426d7c items=0 ppid=1 pid=1380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" key=(null)
  1632. Apr 20 15:26:51 dom0 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald"
  1633. Apr 20 15:26:51 dom0 systemd[1]: Mounting tmp.mount - Temporary Directory /tmp...
  1634. Apr 20 15:26:51 dom0 systemd[1]: systemd-repart.service - Repartition Root Disk was skipped because all trigger condition checks failed.
  1635. Apr 20 15:26:51 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1636. Apr 20 15:26:51 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1637. Apr 20 15:26:51 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1638. Apr 20 15:26:51 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1639. Apr 20 15:26:51 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1640. Apr 20 15:26:51 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1641. Apr 20 15:26:51 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1642. Apr 20 15:26:51 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1643. Apr 20 15:26:51 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1644. Apr 20 15:26:51 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1645. Apr 20 15:26:51 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1646. Apr 20 15:26:51 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1647. Apr 20 15:26:51 dom0 systemd[1]: Queued start job for default target graphical.target.
  1648. Apr 20 15:26:51 dom0 systemd[1]: Unnecessary job was removed for dev-disk-by\x2duuid-5241442a\x2d6636\x2d45da\x2d8731\x2d66d029364f3d.device - /dev/disk/by-uuid/5241442a-6636-45da-8731-66d029364f3d.
  1649. Apr 20 15:26:51 dom0 systemd[1]: systemd-journald.service: Deactivated successfully.
  1650. Apr 20 15:26:51 dom0 systemd-modules-load[1381]: Module 'msr' is built in
  1651. Apr 20 15:26:51 dom0 systemd[1]: Starting systemd-sysctl.service - Apply Kernel Variables...
  1652. Apr 20 15:26:51 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1653. Apr 20 15:26:51 dom0 systemd[1]: Started systemd-journald.service - Journal Service.
  1654. Apr 20 15:26:51 dom0 systemd[1]: Finished systemd-remount-fs.service - Remount Root and Kernel File Systems.
  1655. Apr 20 15:26:51 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1656. Apr 20 15:26:51 dom0 systemd[1]: Mounted sys-fs-fuse-connections.mount - FUSE Control File System.
  1657. Apr 20 15:26:51 dom0 systemd[1]: Mounted tmp.mount - Temporary Directory /tmp.
  1658. Apr 20 15:26:51 dom0 systemd[1]: systemd-firstboot.service - First Boot Wizard was skipped because of a failed condition check (ConditionFirstBoot=yes).
  1659. Apr 20 15:26:51 dom0 systemd[1]: systemd-hwdb-update.service - Rebuild Hardware Database was skipped because of a failed condition check (ConditionNeedsUpdate=/etc).
  1660. Apr 20 15:26:51 dom0 systemd[1]: Starting systemd-journal-flush.service - Flush Journal to Persistent Storage...
  1661. Apr 20 15:26:51 dom0 systemd[1]: systemd-pstore.service - Platform Persistent Storage Archival was skipped because of a failed condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore).
  1662. Apr 20 15:26:51 dom0 systemd[1]: Starting systemd-random-seed.service - Load/Save Random Seed...
  1663. Apr 20 15:26:51 dom0 systemd[1]: systemd-sysusers.service - Create System Users was skipped because of a failed condition check (ConditionNeedsUpdate=/etc).
  1664. Apr 20 15:26:51 dom0 systemd[1]: Starting systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev...
  1665. Apr 20 15:26:51 dom0 systemd[1]: Finished systemd-sysctl.service - Apply Kernel Variables.
  1666. Apr 20 15:26:51 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1667. Apr 20 15:26:51 dom0 systemd-journald[1380]: Time spent on flushing to /var/log/journal/5e0ed3df2d7f445c9b1c749edb877185 is 33.732ms for 1666 entries.
  1668. Apr 20 15:26:51 dom0 systemd-journald[1380]: System Journal (/var/log/journal/5e0ed3df2d7f445c9b1c749edb877185) is 80.0M, max 1.9G, 1.8G free.
  1669. Apr 20 15:26:51 dom0 systemd-journald[1380]: Received client request to flush runtime journal.
  1670. Apr 20 15:26:51 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1671. Apr 20 15:26:51 dom0 audit: BPF prog-id=50 op=LOAD
  1672. Apr 20 15:26:51 dom0 audit: BPF prog-id=51 op=LOAD
  1673. Apr 20 15:26:51 dom0 audit: BPF prog-id=22 op=UNLOAD
  1674. Apr 20 15:26:51 dom0 audit: BPF prog-id=23 op=UNLOAD
  1675. Apr 20 15:26:51 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1676. Apr 20 15:26:51 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1677. Apr 20 15:26:51 dom0 systemd[1]: Finished systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev.
  1678. Apr 20 15:26:51 dom0 systemd[1]: Starting systemd-udevd.service - Rule-based Manager for Device Events and Files...
  1679. Apr 20 15:26:51 dom0 systemd-udevd[1393]: Using default interface naming scheme 'v251'.
  1680. Apr 20 15:26:51 dom0 systemd[1]: Finished systemd-random-seed.service - Load/Save Random Seed.
  1681. Apr 20 15:26:51 dom0 systemd[1]: first-boot-complete.target - First Boot Complete was skipped because of a failed condition check (ConditionFirstBoot=yes).
  1682. Apr 20 15:26:51 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1683. Apr 20 15:26:51 dom0 systemd[1]: Started systemd-udevd.service - Rule-based Manager for Device Events and Files.
  1684. Apr 20 15:26:51 dom0 systemd[1]: Finished systemd-journal-flush.service - Flush Journal to Persistent Storage.
  1685. Apr 20 15:26:51 dom0 systemd[1]: Starting [email protected] - Load Kernel Module configfs...
  1686. Apr 20 15:26:51 dom0 systemd[1]: [email protected]: Deactivated successfully.
  1687. Apr 20 15:26:51 dom0 systemd[1]: Finished [email protected] - Load Kernel Module configfs.
  1688. Apr 20 15:26:51 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1689. Apr 20 15:26:51 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1690. Apr 20 15:26:51 dom0 systemd[1]: Finished systemd-udev-trigger.service - Coldplug All udev Devices.
  1691. Apr 20 15:26:51 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1692. Apr 20 15:26:51 dom0 systemd[1]: Condition check resulted in dev-hvc0.device - /dev/hvc0 being skipped.
  1693. Apr 20 15:26:51 dom0 kernel: intel_pmc_core INT33A1:00: initialized
  1694. Apr 20 15:26:51 dom0 kernel: Intel(R) 2.5G Ethernet Linux Driver
  1695. Apr 20 15:26:51 dom0 kernel: Copyright(c) 2018 Intel Corporation.
  1696. Apr 20 15:26:51 dom0 kernel: xen: registering gsi 18 triggering 0 polarity 1
  1697. Apr 20 15:26:51 dom0 kernel: xen: --> pirq=18 -> irq=18 (gsi=18)
  1698. Apr 20 15:26:51 dom0 kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set
  1699. Apr 20 15:26:51 dom0 kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt
  1700. Apr 20 15:26:51 dom0 kernel: i2c i2c-13: 2/4 memory slots populated (from DMI)
  1701. Apr 20 15:26:51 dom0 kernel: i2c i2c-13: Memory type 0x22 not supported yet, not instantiating SPD
  1702. Apr 20 15:26:51 dom0 kernel: idma64 idma64.0: Found Intel integrated DMA 64-bit
  1703. Apr 20 15:26:51 dom0 kernel: mei_me 0000:00:16.0: enabling device (0000 -> 0002)
  1704. Apr 20 15:26:51 dom0 kernel: input: PC Speaker as /devices/platform/pcspkr/input/input19
  1705. Apr 20 15:26:51 dom0 kernel: xen: registering gsi 16 triggering 0 polarity 1
  1706. Apr 20 15:26:51 dom0 kernel: Already setup the GSI :16
  1707. Apr 20 15:26:51 dom0 kernel: idma64 idma64.1: Found Intel integrated DMA 64-bit
  1708. Apr 20 15:26:51 dom0 systemd[1]: Condition check resulted in dev-block-253:0.device - /dev/block/253:0 being skipped.
  1709. Apr 20 15:26:51 dom0 kernel: idma64 idma64.2: Found Intel integrated DMA 64-bit
  1710. Apr 20 15:26:51 dom0 systemd[1]: Created slice system-lvm2\x2dpvscan.slice - Slice /system/lvm2-pvscan.
  1711. Apr 20 15:26:51 dom0 systemd[1]: Starting lvm2-pvscan@253:0.service - LVM event activation on device 253:0...
  1712. Apr 20 15:26:51 dom0 systemd[1]: Started dm-event.service - Device-mapper event daemon.
  1713. Apr 20 15:26:51 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dm-event comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1714. Apr 20 15:26:51 dom0 kernel: cfg80211: Loading compiled-in X.509 certificates for regulatory database
  1715. Apr 20 15:26:51 dom0 kernel: cfg80211: Loaded X.509 cert 'sforshee: 00b28ddf47aef9cea7'
  1716. Apr 20 15:26:51 dom0 dmeventd[2499]: dmeventd ready for processing.
  1717. Apr 20 15:26:51 dom0 systemd[1]: Condition check resulted in dev-disk-by\x2duuid-a8d2f5a4\x2dd25d\x2d45fb\x2da847\x2dc2a89a3d2037.device - Samsung SSD 990 PRO 2TB 2 being skipped.
  1718. Apr 20 15:26:51 dom0 kernel: platform regulatory.0: Direct firmware load for regulatory.db failed with error -2
  1719. Apr 20 15:26:51 dom0 kernel: cfg80211: failed to load regulatory.db
  1720. Apr 20 15:26:51 dom0 systemd[1]: Condition check resulted in dev-disk-by\x2duuid-66AB\x2d8D71.device - Samsung SSD 990 PRO 2TB EFI\x20System\x20Partition being skipped.
  1721. Apr 20 15:26:51 dom0 kernel: intel_powerclamp: No package C-state available
  1722. Apr 20 15:26:51 dom0 kernel: Intel(R) Wireless WiFi driver for Linux
  1723. Apr 20 15:26:51 dom0 lvm[1800]: pvscan[1800] PV /dev/mapper/luks-5241442a-6636-45da-8731-66d029364f3d online, VG qubes_dom0 is complete.
  1724. Apr 20 15:26:51 dom0 lvm[1800]: pvscan[1800] VG qubes_dom0 run autoactivation.
  1725. Apr 20 15:26:51 dom0 lvm[2499]: Monitoring thin pool qubes_dom0-root--pool-tpool.
  1726. Apr 20 15:26:51 dom0 lvm[1374]: 5 logical volume(s) in volume group "qubes_dom0" monitored
  1727. Apr 20 15:26:51 dom0 systemd[1]: Finished lvm2-monitor.service - Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling.
  1728. Apr 20 15:26:51 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=lvm2-monitor comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1729. Apr 20 15:26:51 dom0 systemd[1]: Reached target local-fs-pre.target - Preparation for Local File Systems.
  1730. Apr 20 15:26:51 dom0 systemd[1]: Starting systemd-fsck@dev-disk-by\x2duuid-66AB\x2d8D71.service - File System Check on /dev/disk/by-uuid/66AB-8D71...
  1731. Apr 20 15:26:51 dom0 systemd[1]: Starting systemd-fsck@dev-disk-by\x2duuid-a8d2f5a4\x2dd25d\x2d45fb\x2da847\x2dc2a89a3d2037.service - File System Check on /dev/disk/by-uuid/a8d2f5a4-d25d-45fb-a847-c2a89a3d2037...
  1732. Apr 20 15:26:51 dom0 systemd[1]: Listening on systemd-rfkill.socket - Load/Save RF Kill Switch Status /dev/rfkill Watch.
  1733. Apr 20 15:26:51 dom0 kernel: iTCO_vendor_support: vendor-support=0
  1734. Apr 20 15:26:51 dom0 kernel: intel_powerclamp: No package C-state available
  1735. Apr 20 15:26:51 dom0 kernel: mei_hdcp 0000:00:16.0-b638ab7e-94e2-4ea2-a552-d1c54b627f04: bound 0000:00:02.0 (ops i915_hdcp_component_ops [i915])
  1736. Apr 20 15:26:51 dom0 kernel: iTCO_wdt iTCO_wdt: Found a Intel PCH TCO device (Version=6, TCOBASE=0x0400)
  1737. Apr 20 15:26:51 dom0 kernel: iTCO_wdt iTCO_wdt: initialized. heartbeat=30 sec (nowayout=0)
  1738. Apr 20 15:26:51 dom0 kernel: mei_pxp 0000:00:16.0-fbf6fcf1-96cf-4e2e-a6a6-1bab8cbe36b1: bound 0000:00:02.0 (ops i915_pxp_tee_component_ops [i915])
  1739. Apr 20 15:26:51 dom0 kernel: snd_hda_intel 0000:00:1f.3: enabling device (0000 -> 0002)
  1740. Apr 20 15:26:51 dom0 kernel: xen: registering gsi 17 triggering 0 polarity 1
  1741. Apr 20 15:26:51 dom0 kernel: Already setup the GSI :17
  1742. Apr 20 15:26:51 dom0 kernel: snd_hda_intel 0000:00:1f.3: bound 0000:00:02.0 (ops i915_audio_component_bind_ops [i915])
  1743. Apr 20 15:26:51 dom0 systemd-fsck[2718]: /dev/nvme0n1p2: clean, 33/65536 files, 30286/262144 blocks
  1744. Apr 20 15:26:51 dom0 kernel: intel_rapl_msr: PL4 support detected.
  1745. Apr 20 15:26:51 dom0 systemd[1]: Finished systemd-fsck@dev-disk-by\x2duuid-a8d2f5a4\x2dd25d\x2d45fb\x2da847\x2dc2a89a3d2037.service - File System Check on /dev/disk/by-uuid/a8d2f5a4-d25d-45fb-a847-c2a89a3d2037.
  1746. Apr 20 15:26:51 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-fsck@dev-disk-by\x2duuid-a8d2f5a4\x2dd25d\x2d45fb\x2da847\x2dc2a89a3d2037 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1747. Apr 20 15:26:51 dom0 systemd-fsck[2719]: fsck.fat 4.2 (2021-01-31)
  1748. Apr 20 15:26:51 dom0 systemd-fsck[2719]: /dev/nvme0n1p1: 9 files, 7282/153296 clusters
  1749. Apr 20 15:26:51 dom0 systemd[1]: Mounting boot.mount - /boot...
  1750. Apr 20 15:26:51 dom0 systemd[1]: Finished systemd-fsck@dev-disk-by\x2duuid-66AB\x2d8D71.service - File System Check on /dev/disk/by-uuid/66AB-8D71.
  1751. Apr 20 15:26:51 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-fsck@dev-disk-by\x2duuid-66AB\x2d8D71 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1752. Apr 20 15:26:51 dom0 kernel: EXT4-fs (nvme0n1p2): mounted filesystem with ordered data mode. Quota mode: none.
  1753. Apr 20 15:26:51 dom0 systemd[1]: Mounted boot.mount - /boot.
  1754. Apr 20 15:26:51 dom0 systemd[1]: Created slice system-qubes\x2dinput\x2dsender\x2dkeyboard\x2dmouse.slice - Slice /system/qubes-input-sender-keyboard-mouse.
  1755. Apr 20 15:26:51 dom0 systemd[1]: systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch was skipped because of a failed condition check (ConditionPathExists=!/run/plymouth/pid).
  1756. Apr 20 15:26:51 dom0 systemd[1]: Mounting boot-efi.mount - /boot/efi...
  1757. Apr 20 15:26:51 dom0 systemd[1]: dev-hugepages.mount - Huge Pages File System was skipped because of a failed condition check (ConditionPathExists=/sys/kernel/mm/hugepages).
  1758. Apr 20 15:26:51 dom0 systemd[1]: Starting modprobe@dm_mod.service - Load Kernel Module dm_mod...
  1759. Apr 20 15:26:51 dom0 systemd[1]: Starting [email protected] - Load Kernel Module loop...
  1760. Apr 20 15:26:51 dom0 systemd[1]: systemd-firstboot.service - First Boot Wizard was skipped because of a failed condition check (ConditionFirstBoot=yes).
  1761. Apr 20 15:26:51 dom0 systemd[1]: first-boot-complete.target - First Boot Complete was skipped because of a failed condition check (ConditionFirstBoot=yes).
  1762. Apr 20 15:26:51 dom0 systemd[1]: systemd-hwdb-update.service - Rebuild Hardware Database was skipped because of a failed condition check (ConditionNeedsUpdate=/etc).
  1763. Apr 20 15:26:51 dom0 systemd[1]: systemd-pstore.service - Platform Persistent Storage Archival was skipped because of a failed condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore).
  1764. Apr 20 15:26:51 dom0 systemd[1]: systemd-sysusers.service - Create System Users was skipped because of a failed condition check (ConditionNeedsUpdate=/etc).
  1765. Apr 20 15:26:51 dom0 systemd[1]: modprobe@dm_mod.service: Deactivated successfully.
  1766. Apr 20 15:26:51 dom0 systemd[1]: Finished modprobe@dm_mod.service - Load Kernel Module dm_mod.
  1767. Apr 20 15:26:51 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1768. Apr 20 15:26:51 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1769. Apr 20 15:26:51 dom0 systemd[1]: [email protected]: Deactivated successfully.
  1770. Apr 20 15:26:51 dom0 systemd[1]: Finished [email protected] - Load Kernel Module loop.
  1771. Apr 20 15:26:51 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1772. Apr 20 15:26:51 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1773. Apr 20 15:26:51 dom0 systemd[1]: Mounted boot-efi.mount - /boot/efi.
  1774. Apr 20 15:26:51 dom0 systemd[1]: Created slice system-qubes\x2dinput\x2dsender\x2dkeyboard.slice - Slice /system/qubes-input-sender-keyboard.
  1775. Apr 20 15:26:51 dom0 systemd[1]: systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch was skipped because of a failed condition check (ConditionPathExists=!/run/plymouth/pid).
  1776. Apr 20 15:26:51 dom0 systemd[1]: Reached target local-fs.target - Local File Systems.
  1777. Apr 20 15:26:51 dom0 systemd[1]: dev-hugepages.mount - Huge Pages File System was skipped because of a failed condition check (ConditionPathExists=/sys/kernel/mm/hugepages).
  1778. Apr 20 15:26:51 dom0 systemd[1]: ldconfig.service - Rebuild Dynamic Linker Cache was skipped because all trigger condition checks failed.
  1779. Apr 20 15:26:51 dom0 systemd[1]: Starting plymouth-read-write.service - Tell Plymouth To Write Out Runtime Data...
  1780. Apr 20 15:26:51 dom0 systemd[1]: systemd-binfmt.service - Set Up Additional Binary Formats was skipped because all trigger condition checks failed.
  1781. Apr 20 15:26:51 dom0 systemd[1]: systemd-boot-system-token.service - Store a System Token in an EFI Variable was skipped because of a failed condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f).
  1782. Apr 20 15:26:51 dom0 systemd[1]: systemd-firstboot.service - First Boot Wizard was skipped because of a failed condition check (ConditionFirstBoot=yes).
  1783. Apr 20 15:26:51 dom0 systemd[1]: first-boot-complete.target - First Boot Complete was skipped because of a failed condition check (ConditionFirstBoot=yes).
  1784. Apr 20 15:26:51 dom0 systemd[1]: systemd-hwdb-update.service - Rebuild Hardware Database was skipped because of a failed condition check (ConditionNeedsUpdate=/etc).
  1785. Apr 20 15:26:51 dom0 systemd[1]: systemd-machine-id-commit.service - Commit a transient machine-id on disk was skipped because of a failed condition check (ConditionPathIsMountPoint=/etc/machine-id).
  1786. Apr 20 15:26:51 dom0 systemd[1]: systemd-pstore.service - Platform Persistent Storage Archival was skipped because of a failed condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore).
  1787. Apr 20 15:26:51 dom0 systemd[1]: systemd-repart.service - Repartition Root Disk was skipped because all trigger condition checks failed.
  1788. Apr 20 15:26:51 dom0 systemd[1]: systemd-sysusers.service - Create System Users was skipped because of a failed condition check (ConditionNeedsUpdate=/etc).
  1789. Apr 20 15:26:51 dom0 systemd[1]: Starting systemd-tmpfiles-setup.service - Create Volatile Files and Directories...
  1790. Apr 20 15:26:51 dom0 systemd[1]: Finished plymouth-read-write.service - Tell Plymouth To Write Out Runtime Data.
  1791. Apr 20 15:26:51 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=plymouth-read-write comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1792. Apr 20 15:26:51 dom0 systemd[1]: Received SIGRTMIN+20 from PID 650 (plymouthd).
  1793. Apr 20 15:26:51 dom0 systemd[1]: Finished systemd-tmpfiles-setup.service - Create Volatile Files and Directories.
  1794. Apr 20 15:26:51 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1795. Apr 20 15:26:51 dom0 systemd[1]: systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch was skipped because of a failed condition check (ConditionPathExists=!/run/plymouth/pid).
  1796. Apr 20 15:26:51 dom0 systemd[1]: dev-hugepages.mount - Huge Pages File System was skipped because of a failed condition check (ConditionPathExists=/sys/kernel/mm/hugepages).
  1797. Apr 20 15:26:51 dom0 systemd[1]: ldconfig.service - Rebuild Dynamic Linker Cache was skipped because all trigger condition checks failed.
  1798. Apr 20 15:26:51 dom0 systemd[1]: Starting modprobe@dm_mod.service - Load Kernel Module dm_mod...
  1799. Apr 20 15:26:51 dom0 systemd[1]: Starting [email protected] - Load Kernel Module loop...
  1800. Apr 20 15:26:51 dom0 systemd[1]: systemd-binfmt.service - Set Up Additional Binary Formats was skipped because all trigger condition checks failed.
  1801. Apr 20 15:26:51 dom0 systemd[1]: systemd-boot-system-token.service - Store a System Token in an EFI Variable was skipped because of a failed condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f).
  1802. Apr 20 15:26:51 dom0 systemd[1]: systemd-firstboot.service - First Boot Wizard was skipped because of a failed condition check (ConditionFirstBoot=yes).
  1803. Apr 20 15:26:51 dom0 systemd[1]: first-boot-complete.target - First Boot Complete was skipped because of a failed condition check (ConditionFirstBoot=yes).
  1804. Apr 20 15:26:51 dom0 systemd[1]: systemd-hwdb-update.service - Rebuild Hardware Database was skipped because of a failed condition check (ConditionNeedsUpdate=/etc).
  1805. Apr 20 15:26:51 dom0 systemd[1]: systemd-journal-catalog-update.service - Rebuild Journal Catalog was skipped because of a failed condition check (ConditionNeedsUpdate=/var).
  1806. Apr 20 15:26:51 dom0 systemd[1]: systemd-machine-id-commit.service - Commit a transient machine-id on disk was skipped because of a failed condition check (ConditionPathIsMountPoint=/etc/machine-id).
  1807. Apr 20 15:26:51 dom0 systemd[1]: systemd-pstore.service - Platform Persistent Storage Archival was skipped because of a failed condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore).
  1808. Apr 20 15:26:51 dom0 systemd[1]: systemd-sysusers.service - Create System Users was skipped because of a failed condition check (ConditionNeedsUpdate=/etc).
  1809. Apr 20 15:26:51 dom0 systemd[1]: systemd-update-done.service - Update is Completed was skipped because all trigger condition checks failed.
  1810. Apr 20 15:26:51 dom0 systemd[1]: Starting systemd-update-utmp.service - Record System Boot/Shutdown in UTMP...
  1811. Apr 20 15:26:51 dom0 audit: BPF prog-id=52 op=LOAD
  1812. Apr 20 15:26:51 dom0 audit: BPF prog-id=53 op=LOAD
  1813. Apr 20 15:26:51 dom0 audit: BPF prog-id=54 op=LOAD
  1814. Apr 20 15:26:51 dom0 audit: BPF prog-id=28 op=UNLOAD
  1815. Apr 20 15:26:51 dom0 audit: BPF prog-id=29 op=UNLOAD
  1816. Apr 20 15:26:51 dom0 systemd[1]: Starting usbguard.service - USBGuard daemon...
  1817. Apr 20 15:26:51 dom0 systemd[1]: modprobe@dm_mod.service: Deactivated successfully.
  1818. Apr 20 15:26:51 dom0 systemd[1]: Finished modprobe@dm_mod.service - Load Kernel Module dm_mod.
  1819. Apr 20 15:26:51 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1820. Apr 20 15:26:51 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1821. Apr 20 15:26:51 dom0 systemd[1]: [email protected]: Deactivated successfully.
  1822. Apr 20 15:26:51 dom0 systemd[1]: Finished [email protected] - Load Kernel Module loop.
  1823. Apr 20 15:26:51 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1824. Apr 20 15:26:51 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1825. Apr 20 15:26:51 dom0 audit[2851]: SYSTEM_BOOT pid=2851 uid=0 auid=4294967295 ses=4294967295 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success'
  1826. Apr 20 15:26:52 dom0 systemd[1]: Created slice system-qubes\x2dinput\x2dsender\x2dmouse.slice - Slice /system/qubes-input-sender-mouse.
  1827. Apr 20 15:26:52 dom0 systemd[1]: systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch was skipped because of a failed condition check (ConditionPathExists=!/run/plymouth/pid).
  1828. Apr 20 15:26:52 dom0 systemd[1]: dev-hugepages.mount - Huge Pages File System was skipped because of a failed condition check (ConditionPathExists=/sys/kernel/mm/hugepages).
  1829. Apr 20 15:26:52 dom0 systemd[1]: ldconfig.service - Rebuild Dynamic Linker Cache was skipped because all trigger condition checks failed.
  1830. Apr 20 15:26:52 dom0 systemd[1]: Starting modprobe@dm_mod.service - Load Kernel Module dm_mod...
  1831. Apr 20 15:26:52 dom0 systemd[1]: Starting [email protected] - Load Kernel Module loop...
  1832. Apr 20 15:26:52 dom0 systemd[1]: systemd-binfmt.service - Set Up Additional Binary Formats was skipped because all trigger condition checks failed.
  1833. Apr 20 15:26:52 dom0 systemd[1]: systemd-boot-system-token.service - Store a System Token in an EFI Variable was skipped because of a failed condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f).
  1834. Apr 20 15:26:52 dom0 systemd[1]: systemd-firstboot.service - First Boot Wizard was skipped because of a failed condition check (ConditionFirstBoot=yes).
  1835. Apr 20 15:26:52 dom0 systemd[1]: first-boot-complete.target - First Boot Complete was skipped because of a failed condition check (ConditionFirstBoot=yes).
  1836. Apr 20 15:26:52 dom0 systemd[1]: systemd-hwdb-update.service - Rebuild Hardware Database was skipped because of a failed condition check (ConditionNeedsUpdate=/etc).
  1837. Apr 20 15:26:52 dom0 systemd[1]: systemd-journal-catalog-update.service - Rebuild Journal Catalog was skipped because of a failed condition check (ConditionNeedsUpdate=/var).
  1838. Apr 20 15:26:52 dom0 systemd[1]: systemd-machine-id-commit.service - Commit a transient machine-id on disk was skipped because of a failed condition check (ConditionPathIsMountPoint=/etc/machine-id).
  1839. Apr 20 15:26:52 dom0 systemd[1]: systemd-pstore.service - Platform Persistent Storage Archival was skipped because of a failed condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore).
  1840. Apr 20 15:26:52 dom0 systemd[1]: systemd-sysusers.service - Create System Users was skipped because of a failed condition check (ConditionNeedsUpdate=/etc).
  1841. Apr 20 15:26:52 dom0 systemd[1]: systemd-update-done.service - Update is Completed was skipped because all trigger condition checks failed.
  1842. Apr 20 15:26:52 dom0 systemd[1]: Finished systemd-update-utmp.service - Record System Boot/Shutdown in UTMP.
  1843. Apr 20 15:26:52 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1844. Apr 20 15:26:52 dom0 systemd[1]: modprobe@dm_mod.service: Deactivated successfully.
  1845. Apr 20 15:26:52 dom0 systemd[1]: Finished modprobe@dm_mod.service - Load Kernel Module dm_mod.
  1846. Apr 20 15:26:52 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1847. Apr 20 15:26:52 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1848. Apr 20 15:26:52 dom0 systemd[1]: [email protected]: Deactivated successfully.
  1849. Apr 20 15:26:52 dom0 systemd[1]: Finished [email protected] - Load Kernel Module loop.
  1850. Apr 20 15:26:52 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1851. Apr 20 15:26:52 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1852. Apr 20 15:26:52 dom0 systemd[1]: systemd-repart.service - Repartition Root Disk was skipped because all trigger condition checks failed.
  1853. Apr 20 15:26:52 dom0 kernel: input: HDA Intel PCH HDMI/DP,pcm=3 as /devices/pci0000:00/0000:00:1f.3/sound/card0/input20
  1854. Apr 20 15:26:52 dom0 kernel: input: HDA Intel PCH HDMI/DP,pcm=7 as /devices/pci0000:00/0000:00:1f.3/sound/card0/input21
  1855. Apr 20 15:26:52 dom0 kernel: input: HDA Intel PCH HDMI/DP,pcm=8 as /devices/pci0000:00/0000:00:1f.3/sound/card0/input22
  1856. Apr 20 15:26:52 dom0 kernel: input: HDA Intel PCH HDMI/DP,pcm=9 as /devices/pci0000:00/0000:00:1f.3/sound/card0/input23
  1857. Apr 20 15:26:52 dom0 usbguard-daemon[2856]: [1713644812.018] (W) PERMISSIONS CHECK ON POLICY FILE ARE TURNED OFF!
  1858. Apr 20 15:26:52 dom0 systemd[1]: Started usbguard.service - USBGuard daemon.
  1859. Apr 20 15:26:52 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=usbguard comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1860. Apr 20 15:26:52 dom0 systemd[1]: Started systemd-ask-password-wall.path - Forward Password Requests to Wall Directory Watch.
  1861. Apr 20 15:26:52 dom0 systemd[1]: Reached target cryptsetup.target - Local Encrypted Volumes.
  1862. Apr 20 15:26:52 dom0 systemd[1]: Reached target paths.target - Path Units.
  1863. Apr 20 15:26:52 dom0 systemd[1]: Reached target sysinit.target - System Initialization.
  1864. Apr 20 15:26:52 dom0 systemd[1]: Started fstrim.timer - Discard unused blocks once a week.
  1865. Apr 20 15:26:52 dom0 systemd[1]: Started logrotate.timer - Daily rotation of log files.
  1866. Apr 20 15:26:52 dom0 systemd[1]: Started systemd-tmpfiles-clean.timer - Daily Cleanup of Temporary Directories.
  1867. Apr 20 15:26:52 dom0 systemd[1]: Reached target timers.target - Timer Units.
  1868. Apr 20 15:26:52 dom0 systemd[1]: Listening on dbus.socket - D-Bus System Message Bus Socket.
  1869. Apr 20 15:26:52 dom0 systemd[1]: Listening on libvirtd.socket - Libvirt local socket.
  1870. Apr 20 15:26:52 dom0 systemd[1]: Listening on libvirtd-admin.socket - Libvirt admin socket.
  1871. Apr 20 15:26:52 dom0 systemd[1]: Listening on libvirtd-ro.socket - Libvirt local read-only socket.
  1872. Apr 20 15:26:52 dom0 systemd[1]: Listening on virtlockd.socket - Virtual machine lock manager socket.
  1873. Apr 20 15:26:52 dom0 systemd[1]: Listening on virtlogd.socket - Virtual machine log manager socket.
  1874. Apr 20 15:26:52 dom0 systemd[1]: Reached target sockets.target - Socket Units.
  1875. Apr 20 15:26:52 dom0 audit: BPF prog-id=55 op=LOAD
  1876. Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:14.0/usb1" device_rule=616C6C6F7720696420316436623A30303032206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362312220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1877. Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1" target="allow" device_rule=616C6C6F7720696420316436623A30303032206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362312220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1878. Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:14.0/usb2" device_rule=616C6C6F7720696420316436623A30303033206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362322220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1879. Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb2" target="allow" device_rule=616C6C6F7720696420316436623A30303033206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362322220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1880. Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-1" device_rule=616C6C6F7720696420313734633A32303734206E616D65202241534D3130377822207669612D706F72742022312D312220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1881. Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-1" target="allow" device_rule=616C6C6F7720696420313734633A32303734206E616D65202241534D3130377822207669612D706F72742022312D312220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1882. Apr 20 15:26:52 dom0 systemd[1]: Starting dbus-broker.service - D-Bus System Message Bus...
  1883. Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-2" device_rule=616C6C6F7720696420306264613A35343230206E616D652022342D506F72742055534220322E302048756222207669612D706F72742022312D322220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1884. Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-2" target="allow" device_rule=616C6C6F7720696420306264613A35343230206E616D652022342D506F72742055534220322E302048756222207669612D706F72742022312D322220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1885. Apr 20 15:26:52 dom0 systemd[1]: rpmdb-migrate.service - RPM database migration to /usr was skipped because of a failed condition check (ConditionPathExists=/var/lib/rpm/.migratedb).
  1886. Apr 20 15:26:52 dom0 systemd[1]: rpmdb-rebuild.service - RPM database rebuild was skipped because of a failed condition check (ConditionPathExists=/usr/lib/sysimage/rpm/.rebuilddb).
  1887. Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-4" device_rule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exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1888. Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-4" target="block" device_rule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exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1889. Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-5" device_rule=616C6C6F7720696420313734633A32303734206E616D65202241534D3130377822207669612D706F72742022312D352220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1890. Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-5" target="allow" device_rule=616C6C6F7720696420313734633A32303734206E616D65202241534D3130377822207669612D706F72742022312D352220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1891. Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:14.0/usb2/2-1" device_rule=616C6C6F7720696420313734633A33303734206E616D65202241534D3130377822207669612D706F72742022322D312220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1892. Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb2/2-1" target="allow" device_rule=616C6C6F7720696420313734633A33303734206E616D65202241534D3130377822207669612D706F72742022322D312220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1893. Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:14.0/usb2/2-2" device_rule=616C6C6F7720696420306264613A30343230206E616D652022342D506F72742055534220332E302048756222207669612D706F72742022322D322220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1894. Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb2/2-2" target="allow" device_rule=616C6C6F7720696420306264613A30343230206E616D652022342D506F72742055534220332E302048756222207669612D706F72742022322D322220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1895. Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:14.0/usb2/2-4" device_rule=616C6C6F7720696420313734633A33303734206E616D65202241534D3130377822207669612D706F72742022322D342220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1896. Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb2/2-4" target="allow" device_rule=616C6C6F7720696420313734633A33303734206E616D65202241534D3130377822207669612D706F72742022322D342220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1897. Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-10" device_rule=616C6C6F7720696420303565333A30363038206E616D652022555342322E302048756222207669612D706F72742022312D31302220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1898. Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-10" target="allow" device_rule=616C6C6F7720696420303565333A30363038206E616D652022555342322E302048756222207669612D706F72742022312D31302220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1899. Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-11" device_rule=626C6F636B20696420303431363A37333935206E616D6520224C69616E4C692D47415F49492D4C43445F76312E3322207669612D706F72742022312D31312220776974682D696E74657266616365207B2066663A30303A30302030333A30303A3030207D20776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1900. Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-11" target="block" device_rule=626C6F636B20696420303431363A37333935206E616D6520224C69616E4C692D47415F49492D4C43445F76312E3322207669612D706F72742022312D31312220776974682D696E74657266616365207B2066663A30303A30302030333A30303A3030207D20776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1901. Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-13" device_rule=626C6F636B20696420306230353A31396166206E616D65202241555241204C454420436F6E74726F6C6C657222207669612D706F72742022312D31332220776974682D696E74657266616365207B2066663A66663A66662030333A30303A3030207D20776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1902. Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-13" target="block" device_rule=626C6F636B20696420306230353A31396166206E616D65202241555241204C454420436F6E74726F6C6C657222207669612D706F72742022312D31332220776974682D696E74657266616365207B2066663A66663A66662030333A30303A3030207D20776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1903. Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-14" device_rule=626C6F636B20696420383038373A30303332206E616D65202222207669612D706F72742022312D31342220776974682D696E74657266616365207B2065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A3031207D20776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1904. Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-14" target="block" device_rule=626C6F636B20696420383038373A30303332206E616D65202222207669612D706F72742022312D31342220776974682D696E74657266616365207B2065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A3031207D20776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1905. Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-2/1-2.3" device_rule=616C6C6F7720696420303436643A63353339206E616D65202255534220526563656976657222207669612D706F72742022312D322E332220776974682D696E74657266616365207B2030333A30313A30312030333A30313A30322030333A30303A3030207D20776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1906. Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-2/1-2.3" target="allow" device_rule=616C6C6F7720696420303436643A63353339206E616D65202255534220526563656976657222207669612D706F72742022312D322E332220776974682D696E74657266616365207B2030333A30313A30312030333A30313A30322030333A30303A3030207D20776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1907. Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-2/1-2.4" device_rule=616C6C6F7720696420303436643A63353437206E616D65202255534220526563656976657222207669612D706F72742022312D322E342220776974682D696E74657266616365207B2030333A30313A30322030333A30313A30312030333A30303A3030207D20776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1908. Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-2/1-2.4" target="allow" device_rule=616C6C6F7720696420303436643A63353437206E616D65202255534220526563656976657222207669612D706F72742022312D322E342220776974682D696E74657266616365207B2030333A30313A30322030333A30313A30312030333A30303A3030207D20776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1909. Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-5/1-5.1" device_rule=616C6C6F7720696420303565333A30363130206E616D652022555342322E312048756222207669612D706F72742022312D352E312220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1910. Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-5/1-5.1" target="allow" device_rule=616C6C6F7720696420303565333A30363130206E616D652022555342322E312048756222207669612D706F72742022312D352E312220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1911. Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-5/1-5.3" device_rule=626C6F636B20696420323730383A30303031206E616D65202241756469656E74206944323222207669612D706F72742022312D352E332220776974682D696E74657266616365207B2030313A30313A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302066653A30313A30312030313A30313A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302066653A30313A3031207D20776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1912. Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-5/1-5.3" target="block" device_rule=626C6F636B20696420323730383A30303031206E616D65202241756469656E74206944323222207669612D706F72742022312D352E332220776974682D696E74657266616365207B2030313A30313A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302066653A30313A30312030313A30313A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302066653A30313A3031207D20776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1913. Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:14.0/usb2/2-1/2-1.2" device_rule=626C6F636B20696420313366653A35353030206E616D65202250617472696F74204D656D6F727922207669612D706F72742022322D312E322220776974682D696E746572666163652030383A30363A353020776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1914. Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb2/2-1/2-1.2" target="block" device_rule=626C6F636B20696420313366653A35353030206E616D65202250617472696F74204D656D6F727922207669612D706F72742022322D312E322220776974682D696E746572666163652030383A30363A353020776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1915. Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:14.0/usb2/2-4/2-4.1" device_rule=616C6C6F7720696420303565333A30363230206E616D652022555342332E322048756222207669612D706F72742022322D342E312220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1916. Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb2/2-4/2-4.1" target="allow" device_rule=616C6C6F7720696420303565333A30363230206E616D652022555342332E322048756222207669612D706F72742022322D342E312220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1917. Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-10/1-10.1" device_rule=616C6C6F7720696420316134303A30313031206E616D65202255534220322E302048756222207669612D706F72742022312D31302E312220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1918. Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-10/1-10.1" target="allow" device_rule=616C6C6F7720696420316134303A30313031206E616D65202255534220322E302048756222207669612D706F72742022312D31302E312220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1919. Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-10/1-10.2" device_rule=616C6C6F7720696420316134303A30313031206E616D65202255534220322E302048756222207669612D706F72742022312D31302E322220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1920. Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-10/1-10.2" target="allow" device_rule=616C6C6F7720696420316134303A30313031206E616D65202255534220322E302048756222207669612D706F72742022312D31302E322220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1921. Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-5/1-5.1/1-5.1.1" device_rule=616C6C6F7720696420303436643A63353361206E616D65202255534220526563656976657222207669612D706F72742022312D352E312E312220776974682D696E74657266616365207B2030333A30313A30312030333A30313A30322030333A30303A3030207D20776974682D636F6E6E6563742D747970652022756E6B6E6F776E22 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1922. Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-5/1-5.1/1-5.1.1" target="allow" device_rule=616C6C6F7720696420303436643A63353361206E616D65202255534220526563656976657222207669612D706F72742022312D352E312E312220776974682D696E74657266616365207B2030333A30313A30312030333A30313A30322030333A30303A3030207D20776974682D636F6E6E6563742D747970652022756E6B6E6F776E22 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1923. Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-10/1-10.1/1-10.1.2" device_rule=626C6F636B20696420306366323A61323030206E616D6520224C69616E4C692D537472696D657220506C75732D312E3522207669612D706F72742022312D31302E312E322220776974682D696E74657266616365207B2066663A66663A66662030333A30303A3030207D20776974682D636F6E6E6563742D747970652022756E6B6E6F776E22 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1924. Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-10/1-10.1/1-10.1.2" target="block" device_rule=626C6F636B20696420306366323A61323030206E616D6520224C69616E4C692D537472696D657220506C75732D312E3522207669612D706F72742022312D31302E312E322220776974682D696E74657266616365207B2066663A66663A66662030333A30303A3030207D20776974682D636F6E6E6563742D747970652022756E6B6E6F776E22 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1925. Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-10/1-10.1/1-10.1.4" device_rule=626C6F636B20696420306366323A61313032206E616D6520224C69616E4C692D534C2D696E66696E6974792D76312E3422207669612D706F72742022312D31302E312E342220776974682D696E74657266616365207B2066663A66663A66662030333A30303A3030207D20776974682D636F6E6E6563742D747970652022756E6B6E6F776E22 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1926. Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-10/1-10.1/1-10.1.4" target="block" device_rule=626C6F636B20696420306366323A61313032206E616D6520224C69616E4C692D534C2D696E66696E6974792D76312E3422207669612D706F72742022312D31302E312E342220776974682D696E74657266616365207B2066663A66663A66662030333A30303A3030207D20776974682D636F6E6E6563742D747970652022756E6B6E6F776E22 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  1927. Apr 20 15:26:52 dom0 dbus-broker-launch[2864]: Looking up NSS user entry for 'geoclue'...
  1928. Apr 20 15:26:52 dom0 audit: BPF prog-id=56 op=LOAD
  1929. Apr 20 15:26:52 dom0 audit: BPF prog-id=57 op=LOAD
  1930. Apr 20 15:26:52 dom0 audit: BPF prog-id=58 op=LOAD
  1931. Apr 20 15:26:52 dom0 systemd[1]: Starting systemd-userdbd.service - User Database Manager...
  1932. Apr 20 15:26:52 dom0 lvm[2499]: Monitoring thin pool qubes_dom0-vm--pool-tpool.
  1933. Apr 20 15:26:52 dom0 systemd[1]: Started systemd-userdbd.service - User Database Manager.
  1934. Apr 20 15:26:52 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1935. Apr 20 15:26:52 dom0 dbus-broker-launch[2864]: NSS returned no entry for 'geoclue'
  1936. Apr 20 15:26:52 dom0 dbus-broker-launch[2864]: Invalid user-name in /etc/dbus-1/system.d/net.hadess.SensorProxy.conf +14: user="geoclue"
  1937. Apr 20 15:26:52 dom0 systemd[1]: Started dbus-broker.service - D-Bus System Message Bus.
  1938. Apr 20 15:26:52 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dbus-broker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1939. Apr 20 15:26:52 dom0 systemd[1]: Reached target basic.target - Basic System.
  1940. Apr 20 15:26:52 dom0 dbus-broker-launch[2864]: Ready
  1941. Apr 20 15:26:52 dom0 systemd[1]: Starting dracut-shutdown.service - Restore /run/initramfs on shutdown...
  1942. Apr 20 15:26:52 dom0 systemd[1]: Starting qubes-db-dom0.service - Qubes DB agent...
  1943. Apr 20 15:26:52 dom0 systemd[1]: Started [email protected] - Qubes input proxy sender (keyboard, fallback to mouse).
  1944. Apr 20 15:26:52 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard-mouse@event5 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1945. Apr 20 15:26:52 dom0 systemd[1]: Started [email protected] - Qubes input proxy sender (keyboard, fallback to mouse).
  1946. Apr 20 15:26:52 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard-mouse@event6 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1947. Apr 20 15:26:52 dom0 systemd[1]: Started [email protected] - Qubes input proxy sender (keyboard).
  1948. Apr 20 15:26:52 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event7 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1949. Apr 20 15:26:52 dom0 qubes-input-sender[2891]: Device /dev/input/event5 is already in dom0
  1950. Apr 20 15:26:52 dom0 systemd[1]: Started [email protected] - Qubes input proxy sender (keyboard).
  1951. Apr 20 15:26:52 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event8 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1952. Apr 20 15:26:52 dom0 qubes-input-sender[2892]: Device /dev/input/event6 is already in dom0
  1953. Apr 20 15:26:52 dom0 systemd[1]: Started [email protected] - Qubes input proxy sender (mouse).
  1954. Apr 20 15:26:52 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-mouse@event4 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1955. Apr 20 15:26:52 dom0 qubes-input-sender[2893]: Device /dev/input/event7 is already in dom0
  1956. Apr 20 15:26:52 dom0 systemd[1]: Starting qubes-qmemman.service - Qubes memory management daemon...
  1957. Apr 20 15:26:52 dom0 qubes-input-sender[2895]: Device /dev/input/event8 is already in dom0
  1958. Apr 20 15:26:52 dom0 qubes-input-sender[2896]: Device /dev/input/event4 is already in dom0
  1959. Apr 20 15:26:52 dom0 audit: BPF prog-id=59 op=LOAD
  1960. Apr 20 15:26:52 dom0 audit: BPF prog-id=60 op=LOAD
  1961. Apr 20 15:26:52 dom0 audit: BPF prog-id=61 op=LOAD
  1962. Apr 20 15:26:52 dom0 systemd[1]: Starting systemd-logind.service - User Login Management...
  1963. Apr 20 15:26:52 dom0 systemd[1]: Starting udisks2.service - Disk Manager...
  1964. Apr 20 15:26:52 dom0 audit: BPF prog-id=62 op=LOAD
  1965. Apr 20 15:26:52 dom0 audit: BPF prog-id=63 op=LOAD
  1966. Apr 20 15:26:52 dom0 systemd[1]: Starting upower.service - Daemon for power management...
  1967. Apr 20 15:26:52 dom0 systemd[1]: Starting xenstored.service - The Xen xenstore...
  1968. Apr 20 15:26:52 dom0 systemd[1]: Started qubes-db-dom0.service - Qubes DB agent.
  1969. Apr 20 15:26:52 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-db-dom0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1970. Apr 20 15:26:52 dom0 systemd[1]: Finished dracut-shutdown.service - Restore /run/initramfs on shutdown.
  1971. Apr 20 15:26:52 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dracut-shutdown comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1972. Apr 20 15:26:52 dom0 systemd[1]: [email protected]: Deactivated successfully.
  1973. Apr 20 15:26:52 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard-mouse@event5 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1974. Apr 20 15:26:52 dom0 systemd[1]: [email protected]: Deactivated successfully.
  1975. Apr 20 15:26:52 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard-mouse@event6 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1976. Apr 20 15:26:52 dom0 systemd[1]: [email protected]: Deactivated successfully.
  1977. Apr 20 15:26:52 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event7 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1978. Apr 20 15:26:52 dom0 systemd[1]: [email protected]: Deactivated successfully.
  1979. Apr 20 15:26:52 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event8 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1980. Apr 20 15:26:52 dom0 systemd[1]: [email protected]: Deactivated successfully.
  1981. Apr 20 15:26:52 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-mouse@event4 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1982. Apr 20 15:26:52 dom0 udisksd[2906]: udisks daemon version 2.9.4 starting
  1983. Apr 20 15:26:52 dom0 systemd[1]: alsa-restore.service - Save/Restore Sound Card State was skipped because of a failed condition check (ConditionPathExists=!/etc/alsa/state-daemon.conf).
  1984. Apr 20 15:26:52 dom0 systemd[1]: Started alsa-state.service - Manage Sound Card State (restore and store).
  1985. Apr 20 15:26:52 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=alsa-state comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1986. Apr 20 15:26:52 dom0 systemd[1]: Reached target sound.target - Sound Card.
  1987. Apr 20 15:26:52 dom0 kernel: intel_powerclamp: No package C-state available
  1988. Apr 20 15:26:52 dom0 alsactl[2920]: alsactl 1.2.9 daemon started
  1989. Apr 20 15:26:52 dom0 systemd[1]: Starting [email protected] - Load Kernel Module drm...
  1990. Apr 20 15:26:52 dom0 systemd[1]: [email protected]: Deactivated successfully.
  1991. Apr 20 15:26:52 dom0 systemd[1]: Finished [email protected] - Load Kernel Module drm.
  1992. Apr 20 15:26:52 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1993. Apr 20 15:26:52 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1994. Apr 20 15:26:52 dom0 xenstored[2933]: Checking store ...
  1995. Apr 20 15:26:52 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=xenstored comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  1996. Apr 20 15:26:52 dom0 xenstored[2933]: Checking store complete.
  1997. Apr 20 15:26:52 dom0 systemd[1]: Started xenstored.service - The Xen xenstore.
  1998. Apr 20 15:26:52 dom0 systemd[1]: Starting xen-init-dom0.service - xen-init-dom0, initialise Dom0 configuration (xenstore nodes, JSON configuration stub)...
  1999. Apr 20 15:26:52 dom0 systemd[1]: Starting xenconsoled.service - Xenconsoled - handles logging from guest consoles and hypervisor...
  2000. Apr 20 15:26:52 dom0 systemd-logind[2904]: New seat seat0.
  2001. Apr 20 15:26:52 dom0 launch-xenstore[2916]: Starting /usr/sbin/xenstored...
  2002. Apr 20 15:26:52 dom0 systemd-logind[2904]: Watching system buttons on /dev/input/event2 (Power Button)
  2003. Apr 20 15:26:52 dom0 systemd-logind[2904]: Watching system buttons on /dev/input/event1 (Power Button)
  2004. Apr 20 15:26:52 dom0 systemd-logind[2904]: Watching system buttons on /dev/input/event0 (Sleep Button)
  2005. Apr 20 15:26:52 dom0 systemd-logind[2904]: Watching system buttons on /dev/input/event5 (Logitech G903)
  2006. Apr 20 15:26:52 dom0 systemd-logind[2904]: Watching system buttons on /dev/input/event8 (Logitech USB Receiver Keyboard)
  2007. Apr 20 15:26:52 dom0 systemd-logind[2904]: Watching system buttons on /dev/input/event7 (Logitech Candy)
  2008. Apr 20 15:26:52 dom0 systemd-logind[2904]: Watching system buttons on /dev/input/event6 (Logitech G502 X PLUS)
  2009. Apr 20 15:26:52 dom0 systemd[1]: Starting polkit.service - Authorization Manager...
  2010. Apr 20 15:26:52 dom0 systemd[1]: Started xenconsoled.service - Xenconsoled - handles logging from guest consoles and hypervisor.
  2011. Apr 20 15:26:52 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=xenconsoled comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  2012. Apr 20 15:26:52 dom0 systemd[1]: Started systemd-logind.service - User Login Management.
  2013. Apr 20 15:26:52 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-logind comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  2014. Apr 20 15:26:52 dom0 systemd[1]: Starting libvirtd.service - Virtualization daemon...
  2015. Apr 20 15:26:52 dom0 xen-init-dom0[2940]: Done setting up Dom0
  2016. Apr 20 15:26:52 dom0 systemd[1]: Finished xen-init-dom0.service - xen-init-dom0, initialise Dom0 configuration (xenstore nodes, JSON configuration stub).
  2017. Apr 20 15:26:52 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=xen-init-dom0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  2018. Apr 20 15:26:52 dom0 polkitd[2947]: Started polkitd version 121
  2019. Apr 20 15:26:52 dom0 systemd[1]: Started libvirtd.service - Virtualization daemon.
  2020. Apr 20 15:26:52 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=libvirtd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  2021. Apr 20 15:26:52 dom0 polkitd[2947]: Loading rules from directory /etc/polkit-1/rules.d
  2022. Apr 20 15:26:52 dom0 polkitd[2947]: Loading rules from directory /usr/share/polkit-1/rules.d
  2023. Apr 20 15:26:52 dom0 polkitd[2947]: Finished loading, compiling and executing 9 rules
  2024. Apr 20 15:26:52 dom0 systemd[1]: Started polkit.service - Authorization Manager.
  2025. Apr 20 15:26:52 dom0 polkitd[2947]: Acquired the name org.freedesktop.PolicyKit1 on the system bus
  2026. Apr 20 15:26:52 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=polkit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  2027. Apr 20 15:26:52 dom0 systemd[1]: Started upower.service - Daemon for power management.
  2028. Apr 20 15:26:52 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=upower comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  2029. Apr 20 15:26:52 dom0 systemd[1]: Started udisks2.service - Disk Manager.
  2030. Apr 20 15:26:52 dom0 udisksd[2906]: Acquired the name org.freedesktop.UDisks2 on the system message bus
  2031. Apr 20 15:26:52 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=udisks2 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  2032. Apr 20 15:26:52 dom0 kernel: intel_powerclamp: No package C-state available
  2033. Apr 20 15:26:52 dom0 systemd[1]: Started qubes-qmemman.service - Qubes memory management daemon.
  2034. Apr 20 15:26:52 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-qmemman comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  2035. Apr 20 15:26:53 dom0 lvm[1800]: 49 logical volume(s) in volume group "qubes_dom0" now active
  2036. Apr 20 15:26:53 dom0 systemd[1]: Finished lvm2-pvscan@253:0.service - LVM event activation on device 253:0.
  2037. Apr 20 15:26:53 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=lvm2-pvscan@253:0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  2038. Apr 20 15:26:53 dom0 systemd[1]: Starting qubesd.service - Qubes OS daemon...
  2039. Apr 20 15:26:53 dom0 systemd[1]: Started qubesd.service - Qubes OS daemon.
  2040. Apr 20 15:26:53 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubesd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  2041. Apr 20 15:26:53 dom0 systemd[1]: Starting qubes-core.service - Qubes Dom0 startup setup...
  2042. Apr 20 15:26:53 dom0 systemd[1]: Started qubes-qrexec-policy-daemon.service - Qubes remote exec policy daemon.
  2043. Apr 20 15:26:53 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-qrexec-policy-daemon comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  2044. Apr 20 15:26:53 dom0 startup-misc.sh[3203]: libxl: error: libxl_sched.c:232:sched_credit_domain_set: Getting domain sched credit: Invalid argument
  2045. Apr 20 15:26:53 dom0 startup-misc.sh[3203]: libxl_domain_sched_params_set failed.
  2046. Apr 20 15:26:53 dom0 qrexec-policy-daemon[3179]: warning: !compat-4.0 directive in file /etc/qubes/policy.d/35-compat.policy line 16 is transitional and will be deprecated
  2047. Apr 20 15:26:53 dom0 systemd[1]: Finished qubes-core.service - Qubes Dom0 startup setup.
  2048. Apr 20 15:26:53 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-core comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  2049. Apr 20 15:26:53 dom0 systemd[1]: Started qubes-meminfo-writer-dom0.service - Qubes memory information reporter.
  2050. Apr 20 15:26:53 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-meminfo-writer-dom0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  2051. Apr 20 15:26:53 dom0 systemd[1]: Starting [email protected] - Start Qubes VM sys-audio...
  2052. Apr 20 15:26:53 dom0 systemd[1]: Starting [email protected] - Start Qubes VM sys-firewall...
  2053. Apr 20 15:26:53 dom0 systemd[1]: Starting [email protected] - Start Qubes VM sys-net...
  2054. Apr 20 15:26:53 dom0 systemd[1]: Starting [email protected] - Start Qubes VM sys-usb...
  2055. Apr 20 15:26:53 dom0 systemd[1]: Starting [email protected] - Start Qubes VM sys-whonix...
  2056. Apr 20 15:26:53 dom0 qubesd[3175]: vm.sys-whonix: Starting sys-whonix
  2057. Apr 20 15:26:53 dom0 qubesd[3175]: vm.sys-firewall: Starting sys-firewall
  2058. Apr 20 15:26:53 dom0 qubesd[3175]: vm.sys-net: Starting sys-net
  2059. Apr 20 15:26:53 dom0 qubesd[3175]: vm.sys-usb: Starting sys-usb
  2060. Apr 20 15:26:53 dom0 kernel: xhci_hcd 0000:00:14.0: remove, state 1
  2061. Apr 20 15:26:53 dom0 kernel: usb usb2: USB disconnect, device number 1
  2062. Apr 20 15:26:53 dom0 kernel: usb 2-1: USB disconnect, device number 2
  2063. Apr 20 15:26:53 dom0 kernel: usb 2-1.2: USB disconnect, device number 4
  2064. Apr 20 15:26:53 dom0 kernel: usb 2-2: USB disconnect, device number 3
  2065. Apr 20 15:26:53 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:14.0/usb2/2-1/2-1.2" device_rule=626C6F636B20696420313366653A35353030206E616D65202250617472696F74204D656D6F727922207669612D706F72742022322D312E322220776974682D696E746572666163652030383A30363A353020776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  2066. Apr 20 15:26:53 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:14.0/usb2/2-1" device_rule=616C6C6F7720696420313734633A33303734206E616D65202241534D3130377822207669612D706F72742022322D312220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  2067. Apr 20 15:26:53 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:14.0/usb2/2-2" device_rule=616C6C6F7720696420306264613A30343230206E616D652022342D506F72742055534220332E302048756222207669612D706F72742022322D322220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  2068. Apr 20 15:26:53 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:14.0/usb2/2-4/2-4.1" device_rule=616C6C6F7720696420303565333A30363230206E616D652022555342332E322048756222207669612D706F72742022322D342E312220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  2069. Apr 20 15:26:53 dom0 kernel: usb 2-4: USB disconnect, device number 5
  2070. Apr 20 15:26:53 dom0 kernel: usb 2-4.1: USB disconnect, device number 6
  2071. Apr 20 15:26:53 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:14.0/usb2/2-4" device_rule=616C6C6F7720696420313734633A33303734206E616D65202241534D3130377822207669612D706F72742022322D342220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  2072. Apr 20 15:26:53 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:14.0/usb2" device_rule=616C6C6F7720696420316436623A30303033206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362322220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  2073. Apr 20 15:26:53 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-1" device_rule=616C6C6F7720696420313734633A32303734206E616D65202241534D3130377822207669612D706F72742022312D312220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  2074. Apr 20 15:26:53 dom0 kernel: xhci_hcd 0000:00:14.0: USB bus 2 deregistered
  2075. Apr 20 15:26:53 dom0 kernel: xhci_hcd 0000:00:14.0: remove, state 1
  2076. Apr 20 15:26:53 dom0 kernel: usb usb1: USB disconnect, device number 1
  2077. Apr 20 15:26:53 dom0 kernel: usb 1-1: USB disconnect, device number 2
  2078. Apr 20 15:26:53 dom0 kernel: usb 1-2: USB disconnect, device number 3
  2079. Apr 20 15:26:53 dom0 kernel: usb 1-2.3: USB disconnect, device number 5
  2080. Apr 20 15:26:53 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-2/1-2.3" device_rule=616C6C6F7720696420303436643A63353339206E616D65202255534220526563656976657222207669612D706F72742022312D322E332220776974682D696E74657266616365207B2030333A30313A30312030333A30313A30322030333A30303A3030207D20776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  2081. Apr 20 15:26:53 dom0 kernel: usb 1-2.4: USB disconnect, device number 6
  2082. Apr 20 15:26:53 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-2/1-2.4" device_rule=616C6C6F7720696420303436643A63353437206E616D65202255534220526563656976657222207669612D706F72742022312D322E342220776974682D696E74657266616365207B2030333A30313A30322030333A30313A30312030333A30303A3030207D20776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  2083. Apr 20 15:26:53 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-2" device_rule=616C6C6F7720696420306264613A35343230206E616D652022342D506F72742055534220322E302048756222207669612D706F72742022312D322220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  2084. Apr 20 15:26:53 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-4" device_rule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exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  2085. Apr 20 15:26:53 dom0 kernel: usb 1-4: USB disconnect, device number 4
  2086. Apr 20 15:26:53 dom0 kernel: usb 1-5: USB disconnect, device number 7
  2087. Apr 20 15:26:53 dom0 kernel: usb 1-5.1: USB disconnect, device number 9
  2088. Apr 20 15:26:53 dom0 kernel: usb 1-5.1.1: USB disconnect, device number 13
  2089. Apr 20 15:26:54 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-5/1-5.1/1-5.1.1" device_rule=616C6C6F7720696420303436643A63353361206E616D65202255534220526563656976657222207669612D706F72742022312D352E312E312220776974682D696E74657266616365207B2030333A30313A30312030333A30313A30322030333A30303A3030207D20776974682D636F6E6E6563742D747970652022756E6B6E6F776E22 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  2090. Apr 20 15:26:54 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-5/1-5.1" device_rule=616C6C6F7720696420303565333A30363130206E616D652022555342322E312048756222207669612D706F72742022312D352E312220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  2091. Apr 20 15:26:54 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-5/1-5.3" device_rule=626C6F636B20696420323730383A30303031206E616D65202241756469656E74206944323222207669612D706F72742022312D352E332220776974682D696E74657266616365207B2030313A30313A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302066653A30313A30312030313A30313A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302066653A30313A3031207D20776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  2092. Apr 20 15:26:54 dom0 kernel: usb 1-5.3: USB disconnect, device number 11
  2093. Apr 20 15:26:54 dom0 kernel: usb 1-10: USB disconnect, device number 8
  2094. Apr 20 15:26:54 dom0 kernel: usb 1-10.1: USB disconnect, device number 12
  2095. Apr 20 15:26:54 dom0 kernel: usb 1-10.1.2: USB disconnect, device number 16
  2096. Apr 20 15:26:54 dom0 kernel: usb 1-10.1.4: USB disconnect, device number 18
  2097. Apr 20 15:26:54 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-5" device_rule=616C6C6F7720696420313734633A32303734206E616D65202241534D3130377822207669612D706F72742022312D352220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  2098. Apr 20 15:26:54 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-10/1-10.1/1-10.1.2" device_rule=626C6F636B20696420306366323A61323030206E616D6520224C69616E4C692D537472696D657220506C75732D312E3522207669612D706F72742022312D31302E312E322220776974682D696E74657266616365207B2066663A66663A66662030333A30303A3030207D20776974682D636F6E6E6563742D747970652022756E6B6E6F776E22 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  2099. Apr 20 15:26:54 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-10/1-10.1/1-10.1.4" device_rule=626C6F636B20696420306366323A61313032206E616D6520224C69616E4C692D534C2D696E66696E6974792D76312E3422207669612D706F72742022312D31302E312E342220776974682D696E74657266616365207B2066663A66663A66662030333A30303A3030207D20776974682D636F6E6E6563742D747970652022756E6B6E6F776E22 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  2100. Apr 20 15:26:54 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-10/1-10.1" device_rule=616C6C6F7720696420316134303A30313031206E616D65202255534220322E302048756222207669612D706F72742022312D31302E312220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  2101. Apr 20 15:26:54 dom0 kernel: usb 1-10.2: USB disconnect, device number 15
  2102. Apr 20 15:26:54 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-10/1-10.2" device_rule=616C6C6F7720696420316134303A30313031206E616D65202255534220322E302048756222207669612D706F72742022312D31302E322220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  2103. Apr 20 15:26:54 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-10" device_rule=616C6C6F7720696420303565333A30363038206E616D652022555342322E302048756222207669612D706F72742022312D31302220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  2104. Apr 20 15:26:54 dom0 kernel: usb 1-11: USB disconnect, device number 10
  2105. Apr 20 15:26:54 dom0 kernel: usb 1-13: USB disconnect, device number 14
  2106. Apr 20 15:26:54 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-11" device_rule=626C6F636B20696420303431363A37333935206E616D6520224C69616E4C692D47415F49492D4C43445F76312E3322207669612D706F72742022312D31312220776974682D696E74657266616365207B2066663A30303A30302030333A30303A3030207D20776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  2107. Apr 20 15:26:54 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-13" device_rule=626C6F636B20696420306230353A31396166206E616D65202241555241204C454420436F6E74726F6C6C657222207669612D706F72742022312D31332220776974682D696E74657266616365207B2066663A66663A66662030333A30303A3030207D20776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  2108. Apr 20 15:26:54 dom0 kernel: usb 1-14: USB disconnect, device number 17
  2109. Apr 20 15:26:54 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-14" device_rule=626C6F636B20696420383038373A30303332206E616D65202222207669612D706F72742022312D31342220776974682D696E74657266616365207B2065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A3031207D20776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  2110. Apr 20 15:26:54 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:14.0/usb1" device_rule=616C6C6F7720696420316436623A30303032206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362312220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success'
  2111. Apr 20 15:26:54 dom0 kernel: xhci_hcd 0000:00:14.0: USB bus 1 deregistered
  2112. Apr 20 15:26:54 dom0 kernel: pciback 0000:00:14.0: xen_pciback: seizing device
  2113. Apr 20 15:26:54 dom0 kernel: xen: registering gsi 16 triggering 0 polarity 1
  2114. Apr 20 15:26:54 dom0 kernel: Already setup the GSI :16
  2115. Apr 20 15:26:54 dom0 lvm[2499]: No longer monitoring thin pool qubes_dom0-vm--pool-tpool.
  2116. Apr 20 15:26:54 dom0 lvm[2499]: Monitoring thin pool qubes_dom0-vm--pool-tpool.
  2117. Apr 20 15:26:54 dom0 qubesd[3175]: vm.sys-audio: Starting sys-audio
  2118. Apr 20 15:26:54 dom0 systemd[1]: Stopped target sound.target - Sound Card.
  2119. Apr 20 15:26:54 dom0 lvm[2499]: No longer monitoring thin pool qubes_dom0-vm--pool-tpool.
  2120. Apr 20 15:26:54 dom0 lvm[2499]: Monitoring thin pool qubes_dom0-vm--pool-tpool.
  2121. Apr 20 15:26:54 dom0 kernel: pciback 0000:00:1f.3: xen_pciback: seizing device
  2122. Apr 20 15:26:54 dom0 kernel: xen: registering gsi 17 triggering 0 polarity 1
  2123. Apr 20 15:26:54 dom0 kernel: Already setup the GSI :17
  2124. Apr 20 15:26:54 dom0 qubesd[3175]: vm.sys-audio: Start failed: usb device sys-usb:2-5.3 not available
  2125. Apr 20 15:26:54 dom0 qvm-start[3284]: usb device sys-usb:2-5.3 not available
  2126. Apr 20 15:26:54 dom0 systemd[1]: [email protected]: Main process exited, code=exited, status=1/FAILURE
  2127. Apr 20 15:26:54 dom0 systemd[1]: [email protected]: Failed with result 'exit-code'.
  2128. Apr 20 15:26:54 dom0 systemd[1]: Failed to start [email protected] - Start Qubes VM sys-audio.
  2129. Apr 20 15:26:54 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-vm@sys-audio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
  2130. Apr 20 15:26:54 dom0 kernel: memmap_init_zone_device initialised 32768 pages in 0ms
  2131. Apr 20 15:26:54 dom0 kernel: loop0: detected capacity change from 0 to 1045968
  2132. Apr 20 15:26:54 dom0 kernel: loop1: detected capacity change from 0 to 1045968
  2133. Apr 20 15:26:55 dom0 kernel: pciback 0000:05:00.0: xen_pciback: vpci: assign to virtual slot 0
  2134. Apr 20 15:26:55 dom0 kernel: pciback 0000:05:00.0: registering for 2
  2135. Apr 20 15:26:55 dom0 kernel: pciback 0000:06:00.0: xen_pciback: vpci: assign to virtual slot 1
  2136. Apr 20 15:26:55 dom0 kernel: pciback 0000:06:00.0: registering for 2
  2137. Apr 20 15:26:55 dom0 kernel: xen-blkback: backend/vbd/2/51712: using 1 queues, protocol 1 (x86_64-abi) persistent grants
  2138. Apr 20 15:26:55 dom0 kernel: xen-blkback: backend/vbd/2/51728: using 1 queues, protocol 1 (x86_64-abi) persistent grants
  2139. Apr 20 15:26:55 dom0 kernel: xen-blkback: backend/vbd/2/51744: using 1 queues, protocol 1 (x86_64-abi) persistent grants
  2140. Apr 20 15:26:55 dom0 kernel: xen-blkback: backend/vbd/2/51760: using 1 queues, protocol 1 (x86_64-abi) persistent grants
  2141. Apr 20 15:26:56 dom0 kernel: xen: registering gsi 16 triggering 0 polarity 1
  2142. Apr 20 15:26:56 dom0 kernel: Already setup the GSI :16
  2143. Apr 20 15:26:56 dom0 kernel: xen: registering gsi 19 triggering 0 polarity 1
  2144. Apr 20 15:26:56 dom0 kernel: Already setup the GSI :19
  2145. Apr 20 15:26:56 dom0 qubesd[3175]: vm.sys-net: Setting Qubes DB info for the VM
  2146. Apr 20 15:26:56 dom0 qubesd[3175]: vm.sys-net: Starting Qubes DB
  2147. Apr 20 15:26:56 dom0 audit[4554]: CRED_ACQ pid=4554 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
  2148. Apr 20 15:26:56 dom0 kernel: kauditd_printk_skb: 256 callbacks suppressed
  2149. Apr 20 15:26:56 dom0 kernel: audit: type=1103 audit(1713644816.225:347): pid=4554 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
  2150. Apr 20 15:26:56 dom0 runuser[4554]: pam_unix(runuser:session): session opened for user shydonnie(uid=1000) by (uid=0)
  2151. Apr 20 15:26:56 dom0 audit[4554]: USER_START pid=4554 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
  2152. Apr 20 15:26:56 dom0 kernel: audit: type=1105 audit(1713644816.226:348): pid=4554 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
  2153. Apr 20 15:26:56 dom0 runuser[4554]: pam_unix(runuser:session): session closed for user shydonnie
  2154. Apr 20 15:26:56 dom0 audit[4554]: USER_END pid=4554 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
  2155. Apr 20 15:26:56 dom0 audit[4554]: CRED_DISP pid=4554 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
  2156. Apr 20 15:26:56 dom0 kernel: audit: type=1106 audit(1713644816.231:349): pid=4554 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
  2157. Apr 20 15:26:56 dom0 kernel: audit: type=1104 audit(1713644816.231:350): pid=4554 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
  2158. Apr 20 15:26:56 dom0 qubesd[3175]: vm.sys-net: Activating the sys-net VM
  2159. Apr 20 15:26:56 dom0 audit[4564]: CRED_ACQ pid=4564 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
  2160. Apr 20 15:26:56 dom0 runuser[4564]: pam_unix(runuser:session): session opened for user shydonnie(uid=1000) by (uid=0)
  2161. Apr 20 15:26:56 dom0 kernel: audit: type=1103 audit(1713644816.238:351): pid=4564 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
  2162. Apr 20 15:26:56 dom0 kernel: audit: type=1105 audit(1713644816.238:352): pid=4564 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
  2163. Apr 20 15:26:56 dom0 audit[4564]: USER_START pid=4564 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
  2164. Apr 20 15:26:56 dom0 lvm[2499]: No longer monitoring thin pool qubes_dom0-vm--pool-tpool.
  2165. Apr 20 15:26:56 dom0 lvm[2499]: Monitoring thin pool qubes_dom0-vm--pool-tpool.
  2166. Apr 20 15:26:56 dom0 lvm[2499]: No longer monitoring thin pool qubes_dom0-vm--pool-tpool.
  2167. Apr 20 15:26:56 dom0 lvm[2499]: Monitoring thin pool qubes_dom0-vm--pool-tpool.
  2168. Apr 20 15:26:56 dom0 libvirtd[2952]: libvirt version: 8.9.0, package: 6.fc37 (Unknown, 2023-08-17-23:38:43, )
  2169. Apr 20 15:26:56 dom0 libvirtd[2952]: hostname: dom0
  2170. Apr 20 15:26:56 dom0 libvirtd[2952]: internal error: Unable to reset PCI device 0000:00:14.0: no FLR, PM reset or bus reset available
  2171. Apr 20 15:26:56 dom0 kernel: loop2: detected capacity change from 0 to 1045968
  2172. Apr 20 15:26:56 dom0 kernel: loop3: detected capacity change from 0 to 1045968
  2173. Apr 20 15:26:56 dom0 kernel: pciback 0000:00:14.0: xen_pciback: vpci: assign to virtual slot 0
  2174. Apr 20 15:26:56 dom0 kernel: pciback 0000:00:14.0: registering for 4
  2175. Apr 20 15:26:57 dom0 kernel: xen-blkback: backend/vbd/4/51712: using 1 queues, protocol 1 (x86_64-abi) persistent grants
  2176. Apr 20 15:26:57 dom0 kernel: xen-blkback: backend/vbd/4/51728: using 1 queues, protocol 1 (x86_64-abi) persistent grants
  2177. Apr 20 15:26:57 dom0 kernel: xen-blkback: backend/vbd/4/51744: using 1 queues, protocol 1 (x86_64-abi) persistent grants
  2178. Apr 20 15:26:57 dom0 kernel: xen: registering gsi 16 triggering 0 polarity 1
  2179. Apr 20 15:26:57 dom0 kernel: Already setup the GSI :16
  2180. Apr 20 15:26:57 dom0 kernel: xen: registering gsi 16 triggering 0 polarity 1
  2181. Apr 20 15:26:57 dom0 kernel: Already setup the GSI :16
  2182. Apr 20 15:26:57 dom0 kernel: xen: registering gsi 16 triggering 0 polarity 1
  2183. Apr 20 15:26:57 dom0 kernel: Already setup the GSI :16
  2184. Apr 20 15:26:57 dom0 kernel: xen: registering gsi 16 triggering 0 polarity 1
  2185. Apr 20 15:26:57 dom0 kernel: Already setup the GSI :16
  2186. Apr 20 15:26:57 dom0 kernel: xen: registering gsi 16 triggering 0 polarity 1
  2187. Apr 20 15:26:57 dom0 kernel: Already setup the GSI :16
  2188. Apr 20 15:26:57 dom0 kernel: xen: registering gsi 16 triggering 0 polarity 1
  2189. Apr 20 15:26:57 dom0 kernel: Already setup the GSI :16
  2190. Apr 20 15:26:57 dom0 kernel: xen: registering gsi 16 triggering 0 polarity 1
  2191. Apr 20 15:26:57 dom0 kernel: Already setup the GSI :16
  2192. Apr 20 15:26:57 dom0 kernel: xen-blkback: backend/vbd/4/51760: using 1 queues, protocol 1 (x86_64-abi) persistent grants
  2193. Apr 20 15:26:57 dom0 qubesd[3175]: vm.sys-usb: Setting Qubes DB info for the VM
  2194. Apr 20 15:26:57 dom0 qubesd[3175]: vm.sys-usb: Starting Qubes DB
  2195. Apr 20 15:26:57 dom0 audit[4852]: CRED_ACQ pid=4852 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
  2196. Apr 20 15:26:57 dom0 runuser[4852]: pam_unix(runuser:session): session opened for user shydonnie(uid=1000) by (uid=0)
  2197. Apr 20 15:26:57 dom0 kernel: audit: type=1103 audit(1713644817.720:353): pid=4852 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
  2198. Apr 20 15:26:57 dom0 kernel: audit: type=1105 audit(1713644817.720:354): pid=4852 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
  2199. Apr 20 15:26:57 dom0 audit[4852]: USER_START pid=4852 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
  2200. Apr 20 15:26:57 dom0 runuser[4852]: pam_unix(runuser:session): session closed for user shydonnie
  2201. Apr 20 15:26:57 dom0 audit[4852]: USER_END pid=4852 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
  2202. Apr 20 15:26:57 dom0 audit[4852]: CRED_DISP pid=4852 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
  2203. Apr 20 15:26:57 dom0 kernel: audit: type=1106 audit(1713644817.725:355): pid=4852 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
  2204. Apr 20 15:26:57 dom0 kernel: audit: type=1104 audit(1713644817.725:356): pid=4852 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
  2205. Apr 20 15:26:57 dom0 qubesd[3175]: vm.sys-usb: Activating the sys-usb VM
  2206. Apr 20 15:26:57 dom0 audit[4858]: CRED_ACQ pid=4858 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
  2207. Apr 20 15:26:57 dom0 runuser[4858]: pam_unix(runuser:session): session opened for user shydonnie(uid=1000) by (uid=0)
  2208. Apr 20 15:26:57 dom0 audit[4858]: USER_START pid=4858 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
  2209. Apr 20 15:26:58 dom0 kernel: xen-blkback: backend/vbd/1/51712: using 2 queues, protocol 1 (x86_64-abi) persistent grants
  2210. Apr 20 15:26:58 dom0 kernel: xen-blkback: backend/vbd/1/51728: using 2 queues, protocol 1 (x86_64-abi) persistent grants
  2211. Apr 20 15:26:58 dom0 kernel: xen-blkback: backend/vbd/1/51744: using 2 queues, protocol 1 (x86_64-abi) persistent grants
  2212. Apr 20 15:26:58 dom0 kernel: xen-blkback: backend/vbd/1/51760: using 2 queues, protocol 1 (x86_64-abi) persistent grants
  2213. Apr 20 15:26:59 dom0 kernel: xen-blkback: backend/vbd/3/51712: using 2 queues, protocol 1 (x86_64-abi) persistent grants
  2214. Apr 20 15:26:59 dom0 kernel: xen-blkback: backend/vbd/3/51728: using 2 queues, protocol 1 (x86_64-abi) persistent grants
  2215. Apr 20 15:26:59 dom0 kernel: xen-blkback: backend/vbd/3/51744: using 2 queues, protocol 1 (x86_64-abi) persistent grants
  2216. Apr 20 15:26:59 dom0 kernel: xen-blkback: backend/vbd/3/51760: using 2 queues, protocol 1 (x86_64-abi) persistent grants
  2217. Apr 20 15:27:01 dom0 runuser[4564]: pam_unix(runuser:session): session closed for user shydonnie
  2218. Apr 20 15:27:01 dom0 audit[4564]: USER_END pid=4564 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
  2219. Apr 20 15:27:01 dom0 audit[4564]: CRED_DISP pid=4564 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
  2220. Apr 20 15:27:01 dom0 systemd[1]: Finished [email protected] - Start Qubes VM sys-net.
  2221. Apr 20 15:27:01 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-vm@sys-net comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  2222. Apr 20 15:27:01 dom0 lvm[2499]: No longer monitoring thin pool qubes_dom0-vm--pool-tpool.
  2223. Apr 20 15:27:01 dom0 lvm[2499]: Monitoring thin pool qubes_dom0-vm--pool-tpool.
  2224. Apr 20 15:27:01 dom0 lvm[2499]: No longer monitoring thin pool qubes_dom0-vm--pool-tpool.
  2225. Apr 20 15:27:01 dom0 lvm[2499]: Monitoring thin pool qubes_dom0-vm--pool-tpool.
  2226. Apr 20 15:27:02 dom0 kernel: loop4: detected capacity change from 0 to 1045968
  2227. Apr 20 15:27:02 dom0 qubesd[3175]: vm.sys-firewall: Setting Qubes DB info for the VM
  2228. Apr 20 15:27:02 dom0 qubesd[3175]: vm.sys-firewall: Starting Qubes DB
  2229. Apr 20 15:27:02 dom0 kernel: kauditd_printk_skb: 5 callbacks suppressed
  2230. Apr 20 15:27:02 dom0 kernel: audit: type=1103 audit(1713644822.378:362): pid=5163 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
  2231. Apr 20 15:27:02 dom0 audit[5163]: CRED_ACQ pid=5163 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
  2232. Apr 20 15:27:02 dom0 runuser[5163]: pam_unix(runuser:session): session opened for user shydonnie(uid=1000) by (uid=0)
  2233. Apr 20 15:27:02 dom0 audit[5163]: USER_START pid=5163 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
  2234. Apr 20 15:27:02 dom0 kernel: audit: type=1105 audit(1713644822.379:363): pid=5163 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
  2235. Apr 20 15:27:02 dom0 runuser[5163]: pam_unix(runuser:session): session closed for user shydonnie
  2236. Apr 20 15:27:02 dom0 audit[5163]: USER_END pid=5163 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
  2237. Apr 20 15:27:02 dom0 audit[5163]: CRED_DISP pid=5163 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
  2238. Apr 20 15:27:02 dom0 kernel: audit: type=1106 audit(1713644822.384:364): pid=5163 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
  2239. Apr 20 15:27:02 dom0 kernel: audit: type=1104 audit(1713644822.384:365): pid=5163 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
  2240. Apr 20 15:27:02 dom0 qubesd[3175]: vm.sys-firewall: Activating the sys-firewall VM
  2241. Apr 20 15:27:02 dom0 audit[5172]: CRED_ACQ pid=5172 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
  2242. Apr 20 15:27:02 dom0 runuser[5172]: pam_unix(runuser:session): session opened for user shydonnie(uid=1000) by (uid=0)
  2243. Apr 20 15:27:02 dom0 kernel: audit: type=1103 audit(1713644822.394:366): pid=5172 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
  2244. Apr 20 15:27:02 dom0 kernel: audit: type=1105 audit(1713644822.394:367): pid=5172 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
  2245. Apr 20 15:27:02 dom0 audit[5172]: USER_START pid=5172 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
  2246. Apr 20 15:27:03 dom0 kernel: xen-blkback: backend/vbd/5/51712: using 2 queues, protocol 1 (x86_64-abi) persistent grants
  2247. Apr 20 15:27:03 dom0 kernel: xen-blkback: backend/vbd/5/51728: using 2 queues, protocol 1 (x86_64-abi) persistent grants
  2248. Apr 20 15:27:03 dom0 kernel: xen-blkback: backend/vbd/5/51744: using 2 queues, protocol 1 (x86_64-abi) persistent grants
  2249. Apr 20 15:27:03 dom0 kernel: xen-blkback: backend/vbd/5/51760: using 2 queues, protocol 1 (x86_64-abi) persistent grants
  2250. Apr 20 15:27:05 dom0 runuser[5172]: pam_unix(runuser:session): session closed for user shydonnie
  2251. Apr 20 15:27:05 dom0 audit[5172]: USER_END pid=5172 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
  2252. Apr 20 15:27:05 dom0 audit[5172]: CRED_DISP pid=5172 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
  2253. Apr 20 15:27:05 dom0 kernel: audit: type=1106 audit(1713644825.722:368): pid=5172 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
  2254. Apr 20 15:27:05 dom0 kernel: audit: type=1104 audit(1713644825.722:369): pid=5172 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
  2255. Apr 20 15:27:05 dom0 systemd[1]: Finished [email protected] - Start Qubes VM sys-firewall.
  2256. Apr 20 15:27:05 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-vm@sys-firewall comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  2257. Apr 20 15:27:05 dom0 kernel: audit: type=1130 audit(1713644825.737:370): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-vm@sys-firewall comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  2258. Apr 20 15:27:05 dom0 lvm[2499]: No longer monitoring thin pool qubes_dom0-vm--pool-tpool.
  2259. Apr 20 15:27:05 dom0 lvm[2499]: Monitoring thin pool qubes_dom0-vm--pool-tpool.
  2260. Apr 20 15:27:06 dom0 lvm[2499]: No longer monitoring thin pool qubes_dom0-vm--pool-tpool.
  2261. Apr 20 15:27:06 dom0 lvm[2499]: Monitoring thin pool qubes_dom0-vm--pool-tpool.
  2262. Apr 20 15:27:07 dom0 kernel: loop5: detected capacity change from 0 to 1045968
  2263. Apr 20 15:27:07 dom0 qubesd[3175]: vm.sys-whonix: Setting Qubes DB info for the VM
  2264. Apr 20 15:27:07 dom0 qubesd[3175]: vm.sys-whonix: Starting Qubes DB
  2265. Apr 20 15:27:07 dom0 kernel: audit: type=1103 audit(1713644827.283:371): pid=5389 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
  2266. Apr 20 15:27:07 dom0 audit[5389]: CRED_ACQ pid=5389 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
  2267. Apr 20 15:27:07 dom0 runuser[5389]: pam_unix(runuser:session): session opened for user shydonnie(uid=1000) by (uid=0)
  2268. Apr 20 15:27:07 dom0 audit[5389]: USER_START pid=5389 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
  2269. Apr 20 15:27:07 dom0 runuser[5389]: pam_unix(runuser:session): session closed for user shydonnie
  2270. Apr 20 15:27:07 dom0 audit[5389]: USER_END pid=5389 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
  2271. Apr 20 15:27:07 dom0 audit[5389]: CRED_DISP pid=5389 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
  2272. Apr 20 15:27:07 dom0 qubesd[3175]: vm.sys-whonix: Activating the sys-whonix VM
  2273. Apr 20 15:27:07 dom0 audit[5396]: CRED_ACQ pid=5396 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
  2274. Apr 20 15:27:07 dom0 runuser[5396]: pam_unix(runuser:session): session opened for user shydonnie(uid=1000) by (uid=0)
  2275. Apr 20 15:27:07 dom0 audit[5396]: USER_START pid=5396 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
  2276. Apr 20 15:27:08 dom0 runuser[4858]: pam_unix(runuser:session): session closed for user shydonnie
  2277. Apr 20 15:27:08 dom0 audit[4858]: USER_END pid=4858 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
  2278. Apr 20 15:27:08 dom0 audit[4858]: CRED_DISP pid=4858 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
  2279. Apr 20 15:27:08 dom0 kernel: kauditd_printk_skb: 5 callbacks suppressed
  2280. Apr 20 15:27:08 dom0 kernel: audit: type=1106 audit(1713644828.030:377): pid=4858 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
  2281. Apr 20 15:27:08 dom0 kernel: audit: type=1104 audit(1713644828.030:378): pid=4858 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
  2282. Apr 20 15:27:08 dom0 systemd[1]: Finished [email protected] - Start Qubes VM sys-usb.
  2283. Apr 20 15:27:08 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-vm@sys-usb comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  2284. Apr 20 15:27:08 dom0 kernel: audit: type=1130 audit(1713644828.041:379): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-vm@sys-usb comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  2285. Apr 20 15:27:08 dom0 systemd[1]: Starting systemd-user-sessions.service - Permit User Sessions...
  2286. Apr 20 15:27:08 dom0 systemd[1]: Finished systemd-user-sessions.service - Permit User Sessions.
  2287. Apr 20 15:27:08 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-user-sessions comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  2288. Apr 20 15:27:08 dom0 kernel: audit: type=1130 audit(1713644828.057:380): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-user-sessions comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  2289. Apr 20 15:27:08 dom0 systemd[1]: Started crond.service - Command Scheduler.
  2290. Apr 20 15:27:08 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=crond comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  2291. Apr 20 15:27:08 dom0 kernel: audit: type=1130 audit(1713644828.058:381): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=crond comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  2292. Apr 20 15:27:08 dom0 systemd[1]: Starting lightdm.service - Light Display Manager...
  2293. Apr 20 15:27:08 dom0 systemd[1]: Starting plymouth-quit-wait.service - Hold until boot process finishes up...
  2294. Apr 20 15:27:08 dom0 crond[5403]: (CRON) STARTUP (1.6.1)
  2295. Apr 20 15:27:08 dom0 crond[5403]: (CRON) INFO (Syslog will be used instead of sendmail.)
  2296. Apr 20 15:27:08 dom0 crond[5403]: (CRON) INFO (RANDOM_DELAY will be scaled with factor 50% if used.)
  2297. Apr 20 15:27:08 dom0 crond[5403]: (CRON) INFO (running with inotify support)
  2298. Apr 20 15:27:08 dom0 systemd[1]: Received SIGRTMIN+21 from PID 650 (plymouthd).
  2299. Apr 20 15:27:08 dom0 systemd[1]: Started lightdm.service - Light Display Manager.
  2300. Apr 20 15:27:08 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=lightdm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  2301. Apr 20 15:27:08 dom0 kernel: audit: type=1130 audit(1713644828.100:382): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=lightdm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  2302. Apr 20 15:27:08 dom0 systemd[1]: Reached target nss-user-lookup.target - User and Group Name Lookups.
  2303. Apr 20 15:27:08 dom0 audit: BPF prog-id=64 op=LOAD
  2304. Apr 20 15:27:08 dom0 kernel: audit: type=1334 audit(1713644828.103:383): prog-id=64 op=LOAD
  2305. Apr 20 15:27:08 dom0 systemd[1]: Starting accounts-daemon.service - Accounts Service...
  2306. Apr 20 15:27:08 dom0 accounts-daemon[5414]: started daemon version 22.39.0
  2307. Apr 20 15:27:08 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=accounts-daemon comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  2308. Apr 20 15:27:08 dom0 systemd[1]: Started accounts-daemon.service - Accounts Service.
  2309. Apr 20 15:27:08 dom0 kernel: audit: type=1130 audit(1713644828.141:384): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=accounts-daemon comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  2310. Apr 20 15:27:08 dom0 kernel: xen-blkback: backend/vbd/6/51712: using 2 queues, protocol 1 (x86_64-abi) persistent grants
  2311. Apr 20 15:27:08 dom0 kernel: xen-blkback: backend/vbd/6/51728: using 2 queues, protocol 1 (x86_64-abi) persistent grants
  2312. Apr 20 15:27:08 dom0 kernel: xen-blkback: backend/vbd/6/51744: using 2 queues, protocol 1 (x86_64-abi) persistent grants
  2313. Apr 20 15:27:08 dom0 kernel: xen-blkback: backend/vbd/6/51760: using 2 queues, protocol 1 (x86_64-abi) persistent grants
  2314. Apr 20 15:27:08 dom0 systemd[1]: Received SIGRTMIN+21 from PID 650 (plymouthd).
  2315. Apr 20 15:27:08 dom0 systemd[1]: Finished plymouth-quit-wait.service - Hold until boot process finishes up.
  2316. Apr 20 15:27:08 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=plymouth-quit-wait comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  2317. Apr 20 15:27:08 dom0 kernel: audit: type=1130 audit(1713644828.633:385): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=plymouth-quit-wait comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  2318. Apr 20 15:27:08 dom0 systemd[1]: Started [email protected] - Serial Getty on hvc0.
  2319. Apr 20 15:27:08 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=serial-getty@hvc0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  2320. Apr 20 15:27:08 dom0 systemd[1]: Reached target getty.target - Login Prompts.
  2321. Apr 20 15:27:08 dom0 kernel: audit: type=1130 audit(1713644828.655:386): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=serial-getty@hvc0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  2322. Apr 20 15:27:08 dom0 audit[5480]: CRED_ACQ pid=5480 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_env,pam_permit acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
  2323. Apr 20 15:27:08 dom0 lightdm[5480]: pam_unix(lightdm-greeter:session): session opened for user lightdm(uid=993) by (uid=0)
  2324. Apr 20 15:27:08 dom0 systemd[1]: Created slice user-993.slice - User Slice of UID 993.
  2325. Apr 20 15:27:08 dom0 systemd[1]: Starting [email protected] - User Runtime Directory /run/user/993...
  2326. Apr 20 15:27:08 dom0 systemd-logind[2904]: New session c1 of user lightdm.
  2327. Apr 20 15:27:08 dom0 systemd[1]: Finished [email protected] - User Runtime Directory /run/user/993.
  2328. Apr 20 15:27:08 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@993 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  2329. Apr 20 15:27:08 dom0 systemd[1]: Starting [email protected] - User Manager for UID 993...
  2330. Apr 20 15:27:08 dom0 (systemd)[5484]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory
  2331. Apr 20 15:27:08 dom0 (systemd)[5484]: PAM adding faulty module: /usr/lib64/security/pam_sss.so
  2332. Apr 20 15:27:08 dom0 dbus-broker-launch[2864]: Activation request for 'org.freedesktop.home1' failed: The systemd unit 'dbus-org.freedesktop.home1.service' could not be found.
  2333. Apr 20 15:27:08 dom0 (systemd)[5484]: pam_systemd_home(systemd-user:account): systemd-homed is not available: Could not activate remote peer: activation request failed: unknown unit.
  2334. Apr 20 15:27:08 dom0 audit[5484]: USER_ACCT pid=5484 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_unix acct="lightdm" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  2335. Apr 20 15:27:08 dom0 audit[5484]: CRED_ACQ pid=5484 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=? acct="lightdm" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
  2336. Apr 20 15:27:08 dom0 audit[5484]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=8 a1=7fffa447e930 a2=3 a3=7fffa447e645 items=0 ppid=1 pid=5484 auid=993 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=1 comm="(systemd)" exe="/usr/lib/systemd/systemd" key=(null)
  2337. Apr 20 15:27:08 dom0 audit: PROCTITLE proctitle="(systemd)"
  2338. Apr 20 15:27:08 dom0 (systemd)[5484]: pam_unix(systemd-user:session): session opened for user lightdm(uid=993) by (uid=0)
  2339. Apr 20 15:27:08 dom0 audit[5484]: USER_START pid=5484 uid=0 auid=993 ses=1 msg='op=PAM:session_open grantors=pam_selinux,pam_selinux,pam_loginuid,pam_namespace,pam_systemd_home,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="lightdm" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  2340. Apr 20 15:27:08 dom0 systemd[5484]: Queued start job for default target default.target.
  2341. Apr 20 15:27:08 dom0 systemd[5484]: Created slice app.slice - User Application Slice.
  2342. Apr 20 15:27:08 dom0 systemd[5484]: grub-boot-success.timer - Mark boot as successful after the user session has run 2 minutes was skipped because of a failed condition check (ConditionUser=!@system).
  2343. Apr 20 15:27:08 dom0 systemd[5484]: Started systemd-tmpfiles-clean.timer - Daily Cleanup of User's Temporary Directories.
  2344. Apr 20 15:27:08 dom0 systemd[5484]: Reached target paths.target - Paths.
  2345. Apr 20 15:27:08 dom0 systemd[5484]: Reached target timers.target - Timers.
  2346. Apr 20 15:27:08 dom0 systemd[5484]: Starting dbus.socket - D-Bus User Message Bus Socket...
  2347. Apr 20 15:27:08 dom0 systemd[5484]: Listening on pulseaudio.socket - Sound System.
  2348. Apr 20 15:27:08 dom0 systemd[5484]: Starting systemd-tmpfiles-setup.service - Create User's Volatile Files and Directories...
  2349. Apr 20 15:27:08 dom0 systemd[5484]: Listening on dbus.socket - D-Bus User Message Bus Socket.
  2350. Apr 20 15:27:08 dom0 systemd[5484]: Reached target sockets.target - Sockets.
  2351. Apr 20 15:27:08 dom0 systemd[5484]: Finished systemd-tmpfiles-setup.service - Create User's Volatile Files and Directories.
  2352. Apr 20 15:27:08 dom0 systemd[5484]: Reached target basic.target - Basic System.
  2353. Apr 20 15:27:08 dom0 systemd[5484]: Reached target default.target - Main User Target.
  2354. Apr 20 15:27:08 dom0 systemd[1]: Started [email protected] - User Manager for UID 993.
  2355. Apr 20 15:27:08 dom0 systemd[5484]: Startup finished in 200ms.
  2356. Apr 20 15:27:08 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user@993 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  2357. Apr 20 15:27:08 dom0 systemd[1]: Started session-c1.scope - Session c1 of User lightdm.
  2358. Apr 20 15:27:08 dom0 audit[5480]: USER_START pid=5480 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_unix,pam_systemd acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
  2359. Apr 20 15:27:09 dom0 systemd[5484]: Created slice session.slice - User Core Session Slice.
  2360. Apr 20 15:27:09 dom0 systemd[5484]: Starting dbus-broker.service - D-Bus User Message Bus...
  2361. Apr 20 15:27:09 dom0 dbus-broker-launch[5513]: Service file '/usr/share/dbus-1/services/dbus-qubes-app-menu.service' is not named after the D-Bus name 'org.qubesos.appmenu'.
  2362. Apr 20 15:27:09 dom0 dbus-broker-launch[5513]: Service file '/usr/share/dbus-1/services/org.xfce.Thunar.FileManager1.service' is not named after the D-Bus name 'org.freedesktop.FileManager1'.
  2363. Apr 20 15:27:09 dom0 dbus-broker-launch[5513]: Policy to allow eavesdropping in /usr/share/dbus-1/session.conf +31: Eavesdropping is deprecated and ignored
  2364. Apr 20 15:27:09 dom0 dbus-broker-launch[5513]: Policy to allow eavesdropping in /usr/share/dbus-1/session.conf +33: Eavesdropping is deprecated and ignored
  2365. Apr 20 15:27:09 dom0 systemd[5484]: Started dbus-broker.service - D-Bus User Message Bus.
  2366. Apr 20 15:27:09 dom0 dbus-broker-launch[5513]: Ready
  2367. Apr 20 15:27:09 dom0 systemd[5484]: Starting at-spi-dbus-bus.service - Accessibility services bus...
  2368. Apr 20 15:27:09 dom0 systemd[5484]: Started at-spi-dbus-bus.service - Accessibility services bus.
  2369. Apr 20 15:27:09 dom0 at-spi-bus-launcher[5520]: Policy to allow eavesdropping in /usr/share/defaults/at-spi2/accessibility.conf +15: Eavesdropping is deprecated and ignored
  2370. Apr 20 15:27:09 dom0 at-spi-bus-launcher[5520]: Policy to allow eavesdropping in /usr/share/defaults/at-spi2/accessibility.conf +17: Eavesdropping is deprecated and ignored
  2371. Apr 20 15:27:09 dom0 dbus-broker-launch[5520]: Ready
  2372. Apr 20 15:27:09 dom0 systemd[5484]: Starting gvfs-daemon.service - Virtual filesystem service...
  2373. Apr 20 15:27:09 dom0 systemd[5484]: Started gvfs-daemon.service - Virtual filesystem service.
  2374. Apr 20 15:27:09 dom0 systemd[5484]: Created slice app-dbus\x2d:1.4\x2dorg.a11y.atspi.Registry.slice - Slice /app/dbus-:1.4-org.a11y.atspi.Registry.
  2375. Apr 20 15:27:09 dom0 lightdm[5550]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory
  2376. Apr 20 15:27:09 dom0 lightdm[5550]: PAM adding faulty module: /usr/lib64/security/pam_sss.so
  2377. Apr 20 15:27:09 dom0 systemd[5484]: Started dbus-:[email protected].
  2378. Apr 20 15:27:09 dom0 at-spi2-registryd[5551]: SpiRegistry daemon is running with well-known name - org.a11y.atspi.Registry
  2379. Apr 20 15:27:09 dom0 qrexec-policy-daemon[3179]: qrexec: qubes.GetDate+nanoseconds: sys-usb -> @default: allowed to dom0
  2380. Apr 20 15:27:09 dom0 audit: BPF prog-id=65 op=LOAD
  2381. Apr 20 15:27:09 dom0 audit: BPF prog-id=66 op=LOAD
  2382. Apr 20 15:27:09 dom0 audit: BPF prog-id=67 op=LOAD
  2383. Apr 20 15:27:09 dom0 qrexec-policy-daemon[3179]: qrexec: qubes.InputKeyboard+: sys-usb -> @adminvm: allowed to dom0
  2384. Apr 20 15:27:09 dom0 qrexec-policy-daemon[3179]: qrexec: qubes.InputMouse+: sys-usb -> @adminvm: allowed to dom0
  2385. Apr 20 15:27:09 dom0 systemd[1]: Starting systemd-hostnamed.service - Hostname Service...
  2386. Apr 20 15:27:10 dom0 qrexec-policy-daemon[3179]: qrexec: qubes.InputKeyboard+: sys-usb -> @adminvm: allowed to dom0
  2387. Apr 20 15:27:10 dom0 systemd[1]: Started systemd-hostnamed.service - Hostname Service.
  2388. Apr 20 15:27:10 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  2389. Apr 20 15:27:10 dom0 kernel: input: sys-usb: Logitech USB Receiver Keyboard as /devices/virtual/input/input24
  2390. Apr 20 15:27:10 dom0 kernel: input: sys-usb: Logitech USB Receiver as /devices/virtual/input/input25
  2391. Apr 20 15:27:10 dom0 kernel: input: sys-usb: Logitech G903 as /devices/virtual/input/input26
  2392. Apr 20 15:27:10 dom0 systemd-logind[2904]: Watching system buttons on /dev/input/event4 (sys-usb: Logitech USB Receiver Keyboard)
  2393. Apr 20 15:27:10 dom0 systemd-logind[2904]: Watching system buttons on /dev/input/event6 (sys-usb: Logitech G903)
  2394. Apr 20 15:27:10 dom0 qubesd[3175]: vm.sys-audio: Starting sys-audio
  2395. Apr 20 15:27:10 dom0 qubesd[3175]: vm.sys-audio: Start failed: usb device sys-usb:2-5.3 not available
  2396. Apr 20 15:27:12 dom0 qrexec-policy-daemon[3179]: qrexec: qubes.InputKeyboard+: sys-usb -> @adminvm: allowed to dom0
  2397. Apr 20 15:27:12 dom0 qrexec-policy-daemon[3179]: qrexec: qubes.InputKeyboard+: sys-usb -> @adminvm: allowed to dom0
  2398. Apr 20 15:27:12 dom0 kernel: input: sys-usb: Logitech Candy as /devices/virtual/input/input27
  2399. Apr 20 15:27:12 dom0 kernel: input: sys-usb: Logitech G502 X PLUS as /devices/virtual/input/input28
  2400. Apr 20 15:27:12 dom0 runuser[5396]: pam_unix(runuser:session): session closed for user shydonnie
  2401. Apr 20 15:27:12 dom0 audit[5396]: USER_END pid=5396 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
  2402. Apr 20 15:27:12 dom0 audit[5396]: CRED_DISP pid=5396 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success'
  2403. Apr 20 15:27:12 dom0 systemd[1]: Finished [email protected] - Start Qubes VM sys-whonix.
  2404. Apr 20 15:27:12 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-vm@sys-whonix comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  2405. Apr 20 15:27:12 dom0 systemd[1]: Reached target multi-user.target - Multi-User System.
  2406. Apr 20 15:27:12 dom0 systemd[1]: Reached target graphical.target - Graphical Interface.
  2407. Apr 20 15:27:12 dom0 systemd[1]: Starting systemd-update-utmp-runlevel.service - Record Runlevel Change in UTMP...
  2408. Apr 20 15:27:12 dom0 audit[5745]: SYSTEM_RUNLEVEL pid=5745 uid=0 auid=4294967295 ses=4294967295 msg='old-level=N new-level=5 comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success'
  2409. Apr 20 15:27:12 dom0 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully.
  2410. Apr 20 15:27:12 dom0 systemd[1]: Finished systemd-update-utmp-runlevel.service - Record Runlevel Change in UTMP.
  2411. Apr 20 15:27:12 dom0 systemd[1]: Startup finished in 17.484s (firmware) + 2.122s (loader) + 1.736s (kernel) + 36.295s (initrd) + 21.425s (userspace) = 1min 19.065s.
  2412. Apr 20 15:27:12 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-update-utmp-runlevel comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  2413. Apr 20 15:27:12 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-update-utmp-runlevel comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  2414. Apr 20 15:27:12 dom0 systemd-logind[2904]: Watching system buttons on /dev/input/event7 (sys-usb: Logitech Candy)
  2415. Apr 20 15:27:12 dom0 systemd-logind[2904]: Watching system buttons on /dev/input/event8 (sys-usb: Logitech G502 X PLUS)
  2416. Apr 20 15:27:15 dom0 audit[5550]: USER_AUTH pid=5550 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:authentication grantors=pam_usertype,pam_localuser,pam_unix acct="shydonnie" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
  2417. Apr 20 15:27:15 dom0 audit[5550]: USER_ACCT pid=5550 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="shydonnie" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
  2418. Apr 20 15:27:15 dom0 kernel: kauditd_printk_skb: 20 callbacks suppressed
  2419. Apr 20 15:27:15 dom0 kernel: audit: type=1100 audit(1713644835.580:405): pid=5550 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:authentication grantors=pam_usertype,pam_localuser,pam_unix acct="shydonnie" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
  2420. Apr 20 15:27:15 dom0 kernel: audit: type=1101 audit(1713644835.580:406): pid=5550 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="shydonnie" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
  2421. Apr 20 15:27:15 dom0 systemd[1]: Stopping session-c1.scope - Session c1 of User lightdm...
  2422. Apr 20 15:27:15 dom0 lightdm[5480]: pam_unix(lightdm-greeter:session): session closed for user lightdm
  2423. Apr 20 15:27:15 dom0 audit[5480]: USER_END pid=5480 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_unix,pam_systemd acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
  2424. Apr 20 15:27:15 dom0 audit[5480]: CRED_DISP pid=5480 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_env,pam_permit acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
  2425. Apr 20 15:27:15 dom0 kernel: audit: type=1106 audit(1713644835.668:407): pid=5480 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_unix,pam_systemd acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
  2426. Apr 20 15:27:15 dom0 kernel: audit: type=1104 audit(1713644835.668:408): pid=5480 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_env,pam_permit acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
  2427. Apr 20 15:27:15 dom0 systemd[1]: session-c1.scope: Deactivated successfully.
  2428. Apr 20 15:27:15 dom0 systemd[1]: Stopped session-c1.scope - Session c1 of User lightdm.
  2429. Apr 20 15:27:15 dom0 systemd[1]: session-c1.scope: Consumed 1.353s CPU time.
  2430. Apr 20 15:27:15 dom0 systemd-logind[2904]: Removed session c1.
  2431. Apr 20 15:27:15 dom0 audit[5550]: CRED_ACQ pid=5550 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_localuser,pam_unix acct="shydonnie" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
  2432. Apr 20 15:27:15 dom0 audit[5550]: SYSCALL arch=c000003e syscall=1 success=yes exit=4 a0=8 a1=7ffef133d990 a2=4 a3=7ffef133d6a4 items=0 ppid=5404 pid=5550 auid=1000 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=2 comm="lightdm" exe="/usr/sbin/lightdm" key=(null)
  2433. Apr 20 15:27:15 dom0 audit: PROCTITLE proctitle=6C69676874646D002D2D73657373696F6E2D6368696C64003133003230
  2434. Apr 20 15:27:15 dom0 kernel: audit: type=1103 audit(1713644835.672:409): pid=5550 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_localuser,pam_unix acct="shydonnie" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
  2435. Apr 20 15:27:15 dom0 kernel: audit: type=1006 audit(1713644835.672:410): pid=5550 uid=0 old-auid=4294967295 auid=1000 tty=(none) old-ses=4294967295 ses=2 res=1
  2436. Apr 20 15:27:15 dom0 kernel: audit: type=1300 audit(1713644835.672:410): arch=c000003e syscall=1 success=yes exit=4 a0=8 a1=7ffef133d990 a2=4 a3=7ffef133d6a4 items=0 ppid=5404 pid=5550 auid=1000 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=2 comm="lightdm" exe="/usr/sbin/lightdm" key=(null)
  2437. Apr 20 15:27:15 dom0 kernel: audit: type=1327 audit(1713644835.672:410): proctitle=6C69676874646D002D2D73657373696F6E2D6368696C64003133003230
  2438. Apr 20 15:27:15 dom0 systemd[1]: Created slice user-1000.slice - User Slice of UID 1000.
  2439. Apr 20 15:27:15 dom0 systemd[1]: Starting [email protected] - User Runtime Directory /run/user/1000...
  2440. Apr 20 15:27:15 dom0 systemd-logind[2904]: New session 2 of user shydonnie.
  2441. Apr 20 15:27:15 dom0 systemd[1]: Finished [email protected] - User Runtime Directory /run/user/1000.
  2442. Apr 20 15:27:15 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@1000 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  2443. Apr 20 15:27:15 dom0 kernel: audit: type=1130 audit(1713644835.714:411): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@1000 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  2444. Apr 20 15:27:15 dom0 systemd[1]: Starting [email protected] - User Manager for UID 1000...
  2445. Apr 20 15:27:15 dom0 (systemd)[5754]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory
  2446. Apr 20 15:27:15 dom0 (systemd)[5754]: PAM adding faulty module: /usr/lib64/security/pam_sss.so
  2447. Apr 20 15:27:15 dom0 (systemd)[5754]: pam_systemd_home(systemd-user:account): systemd-homed is not available: Could not activate remote peer: activation request failed: unknown unit.
  2448. Apr 20 15:27:15 dom0 audit[5754]: USER_ACCT pid=5754 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_unix acct="shydonnie" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  2449. Apr 20 15:27:15 dom0 audit[5754]: CRED_ACQ pid=5754 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=? acct="shydonnie" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
  2450. Apr 20 15:27:15 dom0 kernel: audit: type=1101 audit(1713644835.724:412): pid=5754 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_unix acct="shydonnie" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  2451. Apr 20 15:27:15 dom0 audit[5754]: SYSCALL arch=c000003e syscall=1 success=yes exit=4 a0=8 a1=7fffa447e930 a2=4 a3=7fffa447e644 items=0 ppid=1 pid=5754 auid=1000 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=3 comm="(systemd)" exe="/usr/lib/systemd/systemd" key=(null)
  2452. Apr 20 15:27:15 dom0 audit: PROCTITLE proctitle="(systemd)"
  2453. Apr 20 15:27:15 dom0 (systemd)[5754]: pam_unix(systemd-user:session): session opened for user shydonnie(uid=1000) by (uid=0)
  2454. Apr 20 15:27:15 dom0 audit[5754]: USER_START pid=5754 uid=0 auid=1000 ses=3 msg='op=PAM:session_open grantors=pam_selinux,pam_selinux,pam_loginuid,pam_namespace,pam_systemd_home,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="shydonnie" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  2455. Apr 20 15:27:15 dom0 systemd[5754]: Queued start job for default target default.target.
  2456. Apr 20 15:27:15 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user@1000 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  2457. Apr 20 15:27:15 dom0 audit[5550]: USER_START pid=5550 uid=0 auid=1000 ses=2 msg='op=PAM:session_open grantors=pam_selinux,pam_loginuid,pam_selinux,pam_keyinit,pam_namespace,pam_keyinit,pam_limits,pam_systemd,pam_unix,pam_lastlog,pam_umask,pam_lastlog acct="shydonnie" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
  2458. Apr 20 15:27:15 dom0 audit[5550]: USER_LOGIN pid=5550 uid=0 auid=1000 ses=2 msg='op=login id=1000 exe="/usr/sbin/lightdm" hostname=dom0 addr=? terminal=/dev/tty1 res=success'
  2459. Apr 20 15:27:15 dom0 lightdm[5550]: pam_unix(lightdm:session): session opened for user shydonnie(uid=1000) by (uid=0)
  2460. Apr 20 15:27:15 dom0 systemd[5754]: Created slice app.slice - User Application Slice.
  2461. Apr 20 15:27:15 dom0 systemd[5754]: Started grub-boot-success.timer - Mark boot as successful after the user session has run 2 minutes.
  2462. Apr 20 15:27:15 dom0 systemd[5754]: Started systemd-tmpfiles-clean.timer - Daily Cleanup of User's Temporary Directories.
  2463. Apr 20 15:27:15 dom0 systemd[5754]: Reached target paths.target - Paths.
  2464. Apr 20 15:27:15 dom0 systemd[5754]: Reached target timers.target - Timers.
  2465. Apr 20 15:27:15 dom0 systemd[5754]: Starting dbus.socket - D-Bus User Message Bus Socket...
  2466. Apr 20 15:27:15 dom0 systemd[5754]: Listening on pulseaudio.socket - Sound System.
  2467. Apr 20 15:27:15 dom0 systemd[5754]: Starting systemd-tmpfiles-setup.service - Create User's Volatile Files and Directories...
  2468. Apr 20 15:27:15 dom0 systemd[5754]: Finished systemd-tmpfiles-setup.service - Create User's Volatile Files and Directories.
  2469. Apr 20 15:27:15 dom0 systemd[5754]: Listening on dbus.socket - D-Bus User Message Bus Socket.
  2470. Apr 20 15:27:15 dom0 systemd[5754]: Reached target sockets.target - Sockets.
  2471. Apr 20 15:27:15 dom0 systemd[5754]: Reached target basic.target - Basic System.
  2472. Apr 20 15:27:15 dom0 systemd[5754]: Reached target default.target - Main User Target.
  2473. Apr 20 15:27:15 dom0 systemd[5754]: Startup finished in 148ms.
  2474. Apr 20 15:27:15 dom0 systemd[1]: Started [email protected] - User Manager for UID 1000.
  2475. Apr 20 15:27:15 dom0 systemd[1]: Started session-2.scope - Session 2 of User shydonnie.
  2476. Apr 20 15:27:16 dom0 systemd[5754]: Created slice session.slice - User Core Session Slice.
  2477. Apr 20 15:27:16 dom0 systemd[5754]: Starting dbus-broker.service - D-Bus User Message Bus...
  2478. Apr 20 15:27:16 dom0 dbus-broker-launch[5800]: Service file '/usr/share/dbus-1/services/dbus-qubes-app-menu.service' is not named after the D-Bus name 'org.qubesos.appmenu'.
  2479. Apr 20 15:27:16 dom0 dbus-broker-launch[5800]: Service file '/usr/share/dbus-1/services/org.xfce.Thunar.FileManager1.service' is not named after the D-Bus name 'org.freedesktop.FileManager1'.
  2480. Apr 20 15:27:16 dom0 dbus-broker-launch[5800]: Policy to allow eavesdropping in /usr/share/dbus-1/session.conf +31: Eavesdropping is deprecated and ignored
  2481. Apr 20 15:27:16 dom0 dbus-broker-launch[5800]: Policy to allow eavesdropping in /usr/share/dbus-1/session.conf +33: Eavesdropping is deprecated and ignored
  2482. Apr 20 15:27:16 dom0 systemd[5754]: Started dbus-broker.service - D-Bus User Message Bus.
  2483. Apr 20 15:27:16 dom0 dbus-broker-launch[5800]: Ready
  2484. Apr 20 15:27:16 dom0 systemd[5754]: Starting at-spi-dbus-bus.service - Accessibility services bus...
  2485. Apr 20 15:27:16 dom0 systemd[5754]: Started at-spi-dbus-bus.service - Accessibility services bus.
  2486. Apr 20 15:27:16 dom0 at-spi-bus-launcher[5838]: Policy to allow eavesdropping in /usr/share/defaults/at-spi2/accessibility.conf +15: Eavesdropping is deprecated and ignored
  2487. Apr 20 15:27:16 dom0 at-spi-bus-launcher[5838]: Policy to allow eavesdropping in /usr/share/defaults/at-spi2/accessibility.conf +17: Eavesdropping is deprecated and ignored
  2488. Apr 20 15:27:16 dom0 dbus-broker-launch[5838]: Ready
  2489. Apr 20 15:27:16 dom0 systemd[5754]: Created slice app-dbus\x2d:1.2\x2dorg.xfce.Xfconf.slice - Slice /app/dbus-:1.2-org.xfce.Xfconf.
  2490. Apr 20 15:27:16 dom0 systemd[5754]: Started dbus-:[email protected].
  2491. Apr 20 15:27:16 dom0 systemd[5754]: Created slice app-dbus\x2d:1.6\x2dorg.a11y.atspi.Registry.slice - Slice /app/dbus-:1.6-org.a11y.atspi.Registry.
  2492. Apr 20 15:27:16 dom0 systemd[5754]: Started dbus-:[email protected].
  2493. Apr 20 15:27:16 dom0 at-spi2-registryd[5847]: SpiRegistry daemon is running with well-known name - org.a11y.atspi.Registry
  2494. Apr 20 15:27:16 dom0 systemd[5754]: Starting gvfs-daemon.service - Virtual filesystem service...
  2495. Apr 20 15:27:16 dom0 systemd[5754]: Started gvfs-daemon.service - Virtual filesystem service.
  2496. Apr 20 15:27:17 dom0 systemd[5754]: Starting gvfs-udisks2-volume-monitor.service - Virtual filesystem service - disk device monitor...
  2497. Apr 20 15:27:17 dom0 systemd[5754]: Started gvfs-udisks2-volume-monitor.service - Virtual filesystem service - disk device monitor.
  2498. Apr 20 15:27:17 dom0 systemd[5754]: Starting gvfs-metadata.service - Virtual filesystem metadata service...
  2499. Apr 20 15:27:17 dom0 systemd[5754]: Started gvfs-metadata.service - Virtual filesystem metadata service.
  2500. Apr 20 15:27:17 dom0 systemd[1]: /usr/lib/systemd/system/qubes-suspend.service:9: Standard output type syslog is obsolete, automatically updating to journal. Please update your unit file, and consider removing the setting altogether.
  2501. Apr 20 15:27:17 dom0 systemd[5754]: Starting thunar.service - Thunar file manager...
  2502. Apr 20 15:27:17 dom0 systemd[5754]: Started thunar.service - Thunar file manager.
  2503. Apr 20 15:27:17 dom0 systemd[5754]: Starting pulseaudio.service - Sound Service...
  2504. Apr 20 15:27:17 dom0 systemd[1]: Starting rtkit-daemon.service - RealtimeKit Scheduling Policy Service...
  2505. Apr 20 15:27:17 dom0 systemd[1]: Started rtkit-daemon.service - RealtimeKit Scheduling Policy Service.
  2506. Apr 20 15:27:17 dom0 rtkit-daemon[5972]: Successfully called chroot.
  2507. Apr 20 15:27:17 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=rtkit-daemon comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  2508. Apr 20 15:27:17 dom0 rtkit-daemon[5972]: Successfully dropped privileges.
  2509. Apr 20 15:27:17 dom0 rtkit-daemon[5972]: Successfully limited resources.
  2510. Apr 20 15:27:17 dom0 rtkit-daemon[5972]: Canary thread running.
  2511. Apr 20 15:27:17 dom0 rtkit-daemon[5972]: Running.
  2512. Apr 20 15:27:17 dom0 rtkit-daemon[5972]: Watchdog thread running.
  2513. Apr 20 15:27:17 dom0 rtkit-daemon[5972]: Successfully made thread 5971 of process 5971 (/usr/bin/pulseaudio) owned by '1000' high priority at nice level -11.
  2514. Apr 20 15:27:17 dom0 rtkit-daemon[5972]: Successfully made thread 5989 of process 5971 (/usr/bin/pulseaudio) owned by '1000' RT at priority 5.
  2515. Apr 20 15:27:17 dom0 pulseaudio[5971]: stat('/etc/pulse/default.pa.d'): No such file or directory
  2516. Apr 20 15:27:17 dom0 systemd[5754]: Started pulseaudio.service - Sound Service.
  2517. Apr 20 15:27:17 dom0 systemd[5754]: Created slice app-qubes\x2dwidget.slice - Slice /app/qubes-widget.
  2518. Apr 20 15:27:17 dom0 sudo[6049]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory
  2519. Apr 20 15:27:17 dom0 audit[6049]: USER_ACCT pid=6049 uid=1000 auid=1000 ses=2 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="shydonnie" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
  2520. Apr 20 15:27:17 dom0 audit[6049]: USER_CMD pid=6049 uid=1000 auid=1000 ses=2 msg='cwd="/home/shydonnie" cmd=2F62696E2F73797374656D63746C202D2D6E6F2D626C6F636B2073746172742071756265732D696E7075742D73656E6465722D6B6579626F617264406576656E74332E73657276696365 exe="/usr/bin/sudo" terminal=? res=success'
  2521. Apr 20 15:27:17 dom0 audit[6049]: CRED_REFR pid=6049 uid=1000 auid=1000 ses=2 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
  2522. Apr 20 15:27:17 dom0 audit[6049]: USER_START pid=6049 uid=1000 auid=1000 ses=2 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
  2523. Apr 20 15:27:17 dom0 sudo[6049]: PAM adding faulty module: /usr/lib64/security/pam_sss.so
  2524. Apr 20 15:27:17 dom0 systemd[5754]: Started [email protected] - Qubes Widget service.
  2525. Apr 20 15:27:17 dom0 sudo[6049]: shydonnie : PWD=/home/shydonnie ; USER=root ; COMMAND=/bin/systemctl --no-block start [email protected]
  2526. Apr 20 15:27:17 dom0 sudo[6049]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000)
  2527. Apr 20 15:27:17 dom0 systemd[1]: Started [email protected] - Qubes input proxy sender (keyboard).
  2528. Apr 20 15:27:17 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event3 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  2529. Apr 20 15:27:17 dom0 systemd[5754]: Started [email protected] - Qubes Widget service.
  2530. Apr 20 15:27:17 dom0 sudo[6049]: pam_unix(sudo:session): session closed for user root
  2531. Apr 20 15:27:17 dom0 audit[6049]: USER_END pid=6049 uid=1000 auid=1000 ses=2 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
  2532. Apr 20 15:27:17 dom0 audit[6049]: CRED_DISP pid=6049 uid=1000 auid=1000 ses=2 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
  2533. Apr 20 15:27:17 dom0 qubes-input-sender[6053]: Device /dev/input/event3 is already in dom0
  2534. Apr 20 15:27:17 dom0 systemd[1]: [email protected]: Deactivated successfully.
  2535. Apr 20 15:27:17 dom0 systemd[5754]: Started [email protected] - Qubes Widget service.
  2536. Apr 20 15:27:17 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event3 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  2537. Apr 20 15:27:17 dom0 systemd[5754]: Started [email protected] - Qubes Widget service.
  2538. Apr 20 15:27:17 dom0 systemd[5754]: Started [email protected] - Qubes Widget service.
  2539. Apr 20 15:27:17 dom0 systemd[5754]: Starting qubes-app-menu.service - Qubes Application Menu...
  2540. Apr 20 15:27:17 dom0 sudo[6065]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory
  2541. Apr 20 15:27:17 dom0 sudo[6065]: PAM adding faulty module: /usr/lib64/security/pam_sss.so
  2542. Apr 20 15:27:17 dom0 audit[6065]: USER_ACCT pid=6065 uid=1000 auid=1000 ses=2 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="shydonnie" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
  2543. Apr 20 15:27:17 dom0 audit[6065]: USER_CMD pid=6065 uid=1000 auid=1000 ses=2 msg='cwd="/home/shydonnie" cmd=2F62696E2F73797374656D63746C202D2D6E6F2D626C6F636B2073746172742071756265732D696E7075742D73656E6465722D6B6579626F617264406576656E74322E73657276696365 exe="/usr/bin/sudo" terminal=? res=success'
  2544. Apr 20 15:27:17 dom0 sudo[6065]: shydonnie : PWD=/home/shydonnie ; USER=root ; COMMAND=/bin/systemctl --no-block start [email protected]
  2545. Apr 20 15:27:17 dom0 audit[6065]: CRED_REFR pid=6065 uid=1000 auid=1000 ses=2 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
  2546. Apr 20 15:27:17 dom0 sudo[6065]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000)
  2547. Apr 20 15:27:17 dom0 audit[6065]: USER_START pid=6065 uid=1000 auid=1000 ses=2 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
  2548. Apr 20 15:27:17 dom0 systemd[1]: Started [email protected] - Qubes input proxy sender (keyboard).
  2549. Apr 20 15:27:17 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event2 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  2550. Apr 20 15:27:17 dom0 qubes-input-sender[6067]: Device /dev/input/event2 is already in dom0
  2551. Apr 20 15:27:17 dom0 audit[6065]: USER_END pid=6065 uid=1000 auid=1000 ses=2 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
  2552. Apr 20 15:27:17 dom0 audit[6065]: CRED_DISP pid=6065 uid=1000 auid=1000 ses=2 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
  2553. Apr 20 15:27:17 dom0 sudo[6065]: pam_unix(sudo:session): session closed for user root
  2554. Apr 20 15:27:17 dom0 systemd[1]: [email protected]: Deactivated successfully.
  2555. Apr 20 15:27:17 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event2 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  2556. Apr 20 15:27:17 dom0 sudo[6074]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory
  2557. Apr 20 15:27:17 dom0 sudo[6074]: PAM adding faulty module: /usr/lib64/security/pam_sss.so
  2558. Apr 20 15:27:17 dom0 audit[6074]: USER_ACCT pid=6074 uid=1000 auid=1000 ses=2 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="shydonnie" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
  2559. Apr 20 15:27:17 dom0 audit[6074]: USER_CMD pid=6074 uid=1000 auid=1000 ses=2 msg='cwd="/home/shydonnie" cmd=2F62696E2F73797374656D63746C202D2D6E6F2D626C6F636B2073746172742071756265732D696E7075742D73656E6465722D6B6579626F617264406576656E74312E73657276696365 exe="/usr/bin/sudo" terminal=? res=success'
  2560. Apr 20 15:27:17 dom0 sudo[6074]: shydonnie : PWD=/home/shydonnie ; USER=root ; COMMAND=/bin/systemctl --no-block start [email protected]
  2561. Apr 20 15:27:17 dom0 audit[6074]: CRED_REFR pid=6074 uid=1000 auid=1000 ses=2 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
  2562. Apr 20 15:27:17 dom0 sudo[6074]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000)
  2563. Apr 20 15:27:17 dom0 audit[6074]: USER_START pid=6074 uid=1000 auid=1000 ses=2 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
  2564. Apr 20 15:27:17 dom0 systemd[1]: Started [email protected] - Qubes input proxy sender (keyboard).
  2565. Apr 20 15:27:17 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event1 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  2566. Apr 20 15:27:17 dom0 sudo[6074]: pam_unix(sudo:session): session closed for user root
  2567. Apr 20 15:27:17 dom0 audit[6074]: USER_END pid=6074 uid=1000 auid=1000 ses=2 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
  2568. Apr 20 15:27:17 dom0 audit[6074]: CRED_DISP pid=6074 uid=1000 auid=1000 ses=2 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
  2569. Apr 20 15:27:17 dom0 qubes-input-sender[6076]: Device /dev/input/event1 is already in dom0
  2570. Apr 20 15:27:17 dom0 systemd[1]: [email protected]: Deactivated successfully.
  2571. Apr 20 15:27:17 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event1 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  2572. Apr 20 15:27:17 dom0 sudo[6083]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory
  2573. Apr 20 15:27:17 dom0 sudo[6083]: PAM adding faulty module: /usr/lib64/security/pam_sss.so
  2574. Apr 20 15:27:17 dom0 audit[6083]: USER_ACCT pid=6083 uid=1000 auid=1000 ses=2 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="shydonnie" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
  2575. Apr 20 15:27:17 dom0 audit[6083]: USER_CMD pid=6083 uid=1000 auid=1000 ses=2 msg='cwd="/home/shydonnie" cmd=2F62696E2F73797374656D63746C202D2D6E6F2D626C6F636B2073746172742071756265732D696E7075742D73656E6465722D6B6579626F617264406576656E74302E73657276696365 exe="/usr/bin/sudo" terminal=? res=success'
  2576. Apr 20 15:27:17 dom0 sudo[6083]: shydonnie : PWD=/home/shydonnie ; USER=root ; COMMAND=/bin/systemctl --no-block start [email protected]
  2577. Apr 20 15:27:17 dom0 audit[6083]: CRED_REFR pid=6083 uid=1000 auid=1000 ses=2 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
  2578. Apr 20 15:27:17 dom0 sudo[6083]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000)
  2579. Apr 20 15:27:17 dom0 audit[6083]: USER_START pid=6083 uid=1000 auid=1000 ses=2 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
  2580. Apr 20 15:27:17 dom0 polkitd[2947]: Registered Authentication Agent for unix-session:2 (system bus name :1.64 [/usr/libexec/xfce-polkit], object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale en_US.utf8)
  2581. Apr 20 15:27:17 dom0 systemd[1]: Started [email protected] - Qubes input proxy sender (keyboard).
  2582. Apr 20 15:27:17 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  2583. Apr 20 15:27:17 dom0 sudo[6083]: pam_unix(sudo:session): session closed for user root
  2584. Apr 20 15:27:17 dom0 audit[6083]: USER_END pid=6083 uid=1000 auid=1000 ses=2 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
  2585. Apr 20 15:27:17 dom0 audit[6083]: CRED_DISP pid=6083 uid=1000 auid=1000 ses=2 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
  2586. Apr 20 15:27:17 dom0 qubes-input-sender[6101]: Device /dev/input/event0 is already in dom0
  2587. Apr 20 15:27:17 dom0 systemd[1]: [email protected]: Deactivated successfully.
  2588. Apr 20 15:27:17 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  2589. Apr 20 15:27:17 dom0 qrexec-policy-daemon[3179]: qrexec: qubes.GetDate+nanoseconds: sys-firewall -> @default: allowed to dom0
  2590. Apr 20 15:27:17 dom0 systemd[5754]: Started qubes-app-menu.service - Qubes Application Menu.
  2591. Apr 20 15:27:18 dom0 qrexec-policy-daemon[3179]: qrexec: qubes.WindowIconUpdater+: sys-whonix -> @adminvm: allowed to dom0
  2592. Apr 20 15:27:18 dom0 qrexec-policy-daemon[3179]: qrexec: qubes.WindowIconUpdater+: sys-firewall -> @adminvm: allowed to dom0
  2593. Apr 20 15:27:18 dom0 qrexec-policy-daemon[3179]: qrexec: qubes.WindowIconUpdater+: sys-net -> @adminvm: allowed to dom0
  2594. Apr 20 15:27:19 dom0 qrexec-policy-daemon[3179]: qrexec: qubes.WindowIconUpdater+: sys-usb -> @adminvm: allowed to dom0
  2595. Apr 20 15:27:25 dom0 systemd[1]: Stopping [email protected] - User Manager for UID 993...
  2596. Apr 20 15:27:25 dom0 systemd[5484]: Activating special unit exit.target...
  2597. Apr 20 15:27:25 dom0 systemd[5484]: Stopped target default.target - Main User Target.
  2598. Apr 20 15:27:25 dom0 systemd[5484]: Stopping at-spi-dbus-bus.service - Accessibility services bus...
  2599. Apr 20 15:27:25 dom0 systemd[5484]: Stopping dbus-:[email protected]...
  2600. Apr 20 15:27:25 dom0 dbus-broker[5521]: Dispatched 22 messages @ 4(±4)μs / message.
  2601. Apr 20 15:27:25 dom0 systemd[5484]: Stopping gvfs-daemon.service - Virtual filesystem service...
  2602. Apr 20 15:27:25 dom0 systemd[5484]: Stopped at-spi-dbus-bus.service - Accessibility services bus.
  2603. Apr 20 15:27:25 dom0 systemd[5484]: Stopped gvfs-daemon.service - Virtual filesystem service.
  2604. Apr 20 15:27:25 dom0 systemd[5484]: Stopped dbus-:[email protected].
  2605. Apr 20 15:27:25 dom0 systemd[5484]: Removed slice app-dbus\x2d:1.4\x2dorg.a11y.atspi.Registry.slice - Slice /app/dbus-:1.4-org.a11y.atspi.Registry.
  2606. Apr 20 15:27:25 dom0 systemd[5484]: Stopped target basic.target - Basic System.
  2607. Apr 20 15:27:25 dom0 systemd[5484]: Stopped target paths.target - Paths.
  2608. Apr 20 15:27:25 dom0 systemd[5484]: Stopped target sockets.target - Sockets.
  2609. Apr 20 15:27:25 dom0 systemd[5484]: Stopped target timers.target - Timers.
  2610. Apr 20 15:27:25 dom0 systemd[5484]: Stopped systemd-tmpfiles-clean.timer - Daily Cleanup of User's Temporary Directories.
  2611. Apr 20 15:27:25 dom0 systemd[5484]: Closed pulseaudio.socket - Sound System.
  2612. Apr 20 15:27:25 dom0 dbus-broker[5514]: Dispatched 259 messages @ 4(±4)μs / message.
  2613. Apr 20 15:27:25 dom0 systemd[5484]: Stopping dbus-broker.service - D-Bus User Message Bus...
  2614. Apr 20 15:27:25 dom0 systemd[5484]: Stopped systemd-tmpfiles-setup.service - Create User's Volatile Files and Directories.
  2615. Apr 20 15:27:25 dom0 systemd[5484]: Stopped dbus-broker.service - D-Bus User Message Bus.
  2616. Apr 20 15:27:25 dom0 systemd[5484]: Removed slice session.slice - User Core Session Slice.
  2617. Apr 20 15:27:25 dom0 systemd[5484]: Closed dbus.socket - D-Bus User Message Bus Socket.
  2618. Apr 20 15:27:25 dom0 systemd[5484]: Removed slice app.slice - User Application Slice.
  2619. Apr 20 15:27:25 dom0 systemd[5484]: Reached target shutdown.target - Shutdown.
  2620. Apr 20 15:27:25 dom0 systemd[5484]: Finished systemd-exit.service - Exit the Session.
  2621. Apr 20 15:27:25 dom0 systemd[5484]: Reached target exit.target - Exit the Session.
  2622. Apr 20 15:27:25 dom0 systemd[1]: [email protected]: Deactivated successfully.
  2623. Apr 20 15:27:25 dom0 systemd[1]: Stopped [email protected] - User Manager for UID 993.
  2624. Apr 20 15:27:25 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user@993 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  2625. Apr 20 15:27:25 dom0 kernel: kauditd_printk_skb: 41 callbacks suppressed
  2626. Apr 20 15:27:25 dom0 kernel: audit: type=1131 audit(1713644845.853:452): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user@993 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  2627. Apr 20 15:27:25 dom0 systemd[1]: Stopping [email protected] - User Runtime Directory /run/user/993...
  2628. Apr 20 15:27:25 dom0 systemd[1]: run-user-993.mount: Deactivated successfully.
  2629. Apr 20 15:27:25 dom0 systemd[1]: [email protected]: Deactivated successfully.
  2630. Apr 20 15:27:25 dom0 systemd[1]: Stopped [email protected] - User Runtime Directory /run/user/993.
  2631. Apr 20 15:27:25 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@993 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  2632. Apr 20 15:27:25 dom0 kernel: audit: type=1131 audit(1713644845.889:453): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@993 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  2633. Apr 20 15:27:25 dom0 systemd[1]: Removed slice user-993.slice - User Slice of UID 993.
  2634. Apr 20 15:27:25 dom0 systemd[1]: user-993.slice: Consumed 1.674s CPU time.
  2635. Apr 20 15:27:47 dom0 systemd[1]: systemd-hostnamed.service: Deactivated successfully.
  2636. Apr 20 15:27:47 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  2637. Apr 20 15:27:47 dom0 kernel: audit: type=1131 audit(1713644867.731:454): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  2638. Apr 20 15:27:47 dom0 audit: BPF prog-id=67 op=UNLOAD
  2639. Apr 20 15:27:47 dom0 audit: BPF prog-id=66 op=UNLOAD
  2640. Apr 20 15:27:47 dom0 audit: BPF prog-id=65 op=UNLOAD
  2641. Apr 20 15:27:47 dom0 kernel: audit: type=1334 audit(1713644867.761:455): prog-id=67 op=UNLOAD
  2642. Apr 20 15:27:47 dom0 kernel: audit: type=1334 audit(1713644867.761:456): prog-id=66 op=UNLOAD
  2643. Apr 20 15:27:47 dom0 kernel: audit: type=1334 audit(1713644867.761:457): prog-id=65 op=UNLOAD
  2644. Apr 20 15:29:30 dom0 qubesd[3175]: vm.sys-audio: Starting sys-audio
  2645. Apr 20 15:29:30 dom0 lvm[2499]: No longer monitoring thin pool qubes_dom0-vm--pool-tpool.
  2646. Apr 20 15:29:30 dom0 lvm[2499]: Monitoring thin pool qubes_dom0-vm--pool-tpool.
  2647. Apr 20 15:29:30 dom0 systemd[5754]: Starting grub-boot-success.service - Mark boot as successful...
  2648. Apr 20 15:29:30 dom0 systemd[5754]: Finished grub-boot-success.service - Mark boot as successful.
  2649. Apr 20 15:29:30 dom0 lvm[2499]: No longer monitoring thin pool qubes_dom0-vm--pool-tpool.
  2650. Apr 20 15:29:30 dom0 lvm[2499]: Monitoring thin pool qubes_dom0-vm--pool-tpool.
  2651. Apr 20 15:29:30 dom0 libvirtd[2952]: internal error: Unable to reset PCI device 0000:00:1f.3: no FLR, PM reset or bus reset available
  2652. Apr 20 15:29:30 dom0 libvirtd[2952]: Failed to reset PCI device: internal error: Unable to reset PCI device 0000:00:1f.3: no FLR, PM reset or bus reset available
  2653. Apr 20 15:29:30 dom0 qubesd[3175]: vm.sys-audio: Start failed: internal error: Unable to reset PCI device 0000:00:1f.3: no FLR, PM reset or bus reset available
  2654. Apr 20 15:29:55 dom0 systemd[1]: /usr/lib/systemd/system/qubes-suspend.service:9: Standard output type syslog is obsolete, automatically updating to journal. Please update your unit file, and consider removing the setting altogether.
  2655. Apr 20 15:29:57 dom0 audit[5550]: USER_LOGOUT pid=5550 uid=0 auid=1000 ses=2 msg='op=logout id=1000 exe="/usr/sbin/lightdm" hostname=dom0 addr=? terminal=/dev/tty1 res=success'
  2656. Apr 20 15:29:57 dom0 kernel: audit: type=1113 audit(1713644997.285:458): pid=5550 uid=0 auid=1000 ses=2 msg='op=logout id=1000 exe="/usr/sbin/lightdm" hostname=dom0 addr=? terminal=/dev/tty1 res=success'
  2657. Apr 20 15:29:57 dom0 lightdm[5550]: pam_unix(lightdm:session): session closed for user shydonnie
  2658. Apr 20 15:29:57 dom0 audit[5550]: USER_END pid=5550 uid=0 auid=1000 ses=2 msg='op=PAM:session_close grantors=pam_selinux,pam_loginuid,pam_selinux,pam_keyinit,pam_namespace,pam_keyinit,pam_limits,pam_systemd,pam_unix,pam_lastlog,pam_umask,pam_lastlog acct="shydonnie" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
  2659. Apr 20 15:29:57 dom0 audit[5550]: CRED_DISP pid=5550 uid=0 auid=1000 ses=2 msg='op=PAM:setcred grantors=pam_localuser,pam_unix acct="shydonnie" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
  2660. Apr 20 15:29:57 dom0 kernel: audit: type=1106 audit(1713644997.286:459): pid=5550 uid=0 auid=1000 ses=2 msg='op=PAM:session_close grantors=pam_selinux,pam_loginuid,pam_selinux,pam_keyinit,pam_namespace,pam_keyinit,pam_limits,pam_systemd,pam_unix,pam_lastlog,pam_umask,pam_lastlog acct="shydonnie" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
  2661. Apr 20 15:29:57 dom0 kernel: audit: type=1104 audit(1713644997.286:460): pid=5550 uid=0 auid=1000 ses=2 msg='op=PAM:setcred grantors=pam_localuser,pam_unix acct="shydonnie" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
  2662. Apr 20 15:29:57 dom0 systemd-logind[2904]: Session 2 logged out. Waiting for processes to exit.
  2663. Apr 20 15:29:57 dom0 at-spi2-registryd[5847]: X connection to :0 broken (explicit kill or server shutdown).
  2664. Apr 20 15:29:57 dom0 audit[6031]: ANOM_ABEND auid=1000 uid=1000 gid=1000 ses=2 pid=6031 comm="xss-lock" exe="/usr/bin/xss-lock" sig=5 res=1
  2665. Apr 20 15:29:57 dom0 kernel: traps: xss-lock[6031] trap int3 ip:709cd35f0e71 sp:7ffc56b76c30 error:0 in libglib-2.0.so.0.7400.7[709cd35b0000+93000]
  2666. Apr 20 15:29:57 dom0 kernel: audit: type=1701 audit(1713644997.293:461): auid=1000 uid=1000 gid=1000 ses=2 pid=6031 comm="xss-lock" exe="/usr/bin/xss-lock" sig=5 res=1
  2667. Apr 20 15:29:57 dom0 systemd[5754]: dbus-:[email protected]: Main process exited, code=exited, status=1/FAILURE
  2668. Apr 20 15:29:57 dom0 systemd[5754]: dbus-:[email protected]: Failed with result 'exit-code'.
  2669. Apr 20 15:29:57 dom0 polkitd[2947]: Unregistered Authentication Agent for unix-session:2 (system bus name :1.64, object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale en_US.utf8) (disconnected from bus)
  2670. Apr 20 15:29:57 dom0 python3[6307]: The X11 connection broke (error 1). Did the X11 server die?
  2671. Apr 20 15:29:57 dom0 systemd[1]: Created slice system-systemd\x2dcoredump.slice - Slice /system/systemd-coredump.
  2672. Apr 20 15:29:57 dom0 audit: BPF prog-id=68 op=LOAD
  2673. Apr 20 15:29:57 dom0 audit: BPF prog-id=69 op=LOAD
  2674. Apr 20 15:29:57 dom0 kernel: audit: type=1334 audit(1713644997.305:462): prog-id=68 op=LOAD
  2675. Apr 20 15:29:57 dom0 kernel: audit: type=1334 audit(1713644997.305:463): prog-id=69 op=LOAD
  2676. Apr 20 15:29:57 dom0 kernel: audit: type=1334 audit(1713644997.306:464): prog-id=70 op=LOAD
  2677. Apr 20 15:29:57 dom0 audit: BPF prog-id=70 op=LOAD
  2678. Apr 20 15:29:57 dom0 systemd[5754]: qubes-app-menu.service: Main process exited, code=exited, status=1/FAILURE
  2679. Apr 20 15:29:57 dom0 systemd[5754]: qubes-app-menu.service: Failed with result 'exit-code'.
  2680. Apr 20 15:29:57 dom0 systemd[1]: Started [email protected] - Process Core Dump (PID 6719/UID 0).
  2681. Apr 20 15:29:57 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-coredump@0-6719-0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  2682. Apr 20 15:29:57 dom0 kernel: audit: type=1130 audit(1713644997.315:465): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-coredump@0-6719-0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  2683. Apr 20 15:29:57 dom0 qrexec-policy-daemon[3179]: qrexec: qubes.WindowIconUpdater+: sys-usb -> @adminvm: allowed to dom0
  2684. Apr 20 15:29:57 dom0 qrexec-policy-daemon[3179]: qrexec: qubes.WindowIconUpdater+: sys-firewall -> @adminvm: allowed to dom0
  2685. Apr 20 15:29:57 dom0 qrexec-policy-daemon[3179]: qrexec: qubes.WindowIconUpdater+: sys-whonix -> @adminvm: allowed to dom0
  2686. Apr 20 15:29:57 dom0 qrexec-policy-daemon[3179]: qrexec: qubes.WindowIconUpdater+: sys-net -> @adminvm: allowed to dom0
  2687. Apr 20 15:29:57 dom0 systemd-coredump[6725]: Process 6031 (xss-lock) of user 1000 dumped core.
  2688.  
  2689. Module linux-vdso.so.1 with build-id fc30f0b09d2949bc7417dd15adae701fced24144
  2690. Module libblkid.so.1 with build-id aeba6db218817bd52da2ff14e8c369d370ba25cf
  2691. Metadata for module libblkid.so.1 owned by FDO found: {
  2692. "type" : "rpm",
  2693. "name" : "util-linux",
  2694. "version" : "2.38.1-1.fc37",
  2695. "architecture" : "x86_64",
  2696. "osCpe" : "cpe:/o:fedoraproject:fedora:37"
  2697. }
  2698.  
  2699. Module ld-linux-x86-64.so.2 with build-id 2a137f1a591c7631a2013d7ee69e30d1e098bdf1
  2700. Module libXau.so.6 with build-id 5f69b36d838d0ec4967f94dd1ea95fd830262997
  2701. Metadata for module libXau.so.6 owned by FDO found: {
  2702. "type" : "rpm",
  2703. "name" : "libXau",
  2704. "version" : "1.0.10-1.fc37",
  2705. "architecture" : "x86_64",
  2706. "osCpe" : "cpe:/o:fedoraproject:fedora:37"
  2707. }
  2708.  
  2709. Module libpcre2-8.so.0 with build-id 51cf2b0dc0884111cd6107b8b84bc1dc9e896de6
  2710. Metadata for module libpcre2-8.so.0 owned by FDO found: {
  2711. "type" : "rpm",
  2712. "name" : "pcre2",
  2713. "version" : "10.40-1.fc37.1",
  2714. "architecture" : "x86_64",
  2715. "osCpe" : "cpe:/o:fedoraproject:fedora:37"
  2716. }
  2717.  
  2718. Module libffi.so.8 with build-id 56594b436dfdeaf3559f3dd0748c0e476cca46de
  2719. Metadata for module libffi.so.8 owned by FDO found: {
  2720. "type" : "rpm",
  2721. "name" : "libffi",
  2722. "version" : "3.4.4-1.fc37",
  2723. "architecture" : "x86_64",
  2724. "osCpe" : "cpe:/o:fedoraproject:fedora:37"
  2725. }
  2726.  
  2727. Module libselinux.so.1 with build-id 642d96d223006627bffcc8d8b48cc93e64e25333
  2728. Metadata for module libselinux.so.1 owned by FDO found: {
  2729. "type" : "rpm",
  2730. "name" : "libselinux",
  2731. "version" : "3.5-1.fc37",
  2732. "architecture" : "x86_64",
  2733. "osCpe" : "cpe:/o:fedoraproject:fedora:37"
  2734. }
  2735.  
  2736. Module libmount.so.1 with build-id cbe744c886c143f7a882cd8f69499753c6f024d6
  2737. Metadata for module libmount.so.1 owned by FDO found: {
  2738. "type" : "rpm",
  2739. "name" : "util-linux",
  2740. "version" : "2.38.1-1.fc37",
  2741. "architecture" : "x86_64",
  2742. "osCpe" : "cpe:/o:fedoraproject:fedora:37"
  2743. }
  2744.  
  2745. Module libz.so.1 with build-id d94299d7572e23295ceaf7674110eb6f2689cd91
  2746. Metadata for module libz.so.1 owned by FDO found: {
  2747. "type" : "rpm",
  2748. "name" : "zlib",
  2749. "version" : "1.2.12-5.fc37",
  2750. "architecture" : "x86_64",
  2751. "osCpe" : "cpe:/o:fedoraproject:fedora:37"
  2752. }
  2753.  
  2754. Module libgmodule-2.0.so.0 with build-id 61ff2329a99e3a88f280bda3f8b660f720069adf
  2755. Metadata for module libgmodule-2.0.so.0 owned by FDO found: {
  2756. "type" : "rpm",
  2757. "name" : "glib2",
  2758. "version" : "2.74.7-2.fc37",
  2759. "architecture" : "x86_64",
  2760. "osCpe" : "cpe:/o:fedoraproject:fedora:37"
  2761. }
  2762.  
  2763. Module libc.so.6 with build-id 0dc6d3e329f8bf5e8c1de63c4c9d560fb9953ade
  2764. Module libxcb-screensaver.so.0 with build-id b1c93afcd2f987310b2295498c558bd237c9e522
  2765. Metadata for module libxcb-screensaver.so.0 owned by FDO found: {
  2766. "type" : "rpm",
  2767. "name" : "libxcb",
  2768. "version" : "1.13.1-10.fc37",
  2769. "architecture" : "x86_64",
  2770. "osCpe" : "cpe:/o:fedoraproject:fedora:37"
  2771. }
  2772.  
  2773. Module libxcb.so.1 with build-id ebd859356a894dd26575ee80f1b1037b50f292a2
  2774. Metadata for module libxcb.so.1 owned by FDO found: {
  2775. "type" : "rpm",
  2776. "name" : "libxcb",
  2777. "version" : "1.13.1-10.fc37",
  2778. "architecture" : "x86_64",
  2779. "osCpe" : "cpe:/o:fedoraproject:fedora:37"
  2780. }
  2781.  
  2782. Module libxcb-util.so.1 with build-id 7d9252ff4ac6cbb6f4237b8722e466b9a47522b4
  2783. Metadata for module libxcb-util.so.1 owned by FDO found: {
  2784. "type" : "rpm",
  2785. "name" : "xcb-util",
  2786. "version" : "0.4.0-20.fc37",
  2787. "architecture" : "x86_64",
  2788. "osCpe" : "cpe:/o:fedoraproject:fedora:37"
  2789. }
  2790.  
  2791. Module libglib-2.0.so.0 with build-id 3f164d599522e5fd8c45f0e9a5198d004cb5d80e
  2792. Metadata for module libglib-2.0.so.0 owned by FDO found: {
  2793. "type" : "rpm",
  2794. "name" : "glib2",
  2795. "version" : "2.74.7-2.fc37",
  2796. "architecture" : "x86_64",
  2797. "osCpe" : "cpe:/o:fedoraproject:fedora:37"
  2798. }
  2799.  
  2800. Module libgobject-2.0.so.0 with build-id 4b5daa307a6ee96e34839565dc9091f52d92bb39
  2801. Metadata for module libgobject-2.0.so.0 owned by FDO found: {
  2802. "type" : "rpm",
  2803. "name" : "glib2",
  2804. "version" : "2.74.7-2.fc37",
  2805. "architecture" : "x86_64",
  2806. "osCpe" : "cpe:/o:fedoraproject:fedora:37"
  2807. }
  2808.  
  2809. Module libgio-2.0.so.0 with build-id 94831de1a174bfbc5b685d58df5ac0eb30474068
  2810. Metadata for module libgio-2.0.so.0 owned by FDO found: {
  2811. "type" : "rpm",
  2812. "name" : "glib2",
  2813. "version" : "2.74.7-2.fc37",
  2814. "architecture" : "x86_64",
  2815. "osCpe" : "cpe:/o:fedoraproject:fedora:37"
  2816. }
  2817.  
  2818. Module xss-lock with build-id 7652fad39372ac7602468f608220aabd8847150f
  2819. Metadata for module xss-lock owned by FDO found: {
  2820. "type" : "rpm",
  2821. "name" : "xss-lock",
  2822. "version" : "0.3.0-18.20140302git.fc37",
  2823. "architecture" : "x86_64",
  2824. "osCpe" : "cpe:/o:fedoraproject:fedora:37"
  2825. }
  2826.  
  2827. Stack trace of thread 6031:
  2828. #0 0x0000709cd35f0e71 g_logv (libglib-2.0.so.0 + 0x5ee71)
  2829. #1 0x0000709cd35f10f3 g_log (libglib-2.0.so.0 + 0x5f0f3)
  2830. #2 0x000061d5040c84f5 screensaver_event_cb (xss-lock + 0x44f5)
  2831. #3 0x000061d5040c8d4d xcb_event_dispatch (xss-lock + 0x4d4d)
  2832. #4 0x0000709cd35e8c7f g_main_context_dispatch (libglib-2.0.so.0 + 0x56c7f)
  2833. #5 0x0000709cd363f178 g_main_context_iterate.constprop.0 (libglib-2.0.so.0 + 0xad178)
  2834. #6 0x0000709cd35e824f g_main_loop_run (libglib-2.0.so.0 + 0x5624f)
  2835. #7 0x000061d5040c7e68 main (xss-lock + 0x3e68)
  2836. #8 0x0000709cd33a0550 __libc_start_call_main (libc.so.6 + 0x27550)
  2837. #9 0x0000709cd33a0609 __libc_start_main@@GLIBC_2.34 (libc.so.6 + 0x27609)
  2838. #10 0x000061d5040c8025 _start (xss-lock + 0x4025)
  2839.  
  2840. Stack trace of thread 6068:
  2841. #0 0x0000709cd34782bf __poll (libc.so.6 + 0xff2bf)
  2842. #1 0x0000709cd363f0ed g_main_context_iterate.constprop.0 (libglib-2.0.so.0 + 0xad0ed)
  2843. #2 0x0000709cd35e5f00 g_main_context_iteration (libglib-2.0.so.0 + 0x53f00)
  2844. #3 0x0000709cd35e7b91 glib_worker_main (libglib-2.0.so.0 + 0x55b91)
  2845. #4 0x0000709cd3617f22 g_thread_proxy (libglib-2.0.so.0 + 0x85f22)
  2846. #5 0x0000709cd340419d start_thread (libc.so.6 + 0x8b19d)
  2847. #6 0x0000709cd3485c60 __clone3 (libc.so.6 + 0x10cc60)
  2848.  
  2849. Stack trace of thread 6070:
  2850. #0 0x0000709cd34782bf __poll (libc.so.6 + 0xff2bf)
  2851. #1 0x0000709cd363f0ed g_main_context_iterate.constprop.0 (libglib-2.0.so.0 + 0xad0ed)
  2852. #2 0x0000709cd35e824f g_main_loop_run (libglib-2.0.so.0 + 0x5624f)
  2853. #3 0x0000709cd38447da gdbus_shared_thread_func.lto_priv.0 (libgio-2.0.so.0 + 0x1117da)
  2854. #4 0x0000709cd3617f22 g_thread_proxy (libglib-2.0.so.0 + 0x85f22)
  2855. #5 0x0000709cd340419d start_thread (libc.so.6 + 0x8b19d)
  2856. #6 0x0000709cd3485c60 __clone3 (libc.so.6 + 0x10cc60)
  2857. ELF object binary architecture: AMD x86-64
  2858. Apr 20 15:29:57 dom0 systemd[1]: session-2.scope: Deactivated successfully.
  2859. Apr 20 15:29:57 dom0 kernel: audit: type=1131 audit(1713644997.430:466): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-coredump@0-6719-0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  2860. Apr 20 15:29:57 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-coredump@0-6719-0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  2861. Apr 20 15:29:57 dom0 systemd[1]: session-2.scope: Consumed 17.433s CPU time.
  2862. Apr 20 15:29:57 dom0 systemd-logind[2904]: Removed session 2.
  2863. Apr 20 15:29:57 dom0 systemd[1]: [email protected]: Deactivated successfully.
  2864. Apr 20 15:29:57 dom0 audit: BPF prog-id=70 op=UNLOAD
  2865. Apr 20 15:29:57 dom0 audit: BPF prog-id=69 op=UNLOAD
  2866. Apr 20 15:29:57 dom0 audit: BPF prog-id=68 op=UNLOAD
  2867. Apr 20 15:29:57 dom0 widget-wrapper[6720]: xhost: unable to open display ":0"
  2868. Apr 20 15:29:57 dom0 widget-wrapper[6721]: xhost: unable to open display ":0"
  2869. Apr 20 15:29:57 dom0 systemd[5754]: [email protected]: Consumed 5.323s CPU time.
  2870. Apr 20 15:29:57 dom0 widget-wrapper[6056]: exiting with 0
  2871. Apr 20 15:29:57 dom0 widget-wrapper[6723]: xhost: unable to open display ":0"
  2872. Apr 20 15:29:57 dom0 widget-wrapper[6724]: xhost: unable to open display ":0"
  2873. Apr 20 15:29:57 dom0 widget-wrapper[6722]: xhost: unable to open display ":0"
  2874. Apr 20 15:29:57 dom0 widget-wrapper[6060]: exiting with 0
  2875. Apr 20 15:29:57 dom0 widget-wrapper[6054]: exiting with 0
  2876. Apr 20 15:29:57 dom0 widget-wrapper[6057]: exiting with 0
  2877. Apr 20 15:29:57 dom0 widget-wrapper[6003]: exiting with 0
  2878. Apr 20 15:29:58 dom0 audit[6798]: CRED_ACQ pid=6798 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_env,pam_permit acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
  2879. Apr 20 15:29:58 dom0 lightdm[6798]: pam_unix(lightdm-greeter:session): session opened for user lightdm(uid=993) by (uid=0)
  2880. Apr 20 15:29:58 dom0 systemd[1]: Created slice user-993.slice - User Slice of UID 993.
  2881. Apr 20 15:29:58 dom0 systemd[1]: Starting [email protected] - User Runtime Directory /run/user/993...
  2882. Apr 20 15:29:58 dom0 systemd-logind[2904]: New session c2 of user lightdm.
  2883. Apr 20 15:29:58 dom0 systemd[1]: Finished [email protected] - User Runtime Directory /run/user/993.
  2884. Apr 20 15:29:58 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@993 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  2885. Apr 20 15:29:58 dom0 systemd[1]: Starting [email protected] - User Manager for UID 993...
  2886. Apr 20 15:29:58 dom0 (systemd)[6802]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory
  2887. Apr 20 15:29:58 dom0 (systemd)[6802]: PAM adding faulty module: /usr/lib64/security/pam_sss.so
  2888. Apr 20 15:29:58 dom0 (systemd)[6802]: pam_systemd_home(systemd-user:account): systemd-homed is not available: Could not activate remote peer: activation request failed: unknown unit.
  2889. Apr 20 15:29:58 dom0 audit[6802]: USER_ACCT pid=6802 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_unix acct="lightdm" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  2890. Apr 20 15:29:58 dom0 audit[6802]: CRED_ACQ pid=6802 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=? acct="lightdm" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
  2891. Apr 20 15:29:58 dom0 audit[6802]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=8 a1=7fffa447e930 a2=3 a3=7fffa447e645 items=0 ppid=1 pid=6802 auid=993 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4 comm="(systemd)" exe="/usr/lib/systemd/systemd" key=(null)
  2892. Apr 20 15:29:58 dom0 audit: PROCTITLE proctitle="(systemd)"
  2893. Apr 20 15:29:58 dom0 (systemd)[6802]: pam_unix(systemd-user:session): session opened for user lightdm(uid=993) by (uid=0)
  2894. Apr 20 15:29:58 dom0 audit[6802]: USER_START pid=6802 uid=0 auid=993 ses=4 msg='op=PAM:session_open grantors=pam_selinux,pam_selinux,pam_loginuid,pam_namespace,pam_systemd_home,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="lightdm" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  2895. Apr 20 15:29:58 dom0 systemd[6802]: Queued start job for default target default.target.
  2896. Apr 20 15:29:58 dom0 systemd[6802]: Created slice app.slice - User Application Slice.
  2897. Apr 20 15:29:58 dom0 systemd[6802]: grub-boot-success.timer - Mark boot as successful after the user session has run 2 minutes was skipped because of a failed condition check (ConditionUser=!@system).
  2898. Apr 20 15:29:58 dom0 systemd[6802]: Started systemd-tmpfiles-clean.timer - Daily Cleanup of User's Temporary Directories.
  2899. Apr 20 15:29:58 dom0 systemd[6802]: Reached target paths.target - Paths.
  2900. Apr 20 15:29:58 dom0 systemd[6802]: Reached target timers.target - Timers.
  2901. Apr 20 15:29:58 dom0 systemd[6802]: Starting dbus.socket - D-Bus User Message Bus Socket...
  2902. Apr 20 15:29:58 dom0 systemd[6802]: Listening on pulseaudio.socket - Sound System.
  2903. Apr 20 15:29:58 dom0 systemd[6802]: Starting systemd-tmpfiles-setup.service - Create User's Volatile Files and Directories...
  2904. Apr 20 15:29:58 dom0 systemd[6802]: Finished systemd-tmpfiles-setup.service - Create User's Volatile Files and Directories.
  2905. Apr 20 15:29:58 dom0 systemd[6802]: Listening on dbus.socket - D-Bus User Message Bus Socket.
  2906. Apr 20 15:29:58 dom0 systemd[6802]: Reached target sockets.target - Sockets.
  2907. Apr 20 15:29:58 dom0 systemd[6802]: Reached target basic.target - Basic System.
  2908. Apr 20 15:29:58 dom0 systemd[6802]: Reached target default.target - Main User Target.
  2909. Apr 20 15:29:58 dom0 systemd[1]: Started [email protected] - User Manager for UID 993.
  2910. Apr 20 15:29:58 dom0 systemd[6802]: Startup finished in 102ms.
  2911. Apr 20 15:29:58 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user@993 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  2912. Apr 20 15:29:58 dom0 systemd[1]: Started session-c2.scope - Session c2 of User lightdm.
  2913. Apr 20 15:29:58 dom0 audit[6798]: USER_START pid=6798 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_unix,pam_systemd acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
  2914. Apr 20 15:29:58 dom0 systemd[6802]: Created slice session.slice - User Core Session Slice.
  2915. Apr 20 15:29:58 dom0 systemd[6802]: Starting dbus-broker.service - D-Bus User Message Bus...
  2916. Apr 20 15:29:58 dom0 dbus-broker-launch[6831]: Service file '/usr/share/dbus-1/services/dbus-qubes-app-menu.service' is not named after the D-Bus name 'org.qubesos.appmenu'.
  2917. Apr 20 15:29:58 dom0 dbus-broker-launch[6831]: Service file '/usr/share/dbus-1/services/org.xfce.Thunar.FileManager1.service' is not named after the D-Bus name 'org.freedesktop.FileManager1'.
  2918. Apr 20 15:29:58 dom0 dbus-broker-launch[6831]: Policy to allow eavesdropping in /usr/share/dbus-1/session.conf +31: Eavesdropping is deprecated and ignored
  2919. Apr 20 15:29:58 dom0 dbus-broker-launch[6831]: Policy to allow eavesdropping in /usr/share/dbus-1/session.conf +33: Eavesdropping is deprecated and ignored
  2920. Apr 20 15:29:58 dom0 systemd[6802]: Started dbus-broker.service - D-Bus User Message Bus.
  2921. Apr 20 15:29:58 dom0 dbus-broker-launch[6831]: Ready
  2922. Apr 20 15:29:58 dom0 systemd[6802]: Starting at-spi-dbus-bus.service - Accessibility services bus...
  2923. Apr 20 15:29:58 dom0 systemd[6802]: Started at-spi-dbus-bus.service - Accessibility services bus.
  2924. Apr 20 15:29:58 dom0 at-spi-bus-launcher[6838]: Policy to allow eavesdropping in /usr/share/defaults/at-spi2/accessibility.conf +15: Eavesdropping is deprecated and ignored
  2925. Apr 20 15:29:58 dom0 at-spi-bus-launcher[6838]: Policy to allow eavesdropping in /usr/share/defaults/at-spi2/accessibility.conf +17: Eavesdropping is deprecated and ignored
  2926. Apr 20 15:29:58 dom0 dbus-broker-launch[6838]: Ready
  2927. Apr 20 15:29:58 dom0 systemd[5754]: qubes-app-menu.service: Scheduled restart job, restart counter is at 1.
  2928. Apr 20 15:29:58 dom0 systemd[5754]: Stopped qubes-app-menu.service - Qubes Application Menu.
  2929. Apr 20 15:29:58 dom0 systemd[6802]: Starting gvfs-daemon.service - Virtual filesystem service...
  2930. Apr 20 15:29:58 dom0 systemd[5754]: Starting qubes-app-menu.service - Qubes Application Menu...
  2931. Apr 20 15:29:58 dom0 systemd[6802]: Started gvfs-daemon.service - Virtual filesystem service.
  2932. Apr 20 15:29:58 dom0 systemd[6802]: Created slice app-dbus\x2d:1.4\x2dorg.a11y.atspi.Registry.slice - Slice /app/dbus-:1.4-org.a11y.atspi.Registry.
  2933. Apr 20 15:29:58 dom0 systemd[6802]: Started dbus-:[email protected].
  2934. Apr 20 15:29:58 dom0 lightdm[6873]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory
  2935. Apr 20 15:29:58 dom0 lightdm[6873]: PAM adding faulty module: /usr/lib64/security/pam_sss.so
  2936. Apr 20 15:29:58 dom0 at-spi2-registryd[6874]: SpiRegistry daemon is running with well-known name - org.a11y.atspi.Registry
  2937. Apr 20 15:29:58 dom0 qubes-app-menu[6842]: No protocol specified
  2938. Apr 20 15:29:58 dom0 qubes-app-menu[6842]: No protocol specified
  2939. Apr 20 15:29:58 dom0 qubes-app-menu[6842]: No protocol specified
  2940. Apr 20 15:29:58 dom0 systemd[5754]: qubes-app-menu.service: Main process exited, code=exited, status=6/NOTCONFIGURED
  2941. Apr 20 15:29:58 dom0 systemd[5754]: qubes-app-menu.service: Failed with result 'exit-code'.
  2942. Apr 20 15:29:58 dom0 systemd[5754]: Failed to start qubes-app-menu.service - Qubes Application Menu.
  2943. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception.
  2944. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception.
  2945. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception.
  2946. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception.
  2947. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception.
  2948. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception.
  2949. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception.
  2950. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception.
  2951. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception.
  2952. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception.
  2953. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception.
  2954. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception.
  2955. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception.
  2956. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception.
  2957. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception.
  2958. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception.
  2959. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception.
  2960. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception.
  2961. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception.
  2962. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception.
  2963. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception.
  2964. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception.
  2965. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception.
  2966. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception.
  2967. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception.
  2968. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception.
  2969. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception.
  2970. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception.
  2971. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception.
  2972. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception.
  2973. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception.
  2974. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception.
  2975. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception.
  2976. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception.
  2977. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception.
  2978. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception.
  2979. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception.
  2980. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception.
  2981. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception.
  2982. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception.
  2983. Apr 20 15:30:02 dom0 systemd-logind[2904]: Delay lock is active (UID 0/root, PID 2952/libvirtd) but inhibitor timeout is reached.
  2984. Apr 20 15:30:02 dom0 systemd-logind[2904]: System is rebooting.
  2985. Apr 20 15:30:02 dom0 systemd[1]: Stopping session-c2.scope - Session c2 of User lightdm...
  2986. Apr 20 15:30:02 dom0 systemd[1]: Removed slice system-getty.slice - Slice /system/getty.
  2987. Apr 20 15:30:02 dom0 systemd[1]: Removed slice system-modprobe.slice - Slice /system/modprobe.
  2988. Apr 20 15:30:02 dom0 systemd[1]: Removed slice system-qubes\x2dinput\x2dsender\x2dkeyboard.slice - Slice /system/qubes-input-sender-keyboard.
  2989. Apr 20 15:30:02 dom0 systemd[1]: Removed slice system-qubes\x2dinput\x2dsender\x2dkeyboard\x2dmouse.slice - Slice /system/qubes-input-sender-keyboard-mouse.
  2990. Apr 20 15:30:02 dom0 systemd[1]: Removed slice system-qubes\x2dinput\x2dsender\x2dmouse.slice - Slice /system/qubes-input-sender-mouse.
  2991. Apr 20 15:30:02 dom0 systemd[1]: Removed slice system-systemd\x2dcoredump.slice - Slice /system/systemd-coredump.
  2992. Apr 20 15:30:02 dom0 systemd[1]: Stopped target blockdev@dev-mapper-luks\x2d5241442a\x2d6636\x2d45da\x2d8731\x2d66d029364f3d.target - Block Device Preparation for /dev/mapper/luks-5241442a-6636-45da-8731-66d029364f3d.
  2993. Apr 20 15:30:02 dom0 systemd[1]: Stopped target graphical.target - Graphical Interface.
  2994. Apr 20 15:30:02 dom0 systemd[1]: Stopped target multi-user.target - Multi-User System.
  2995. Apr 20 15:30:02 dom0 systemd[1]: Stopped target getty.target - Login Prompts.
  2996. Apr 20 15:30:02 dom0 systemd[1]: Stopped target network-pre.target - Preparation for Network.
  2997. Apr 20 15:30:02 dom0 systemd[1]: Stopped target remote-cryptsetup.target - Remote Encrypted Volumes.
  2998. Apr 20 15:30:02 dom0 systemd[1]: Stopped target timers.target - Timer Units.
  2999. Apr 20 15:30:02 dom0 systemd[1]: fstrim.timer: Deactivated successfully.
  3000. Apr 20 15:30:02 dom0 systemd[1]: Stopped fstrim.timer - Discard unused blocks once a week.
  3001. Apr 20 15:30:02 dom0 systemd[1]: logrotate.timer: Deactivated successfully.
  3002. Apr 20 15:30:02 dom0 systemd[1]: Stopped logrotate.timer - Daily rotation of log files.
  3003. Apr 20 15:30:02 dom0 systemd[1]: systemd-tmpfiles-clean.timer: Deactivated successfully.
  3004. Apr 20 15:30:02 dom0 systemd[1]: Stopped systemd-tmpfiles-clean.timer - Daily Cleanup of Temporary Directories.
  3005. Apr 20 15:30:02 dom0 systemd[1]: systemd-rfkill.socket: Deactivated successfully.
  3006. Apr 20 15:30:02 dom0 systemd[1]: Closed systemd-rfkill.socket - Load/Save RF Kill Switch Status /dev/rfkill Watch.
  3007. Apr 20 15:30:02 dom0 systemd[1]: Stopping accounts-daemon.service - Accounts Service...
  3008. Apr 20 15:30:02 dom0 lightdm[6798]: pam_unix(lightdm-greeter:session): session closed for user lightdm
  3009. Apr 20 15:30:02 dom0 systemd[1]: Stopping alsa-state.service - Manage Sound Card State (restore and store)...
  3010. Apr 20 15:30:02 dom0 audit[6798]: USER_END pid=6798 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_unix,pam_systemd acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
  3011. Apr 20 15:30:02 dom0 audit[6798]: CRED_DISP pid=6798 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_env,pam_permit acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
  3012. Apr 20 15:30:02 dom0 systemd[1]: Stopping crond.service - Command Scheduler...
  3013. Apr 20 15:30:02 dom0 kernel: kauditd_printk_skb: 13 callbacks suppressed
  3014. Apr 20 15:30:02 dom0 kernel: audit: type=1106 audit(1713645002.391:478): pid=6798 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_unix,pam_systemd acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
  3015. Apr 20 15:30:02 dom0 kernel: audit: type=1104 audit(1713645002.392:479): pid=6798 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_env,pam_permit acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success'
  3016. Apr 20 15:30:02 dom0 crond[5403]: (CRON) INFO (Shutting down)
  3017. Apr 20 15:30:02 dom0 systemd[1]: Stopping dracut-shutdown.service - Restore /run/initramfs on shutdown...
  3018. Apr 20 15:30:02 dom0 systemd[1]: grub2-systemd-integration.service - Grub2 systemctl reboot --boot-loader-menu=... support was skipped because of a failed condition check (ConditionPathExists=/run/systemd/reboot-to-boot-loader-menu).
  3019. Apr 20 15:30:02 dom0 systemd[1]: Stopping lightdm.service - Light Display Manager...
  3020. Apr 20 15:30:02 dom0 systemd[1]: Stopping polkit.service - Authorization Manager...
  3021. Apr 20 15:30:02 dom0 systemd[1]: Stopping qubes-qrexec-policy-daemon.service - Qubes remote exec policy daemon...
  3022. Apr 20 15:30:02 dom0 systemd[1]: [email protected]: Deactivated successfully.
  3023. Apr 20 15:30:02 dom0 audit[2920]: ANOM_ABEND auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2920 comm="alsactl" exe="/usr/sbin/alsactl" sig=11 res=1
  3024. Apr 20 15:30:02 dom0 systemd[1]: Stopped [email protected] - Start Qubes VM sys-firewall.
  3025. Apr 20 15:30:02 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-vm@sys-firewall comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  3026. Apr 20 15:30:02 dom0 systemd[1]: [email protected]: Deactivated successfully.
  3027. Apr 20 15:30:02 dom0 systemd[1]: Stopped [email protected] - Start Qubes VM sys-net.
  3028. Apr 20 15:30:02 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-vm@sys-net comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  3029. Apr 20 15:30:02 dom0 systemd[1]: [email protected]: Deactivated successfully.
  3030. Apr 20 15:30:02 dom0 systemd[1]: Stopped [email protected] - Start Qubes VM sys-whonix.
  3031. Apr 20 15:30:02 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-vm@sys-whonix comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  3032. Apr 20 15:30:02 dom0 systemd[1]: Stopping rtkit-daemon.service - RealtimeKit Scheduling Policy Service...
  3033. Apr 20 15:30:02 dom0 kernel: alsactl[2920]: segfault at 28 ip 00005a8564b3f42a sp 00007fff96bc13d0 error 4 in alsactl[5a8564b3b000+13000] likely on CPU 1 (core 0, socket 0)
  3034. Apr 20 15:30:02 dom0 kernel: Code: 64 48 2b 04 25 28 00 00 00 75 0e 48 81 c4 18 04 00 00 5b 5d 41 5c 41 5d c3 e8 b2 db ff ff 66 90 41 54 49 89 fc 55 53 48 8b 1f <8b> 53 28 85 d2 7e 1d 31 ed 0f 1f 44 00 00 48 8b 43 20 48 8b 3c e8
  3035. Apr 20 15:30:02 dom0 kernel: audit: type=1701 audit(1713645002.396:480): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2920 comm="alsactl" exe="/usr/sbin/alsactl" sig=11 res=1
  3036. Apr 20 15:30:02 dom0 kernel: audit: type=1131 audit(1713645002.396:481): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-vm@sys-firewall comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  3037. Apr 20 15:30:02 dom0 kernel: audit: type=1131 audit(1713645002.396:482): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-vm@sys-net comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  3038. Apr 20 15:30:02 dom0 kernel: audit: type=1131 audit(1713645002.396:483): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-vm@sys-whonix comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  3039. Apr 20 15:30:02 dom0 systemd[1]: Stopping [email protected] - Serial Getty on hvc0...
  3040. Apr 20 15:30:02 dom0 systemd[1]: systemd-network-generator.service: Deactivated successfully.
  3041. Apr 20 15:30:02 dom0 systemd[1]: Stopped systemd-network-generator.service - Generate network units from Kernel command line.
  3042. Apr 20 15:30:02 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  3043. Apr 20 15:30:02 dom0 kernel: audit: type=1131 audit(1713645002.397:484): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  3044. Apr 20 15:30:02 dom0 systemd[1]: Stopping systemd-random-seed.service - Load/Save Random Seed...
  3045. Apr 20 15:30:02 dom0 systemd[1]: Stopping udisks2.service - Disk Manager...
  3046. Apr 20 15:30:02 dom0 systemd[1]: Stopping upower.service - Daemon for power management...
  3047. Apr 20 15:30:02 dom0 systemd[1]: Stopping [email protected] - User Manager for UID 1000...
  3048. Apr 20 15:30:02 dom0 systemd[1]: xen-init-dom0.service: Deactivated successfully.
  3049. Apr 20 15:30:02 dom0 systemd[1]: Stopped xen-init-dom0.service - xen-init-dom0, initialise Dom0 configuration (xenstore nodes, JSON configuration stub).
  3050. Apr 20 15:30:02 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=xen-init-dom0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  3051. Apr 20 15:30:02 dom0 kernel: audit: type=1131 audit(1713645002.399:485): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=xen-init-dom0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  3052. Apr 20 15:30:02 dom0 systemd[5754]: Activating special unit exit.target...
  3053. Apr 20 15:30:02 dom0 systemd[5754]: Removed slice app-dbus\x2d:1.6\x2dorg.a11y.atspi.Registry.slice - Slice /app/dbus-:1.6-org.a11y.atspi.Registry.
  3054. Apr 20 15:30:02 dom0 systemd[5754]: Removed slice app-qubes\x2dwidget.slice - Slice /app/qubes-widget.
  3055. Apr 20 15:30:02 dom0 systemd[5754]: app-qubes\x2dwidget.slice: Consumed 6.321s CPU time.
  3056. Apr 20 15:30:02 dom0 systemd[5754]: Stopped target default.target - Main User Target.
  3057. Apr 20 15:30:02 dom0 dbus-broker[5839]: Dispatched 1295 messages @ 6(±5)μs / message.
  3058. Apr 20 15:30:02 dom0 systemd[5754]: Stopping at-spi-dbus-bus.service - Accessibility services bus...
  3059. Apr 20 15:30:02 dom0 systemd[5754]: Stopping dbus-:[email protected]...
  3060. Apr 20 15:30:02 dom0 systemd[5754]: Stopping gvfs-daemon.service - Virtual filesystem service...
  3061. Apr 20 15:30:02 dom0 systemd[5754]: Stopping gvfs-metadata.service - Virtual filesystem metadata service...
  3062. Apr 20 15:30:02 dom0 systemd[5754]: Stopping gvfs-udisks2-volume-monitor.service - Virtual filesystem service - disk device monitor...
  3063. Apr 20 15:30:02 dom0 udisksd[2906]: udisks daemon version 2.9.4 exiting
  3064. Apr 20 15:30:02 dom0 systemd[5754]: Stopped dbus-:[email protected].
  3065. Apr 20 15:30:02 dom0 udisksd[2906]: **
  3066. Apr 20 15:30:02 dom0 udisksd[2906]: GLib-GIO:ERROR:../gio/gresource.c:1451:g_static_resource_fini: assertion failed: (g_atomic_int_get (&resource->ref_count) >= 2)
  3067. Apr 20 15:30:02 dom0 udisksd[2906]: Bail out! GLib-GIO:ERROR:../gio/gresource.c:1451:g_static_resource_fini: assertion failed: (g_atomic_int_get (&resource->ref_count) >= 2)
  3068. Apr 20 15:30:02 dom0 audit[2906]: ANOM_ABEND auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2906 comm="udisksd" exe="/usr/libexec/udisks2/udisksd" sig=6 res=1
  3069. Apr 20 15:30:02 dom0 kernel: audit: type=1701 audit(1713645002.401:486): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2906 comm="udisksd" exe="/usr/libexec/udisks2/udisksd" sig=6 res=1
  3070. Apr 20 15:30:02 dom0 systemd[5754]: gvfs-daemon.service: Killing process 5932 (gdbus) with signal SIGKILL.
  3071. Apr 20 15:30:02 dom0 systemd[5754]: Stopped gvfs-metadata.service - Virtual filesystem metadata service.
  3072. Apr 20 15:30:02 dom0 systemd[1]: qubes-qrexec-policy-daemon.service: Deactivated successfully.
  3073. Apr 20 15:30:02 dom0 systemd[1]: Stopped qubes-qrexec-policy-daemon.service - Qubes remote exec policy daemon.
  3074. Apr 20 15:30:02 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-qrexec-policy-daemon comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  3075. Apr 20 15:30:02 dom0 kernel: nvme0n1p2: Can't mount, would change RO state
  3076. Apr 20 15:30:02 dom0 systemd[1]: polkit.service: Deactivated successfully.
  3077. Apr 20 15:30:02 dom0 systemd[5754]: Removed slice app-dbus\x2d:1.2\x2dorg.xfce.Xfconf.slice - Slice /app/dbus-:1.2-org.xfce.Xfconf.
  3078. Apr 20 15:30:02 dom0 systemd[1]: Stopped polkit.service - Authorization Manager.
  3079. Apr 20 15:30:02 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=polkit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  3080. Apr 20 15:30:02 dom0 systemd[1]: crond.service: Deactivated successfully.
  3081. Apr 20 15:30:02 dom0 systemd[1]: Stopped crond.service - Command Scheduler.
  3082. Apr 20 15:30:02 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=crond comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  3083. Apr 20 15:30:02 dom0 systemd[1]: accounts-daemon.service: Deactivated successfully.
  3084. Apr 20 15:30:02 dom0 systemd[1]: Stopped accounts-daemon.service - Accounts Service.
  3085. Apr 20 15:30:02 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=accounts-daemon comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  3086. Apr 20 15:30:02 dom0 systemd[1]: [email protected]: Deactivated successfully.
  3087. Apr 20 15:30:02 dom0 systemd[1]: Stopped [email protected] - Serial Getty on hvc0.
  3088. Apr 20 15:30:02 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=serial-getty@hvc0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  3089. Apr 20 15:30:02 dom0 systemd[5754]: Stopped gvfs-udisks2-volume-monitor.service - Virtual filesystem service - disk device monitor.
  3090. Apr 20 15:30:02 dom0 systemd[1]: rtkit-daemon.service: Deactivated successfully.
  3091. Apr 20 15:30:02 dom0 systemd[1]: Stopped rtkit-daemon.service - RealtimeKit Scheduling Policy Service.
  3092. Apr 20 15:30:02 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=rtkit-daemon comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  3093. Apr 20 15:30:02 dom0 systemd[5754]: Stopped gvfs-daemon.service - Virtual filesystem service.
  3094. Apr 20 15:30:02 dom0 systemd[1]: session-c2.scope: Deactivated successfully.
  3095. Apr 20 15:30:02 dom0 systemd[1]: Stopped session-c2.scope - Session c2 of User lightdm.
  3096. Apr 20 15:30:02 dom0 systemd-logind[2904]: Session c2 logged out. Waiting for processes to exit.
  3097. Apr 20 15:30:02 dom0 systemd[1]: alsa-state.service: Deactivated successfully.
  3098. Apr 20 15:30:02 dom0 systemd[1]: Stopped alsa-state.service - Manage Sound Card State (restore and store).
  3099. Apr 20 15:30:02 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=alsa-state comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  3100. Apr 20 15:30:02 dom0 systemd[1]: Removed slice system-serial\x2dgetty.slice - Slice /system/serial-getty.
  3101. Apr 20 15:30:02 dom0 systemd[1]: plymouth-quit-wait.service: Deactivated successfully.
  3102. Apr 20 15:30:02 dom0 systemd[1]: Stopped plymouth-quit-wait.service - Hold until boot process finishes up.
  3103. Apr 20 15:30:02 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=plymouth-quit-wait comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  3104. Apr 20 15:30:02 dom0 systemd[1]: Stopping [email protected] - User Manager for UID 993...
  3105. Apr 20 15:30:02 dom0 systemd-logind[2904]: Removed session c2.
  3106. Apr 20 15:30:02 dom0 systemd[6802]: Activating special unit exit.target...
  3107. Apr 20 15:30:02 dom0 systemd[6802]: Stopped target default.target - Main User Target.
  3108. Apr 20 15:30:02 dom0 dbus-broker[6839]: Dispatched 22 messages @ 9(±12)μs / message.
  3109. Apr 20 15:30:02 dom0 systemd[6802]: Stopping at-spi-dbus-bus.service - Accessibility services bus...
  3110. Apr 20 15:30:02 dom0 systemd[6802]: Stopping dbus-:[email protected]...
  3111. Apr 20 15:30:02 dom0 systemd[6802]: Stopping gvfs-daemon.service - Virtual filesystem service...
  3112. Apr 20 15:30:02 dom0 systemd[6802]: Stopped dbus-:[email protected].
  3113. Apr 20 15:30:02 dom0 systemd[6802]: Stopped gvfs-daemon.service - Virtual filesystem service.
  3114. Apr 20 15:30:02 dom0 systemd[6802]: Removed slice app-dbus\x2d:1.4\x2dorg.a11y.atspi.Registry.slice - Slice /app/dbus-:1.4-org.a11y.atspi.Registry.
  3115. Apr 20 15:30:02 dom0 systemd[1]: udisks2.service: Main process exited, code=dumped, status=6/ABRT
  3116. Apr 20 15:30:02 dom0 systemd[1]: udisks2.service: Failed with result 'core-dump'.
  3117. Apr 20 15:30:02 dom0 systemd[1]: Stopped udisks2.service - Disk Manager.
  3118. Apr 20 15:30:02 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=udisks2 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
  3119. Apr 20 15:30:02 dom0 systemd[6802]: Stopped at-spi-dbus-bus.service - Accessibility services bus.
  3120. Apr 20 15:30:02 dom0 systemd[6802]: Stopped target basic.target - Basic System.
  3121. Apr 20 15:30:02 dom0 systemd[6802]: Stopped target paths.target - Paths.
  3122. Apr 20 15:30:02 dom0 systemd[6802]: Stopped target sockets.target - Sockets.
  3123. Apr 20 15:30:02 dom0 systemd[6802]: Stopped target timers.target - Timers.
  3124. Apr 20 15:30:02 dom0 systemd[6802]: Stopped systemd-tmpfiles-clean.timer - Daily Cleanup of User's Temporary Directories.
  3125. Apr 20 15:30:02 dom0 systemd[6802]: Closed pulseaudio.socket - Sound System.
  3126. Apr 20 15:30:02 dom0 dbus-broker[6832]: Dispatched 258 messages @ 3(±4)μs / message.
  3127. Apr 20 15:30:02 dom0 systemd[6802]: Stopping dbus-broker.service - D-Bus User Message Bus...
  3128. Apr 20 15:30:02 dom0 systemd[6802]: Stopped systemd-tmpfiles-setup.service - Create User's Volatile Files and Directories.
  3129. Apr 20 15:30:02 dom0 systemd[6802]: Stopped dbus-broker.service - D-Bus User Message Bus.
  3130. Apr 20 15:30:02 dom0 systemd[6802]: Removed slice session.slice - User Core Session Slice.
  3131. Apr 20 15:30:02 dom0 systemd[1]: systemd-random-seed.service: Deactivated successfully.
  3132. Apr 20 15:30:02 dom0 systemd[6802]: Closed dbus.socket - D-Bus User Message Bus Socket.
  3133. Apr 20 15:30:02 dom0 systemd[1]: Stopped systemd-random-seed.service - Load/Save Random Seed.
  3134. Apr 20 15:30:02 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  3135. Apr 20 15:30:02 dom0 systemd[6802]: Removed slice app.slice - User Application Slice.
  3136. Apr 20 15:30:02 dom0 systemd[6802]: Reached target shutdown.target - Shutdown.
  3137. Apr 20 15:30:02 dom0 systemd[6802]: Finished systemd-exit.service - Exit the Session.
  3138. Apr 20 15:30:02 dom0 systemd[6802]: Reached target exit.target - Exit the Session.
  3139. Apr 20 15:30:02 dom0 systemd[1]: [email protected]: Deactivated successfully.
  3140. Apr 20 15:30:02 dom0 systemd[1]: Stopped [email protected] - User Manager for UID 993.
  3141. Apr 20 15:30:02 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user@993 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  3142. Apr 20 15:30:02 dom0 systemd[1]: Stopping [email protected] - User Runtime Directory /run/user/993...
  3143. Apr 20 15:30:02 dom0 systemd[1]: upower.service: Deactivated successfully.
  3144. Apr 20 15:30:02 dom0 systemd[1]: Stopped upower.service - Daemon for power management.
  3145. Apr 20 15:30:02 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=upower comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  3146. Apr 20 15:30:02 dom0 systemd[1]: run-user-993.mount: Deactivated successfully.
  3147. Apr 20 15:30:02 dom0 systemd[1]: Unmounted run-user-993.mount - /run/user/993.
  3148. Apr 20 15:30:02 dom0 audit: BPF prog-id=64 op=UNLOAD
  3149. Apr 20 15:30:02 dom0 systemd[1]: [email protected]: Deactivated successfully.
  3150. Apr 20 15:30:02 dom0 systemd[1]: Stopped [email protected] - User Runtime Directory /run/user/993.
  3151. Apr 20 15:30:02 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@993 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  3152. Apr 20 15:30:02 dom0 systemd[1]: Removed slice user-993.slice - User Slice of UID 993.
  3153. Apr 20 15:30:02 dom0 systemd[1]: user-993.slice: Consumed 1.083s CPU time.
  3154. Apr 20 15:30:02 dom0 systemd[5754]: Stopped at-spi-dbus-bus.service - Accessibility services bus.
  3155. Apr 20 15:30:02 dom0 systemd[5754]: Stopped target basic.target - Basic System.
  3156. Apr 20 15:30:02 dom0 systemd[5754]: Stopped target paths.target - Paths.
  3157. Apr 20 15:30:02 dom0 systemd[5754]: Stopped target sockets.target - Sockets.
  3158. Apr 20 15:30:02 dom0 systemd[5754]: Stopped target timers.target - Timers.
  3159. Apr 20 15:30:02 dom0 systemd[5754]: Stopped grub-boot-success.timer - Mark boot as successful after the user session has run 2 minutes.
  3160. Apr 20 15:30:02 dom0 systemd[5754]: Stopped systemd-tmpfiles-clean.timer - Daily Cleanup of User's Temporary Directories.
  3161. Apr 20 15:30:02 dom0 systemd[5754]: Closed pulseaudio.socket - Sound System.
  3162. Apr 20 15:30:02 dom0 dbus-broker[5801]: Dispatched 2349 messages @ 7(±13)μs / message.
  3163. Apr 20 15:30:02 dom0 systemd[5754]: Stopping dbus-broker.service - D-Bus User Message Bus...
  3164. Apr 20 15:30:02 dom0 systemd[5754]: Stopped systemd-tmpfiles-setup.service - Create User's Volatile Files and Directories.
  3165. Apr 20 15:30:02 dom0 systemd[5754]: Stopped dbus-broker.service - D-Bus User Message Bus.
  3166. Apr 20 15:30:02 dom0 systemd[5754]: Removed slice session.slice - User Core Session Slice.
  3167. Apr 20 15:30:02 dom0 systemd[5754]: Closed dbus.socket - D-Bus User Message Bus Socket.
  3168. Apr 20 15:30:02 dom0 systemd[5754]: Removed slice app.slice - User Application Slice.
  3169. Apr 20 15:30:02 dom0 systemd[5754]: app.slice: Consumed 8.054s CPU time.
  3170. Apr 20 15:30:02 dom0 systemd[5754]: Reached target shutdown.target - Shutdown.
  3171. Apr 20 15:30:02 dom0 systemd[5754]: Finished systemd-exit.service - Exit the Session.
  3172. Apr 20 15:30:02 dom0 systemd[5754]: Reached target exit.target - Exit the Session.
  3173. Apr 20 15:30:02 dom0 systemd[1]: [email protected]: Deactivated successfully.
  3174. Apr 20 15:30:02 dom0 systemd[1]: Stopped [email protected] - User Manager for UID 1000.
  3175. Apr 20 15:30:02 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user@1000 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  3176. Apr 20 15:30:02 dom0 systemd[1]: [email protected]: Consumed 8.600s CPU time.
  3177. Apr 20 15:30:02 dom0 systemd[1]: Stopping [email protected] - User Runtime Directory /run/user/1000...
  3178. Apr 20 15:30:02 dom0 systemd[1]: lightdm.service: Deactivated successfully.
  3179. Apr 20 15:30:02 dom0 systemd[1]: Stopped lightdm.service - Light Display Manager.
  3180. Apr 20 15:30:02 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=lightdm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  3181. Apr 20 15:30:02 dom0 systemd[1]: lightdm.service: Consumed 15.025s CPU time.
  3182. Apr 20 15:30:02 dom0 systemd[1]: Starting plymouth-reboot.service - Show Plymouth Reboot Screen...
  3183. Apr 20 15:30:02 dom0 systemd[1]: run-user-1000.mount: Deactivated successfully.
  3184. Apr 20 15:30:02 dom0 systemd[1]: Unmounted run-user-1000.mount - /run/user/1000.
  3185. Apr 20 15:30:02 dom0 systemd[1]: Received SIGRTMIN+20 from PID 6937 (plymouthd).
  3186. Apr 20 15:30:02 dom0 systemd[1]: [email protected]: Deactivated successfully.
  3187. Apr 20 15:30:02 dom0 systemd[1]: Stopped [email protected] - User Runtime Directory /run/user/1000.
  3188. Apr 20 15:30:02 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@1000 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  3189. Apr 20 15:30:02 dom0 systemd[1]: Removed slice user-1000.slice - User Slice of UID 1000.
  3190. Apr 20 15:30:02 dom0 systemd[1]: user-1000.slice: Consumed 26.051s CPU time.
  3191. Apr 20 15:30:02 dom0 systemd[1]: Stopping systemd-user-sessions.service - Permit User Sessions...
  3192. Apr 20 15:30:02 dom0 systemd[1]: systemd-user-sessions.service: Deactivated successfully.
  3193. Apr 20 15:30:02 dom0 systemd[1]: Stopped systemd-user-sessions.service - Permit User Sessions.
  3194. Apr 20 15:30:02 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-user-sessions comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  3195. Apr 20 15:30:02 dom0 systemd[1]: [email protected]: Deactivated successfully.
  3196. Apr 20 15:30:02 dom0 systemd[1]: Stopped [email protected] - Start Qubes VM sys-usb.
  3197. Apr 20 15:30:02 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-vm@sys-usb comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  3198. Apr 20 15:30:02 dom0 systemd[1]: Removed slice system-qubes\x2dvm.slice - Slice /system/qubes-vm.
  3199. Apr 20 15:30:02 dom0 systemd[1]: Stopping qubes-meminfo-writer-dom0.service - Qubes memory information reporter...
  3200. Apr 20 15:30:02 dom0 systemd[1]: qubes-meminfo-writer-dom0.service: Deactivated successfully.
  3201. Apr 20 15:30:02 dom0 systemd[1]: Stopped qubes-meminfo-writer-dom0.service - Qubes memory information reporter.
  3202. Apr 20 15:30:02 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-meminfo-writer-dom0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  3203. Apr 20 15:30:02 dom0 systemd[1]: Stopping qubes-core.service - Qubes Dom0 startup setup...
  3204. Apr 20 15:30:02 dom0 systemd[1]: Started plymouth-reboot.service - Show Plymouth Reboot Screen.
  3205. Apr 20 15:30:02 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=plymouth-reboot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  3206. Apr 20 15:30:02 dom0 qubesd[3175]: socket.send() raised exception.
  3207. Apr 20 15:30:02 dom0 qubesd[3175]: socket.send() raised exception.
  3208. Apr 20 15:30:02 dom0 qubesd[3175]: socket.send() raised exception.
  3209. Apr 20 15:30:02 dom0 qubesd[3175]: socket.send() raised exception.
  3210. Apr 20 15:30:02 dom0 qubesd[3175]: socket.send() raised exception.
  3211. Apr 20 15:30:02 dom0 qubesd[3175]: socket.send() raised exception.
  3212. Apr 20 15:30:02 dom0 qubesd[3175]: socket.send() raised exception.
  3213. Apr 20 15:30:03 dom0 systemd[1]: dracut-shutdown.service: Deactivated successfully.
  3214. Apr 20 15:30:03 dom0 systemd[1]: Stopped dracut-shutdown.service - Restore /run/initramfs on shutdown.
  3215. Apr 20 15:30:03 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dracut-shutdown comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  3216. Apr 20 15:30:03 dom0 systemd[1]: dracut-shutdown.service: Consumed 1.087s CPU time.
  3217. Apr 20 15:30:03 dom0 systemd[1]: Starting plymouth-switch-root-initramfs.service - Tell Plymouth To Jump To initramfs...
  3218. Apr 20 15:30:03 dom0 systemd[1]: Finished plymouth-switch-root-initramfs.service - Tell Plymouth To Jump To initramfs.
  3219. Apr 20 15:30:03 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=plymouth-switch-root-initramfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  3220. Apr 20 15:30:06 dom0 libvirtd[2952]: internal error: Unable to reset PCI device 0000:00:14.0: no FLR, PM reset or bus reset available
  3221. Apr 20 15:30:06 dom0 lvm[2499]: No longer monitoring thin pool qubes_dom0-vm--pool-tpool.
  3222. Apr 20 15:30:06 dom0 lvm[2499]: Monitoring thin pool qubes_dom0-vm--pool-tpool.
  3223. Apr 20 15:30:07 dom0 lvm[2499]: No longer monitoring thin pool qubes_dom0-vm--pool-tpool.
  3224. Apr 20 15:30:07 dom0 lvm[2499]: Monitoring thin pool qubes_dom0-vm--pool-tpool.
  3225. Apr 20 15:30:07 dom0 lvm[2499]: No longer monitoring thin pool qubes_dom0-vm--pool-tpool.
  3226. Apr 20 15:30:07 dom0 lvm[2499]: Monitoring thin pool qubes_dom0-vm--pool-tpool.
  3227. Apr 20 15:30:07 dom0 lvm[2499]: No longer monitoring thin pool qubes_dom0-vm--pool-tpool.
  3228. Apr 20 15:30:07 dom0 lvm[2499]: Monitoring thin pool qubes_dom0-vm--pool-tpool.
  3229. Apr 20 15:30:08 dom0 qubesdb-daemon[2889]: terminating
  3230. Apr 20 15:30:08 dom0 systemd[1]: qubes-db-dom0.service: Deactivated successfully.
  3231. Apr 20 15:30:08 dom0 systemd[1]: Stopped qubes-db-dom0.service - Qubes DB agent.
  3232. Apr 20 15:30:08 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-db-dom0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  3233. Apr 20 15:30:08 dom0 kernel: kauditd_printk_skb: 23 callbacks suppressed
  3234. Apr 20 15:30:08 dom0 kernel: audit: type=1131 audit(1713645008.357:510): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-db-dom0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  3235. Apr 20 15:30:08 dom0 systemd[1]: qubes-core.service: Deactivated successfully.
  3236. Apr 20 15:30:08 dom0 systemd[1]: Stopped qubes-core.service - Qubes Dom0 startup setup.
  3237. Apr 20 15:30:08 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-core comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  3238. Apr 20 15:30:08 dom0 systemd[1]: Stopping libvirtd.service - Virtualization daemon...
  3239. Apr 20 15:30:08 dom0 systemd[1]: Stopping qubes-qmemman.service - Qubes memory management daemon...
  3240. Apr 20 15:30:08 dom0 kernel: audit: type=1131 audit(1713645008.359:511): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-core comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  3241. Apr 20 15:30:08 dom0 systemd[1]: Stopping qubesd.service - Qubes OS daemon...
  3242. Apr 20 15:30:08 dom0 systemd[1]: Stopping xenconsoled.service - Xenconsoled - handles logging from guest consoles and hypervisor...
  3243. Apr 20 15:30:08 dom0 qubesd[3175]: caught SIGTERM, exiting
  3244. Apr 20 15:30:08 dom0 systemd[1]: xenconsoled.service: Deactivated successfully.
  3245. Apr 20 15:30:08 dom0 systemd[1]: Stopped xenconsoled.service - Xenconsoled - handles logging from guest consoles and hypervisor.
  3246. Apr 20 15:30:08 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=xenconsoled comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  3247. Apr 20 15:30:08 dom0 kernel: audit: type=1131 audit(1713645008.361:512): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=xenconsoled comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  3248. Apr 20 15:30:08 dom0 systemd[1]: qubes-qmemman.service: Deactivated successfully.
  3249. Apr 20 15:30:08 dom0 systemd[1]: Stopped qubes-qmemman.service - Qubes memory management daemon.
  3250. Apr 20 15:30:08 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-qmemman comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  3251. Apr 20 15:30:08 dom0 kernel: audit: type=1131 audit(1713645008.365:513): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-qmemman comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  3252. Apr 20 15:30:08 dom0 systemd[1]: libvirtd.service: Deactivated successfully.
  3253. Apr 20 15:30:08 dom0 systemd[1]: Stopped libvirtd.service - Virtualization daemon.
  3254. Apr 20 15:30:08 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=libvirtd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  3255. Apr 20 15:30:08 dom0 systemd[1]: libvirtd.service: Consumed 5.690s CPU time.
  3256. Apr 20 15:30:08 dom0 systemd[1]: Stopped target remote-fs.target - Remote File Systems.
  3257. Apr 20 15:30:08 dom0 systemd[1]: Stopping systemd-logind.service - User Login Management...
  3258. Apr 20 15:30:08 dom0 systemd[1]: Stopping xenstored.service - The Xen xenstore...
  3259. Apr 20 15:30:08 dom0 kernel: audit: type=1131 audit(1713645008.368:514): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=libvirtd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  3260. Apr 20 15:30:08 dom0 systemd[1]: xenstored.service: Deactivated successfully.
  3261. Apr 20 15:30:08 dom0 systemd[1]: Stopped xenstored.service - The Xen xenstore.
  3262. Apr 20 15:30:08 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=xenstored comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  3263. Apr 20 15:30:08 dom0 kernel: audit: type=1131 audit(1713645008.369:515): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=xenstored comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  3264. Apr 20 15:30:08 dom0 systemd[1]: qubesd.service: Deactivated successfully.
  3265. Apr 20 15:30:08 dom0 systemd[1]: Stopped qubesd.service - Qubes OS daemon.
  3266. Apr 20 15:30:08 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubesd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  3267. Apr 20 15:30:08 dom0 systemd[1]: qubesd.service: Consumed 11.721s CPU time.
  3268. Apr 20 15:30:08 dom0 kernel: audit: type=1131 audit(1713645008.394:516): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubesd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  3269. Apr 20 15:30:08 dom0 systemd[1]: Stopping lvm2-pvscan@253:0.service - LVM event activation on device 253:0...
  3270. Apr 20 15:30:08 dom0 lvm[7729]: pvscan[7729] PV /dev/mapper/luks-5241442a-6636-45da-8731-66d029364f3d online.
  3271. Apr 20 15:30:08 dom0 systemd[1]: systemd-logind.service: Deactivated successfully.
  3272. Apr 20 15:30:08 dom0 systemd[1]: Stopped systemd-logind.service - User Login Management.
  3273. Apr 20 15:30:08 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-logind comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  3274. Apr 20 15:30:08 dom0 systemd[1]: Stopped target basic.target - Basic System.
  3275. Apr 20 15:30:08 dom0 systemd[1]: systemd-ask-password-plymouth.path: Deactivated successfully.
  3276. Apr 20 15:30:08 dom0 kernel: audit: type=1131 audit(1713645008.457:517): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-logind comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  3277. Apr 20 15:30:08 dom0 systemd[1]: Stopped systemd-ask-password-plymouth.path - Forward Password Requests to Plymouth Directory Watch.
  3278. Apr 20 15:30:08 dom0 systemd[1]: Stopped target nss-user-lookup.target - User and Group Name Lookups.
  3279. Apr 20 15:30:08 dom0 systemd[1]: Stopped target paths.target - Path Units.
  3280. Apr 20 15:30:08 dom0 systemd[1]: Stopped target slices.target - Slice Units.
  3281. Apr 20 15:30:08 dom0 systemd[1]: Removed slice user.slice - User and Session Slice.
  3282. Apr 20 15:30:08 dom0 systemd[1]: user.slice: Consumed 28.808s CPU time.
  3283. Apr 20 15:30:08 dom0 systemd[1]: Stopped target sockets.target - Socket Units.
  3284. Apr 20 15:30:08 dom0 systemd[1]: libvirtd-admin.socket: Deactivated successfully.
  3285. Apr 20 15:30:08 dom0 systemd[1]: Closed libvirtd-admin.socket - Libvirt admin socket.
  3286. Apr 20 15:30:08 dom0 systemd[1]: libvirtd-ro.socket: Deactivated successfully.
  3287. Apr 20 15:30:08 dom0 systemd[1]: Closed libvirtd-ro.socket - Libvirt local read-only socket.
  3288. Apr 20 15:30:08 dom0 systemd[1]: libvirtd.socket: Deactivated successfully.
  3289. Apr 20 15:30:08 dom0 systemd[1]: Closed libvirtd.socket - Libvirt local socket.
  3290. Apr 20 15:30:08 dom0 systemd[1]: virtlockd.socket: Deactivated successfully.
  3291. Apr 20 15:30:08 dom0 systemd[1]: Closed virtlockd.socket - Virtual machine lock manager socket.
  3292. Apr 20 15:30:08 dom0 systemd[1]: virtlogd.socket: Deactivated successfully.
  3293. Apr 20 15:30:08 dom0 systemd[1]: Closed virtlogd.socket - Virtual machine log manager socket.
  3294. Apr 20 15:30:08 dom0 dbus-broker[2880]: Dispatched 7097 messages @ 3(±4)μs / message.
  3295. Apr 20 15:30:08 dom0 systemd[1]: Stopping dbus-broker.service - D-Bus System Message Bus...
  3296. Apr 20 15:30:08 dom0 audit: BPF prog-id=59 op=UNLOAD
  3297. Apr 20 15:30:08 dom0 kernel: audit: type=1334 audit(1713645008.466:518): prog-id=59 op=UNLOAD
  3298. Apr 20 15:30:08 dom0 systemd[1]: dbus-broker.service: Deactivated successfully.
  3299. Apr 20 15:30:08 dom0 systemd[1]: Stopped dbus-broker.service - D-Bus System Message Bus.
  3300. Apr 20 15:30:08 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dbus-broker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  3301. Apr 20 15:30:08 dom0 kernel: audit: type=1131 audit(1713645008.471:519): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dbus-broker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  3302. Apr 20 15:30:08 dom0 systemd[1]: dbus.socket: Deactivated successfully.
  3303. Apr 20 15:30:08 dom0 systemd[1]: Closed dbus.socket - D-Bus System Message Bus Socket.
  3304. Apr 20 15:30:08 dom0 systemd[1]: Stopped target sysinit.target - System Initialization.
  3305. Apr 20 15:30:08 dom0 systemd[1]: proc-sys-fs-binfmt_misc.automount: Deactivated successfully.
  3306. Apr 20 15:30:08 dom0 systemd[1]: Unset automount proc-sys-fs-binfmt_misc.automount - Arbitrary Executable File Formats File System Automount Point.
  3307. Apr 20 15:30:08 dom0 systemd[1]: Stopped target cryptsetup.target - Local Encrypted Volumes.
  3308. Apr 20 15:30:08 dom0 systemd[1]: systemd-ask-password-wall.path: Deactivated successfully.
  3309. Apr 20 15:30:08 dom0 systemd[1]: Stopped systemd-ask-password-wall.path - Forward Password Requests to Wall Directory Watch.
  3310. Apr 20 15:30:08 dom0 systemd[1]: Stopped target integritysetup.target - Local Integrity Protected Volumes.
  3311. Apr 20 15:30:08 dom0 systemd[1]: Stopped target veritysetup.target - Local Verity Protected Volumes.
  3312. Apr 20 15:30:08 dom0 audit: BPF prog-id=55 op=UNLOAD
  3313. Apr 20 15:30:08 dom0 systemd[1]: Stopping systemd-cryptsetup@luks\x2d5241442a\x2d6636\x2d45da\x2d8731\x2d66d029364f3d.service - Cryptography Setup for luks-5241442a-6636-45da-8731-66d029364f3d...
  3314. Apr 20 15:30:08 dom0 systemd[1]: systemd-sysctl.service: Deactivated successfully.
  3315. Apr 20 15:30:08 dom0 systemd[1]: Stopped systemd-sysctl.service - Apply Kernel Variables.
  3316. Apr 20 15:30:08 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  3317. Apr 20 15:30:08 dom0 systemd[1]: systemd-coredump.socket: Deactivated successfully.
  3318. Apr 20 15:30:08 dom0 systemd[1]: Closed systemd-coredump.socket - Process Core Dump Socket.
  3319. Apr 20 15:30:08 dom0 systemd[1]: systemd-modules-load.service: Deactivated successfully.
  3320. Apr 20 15:30:08 dom0 systemd[1]: Stopped systemd-modules-load.service - Load Kernel Modules.
  3321. Apr 20 15:30:08 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  3322. Apr 20 15:30:08 dom0 systemd[1]: Stopping systemd-update-utmp.service - Record System Boot/Shutdown in UTMP...
  3323. Apr 20 15:30:08 dom0 systemd[1]: lvm2-pvscan@253:0.service: Deactivated successfully.
  3324. Apr 20 15:30:08 dom0 systemd[1]: Stopped lvm2-pvscan@253:0.service - LVM event activation on device 253:0.
  3325. Apr 20 15:30:08 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=lvm2-pvscan@253:0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  3326. Apr 20 15:30:08 dom0 systemd[1]: Removed slice system-lvm2\x2dpvscan.slice - Slice /system/lvm2-pvscan.
  3327. Apr 20 15:30:08 dom0 audit[7739]: SYSTEM_SHUTDOWN pid=7739 uid=0 auid=4294967295 ses=4294967295 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success'
  3328. Apr 20 15:30:08 dom0 systemd-cryptsetup[7736]: Device luks-5241442a-6636-45da-8731-66d029364f3d is still in use.
  3329. Apr 20 15:30:08 dom0 systemd-cryptsetup[7736]: Failed to deactivate: Device or resource busy
  3330. Apr 20 15:30:08 dom0 systemd[1]: systemd-update-utmp.service: Deactivated successfully.
  3331. Apr 20 15:30:08 dom0 systemd[1]: Stopped systemd-update-utmp.service - Record System Boot/Shutdown in UTMP.
  3332. Apr 20 15:30:08 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  3333. Apr 20 15:30:08 dom0 systemd[1]: systemd-cryptsetup@luks\x2d5241442a\x2d6636\x2d45da\x2d8731\x2d66d029364f3d.service: Control process exited, code=exited, status=1/FAILURE
  3334. Apr 20 15:30:08 dom0 systemd[1]: systemd-cryptsetup@luks\x2d5241442a\x2d6636\x2d45da\x2d8731\x2d66d029364f3d.service: Failed with result 'exit-code'.
  3335. Apr 20 15:30:08 dom0 systemd[1]: Stopped systemd-cryptsetup@luks\x2d5241442a\x2d6636\x2d45da\x2d8731\x2d66d029364f3d.service - Cryptography Setup for luks-5241442a-6636-45da-8731-66d029364f3d.
  3336. Apr 20 15:30:08 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-cryptsetup@luks\x2d5241442a\x2d6636\x2d45da\x2d8731\x2d66d029364f3d comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
  3337. Apr 20 15:30:08 dom0 systemd[1]: systemd-tmpfiles-setup.service: Deactivated successfully.
  3338. Apr 20 15:30:08 dom0 systemd[1]: Stopped systemd-tmpfiles-setup.service - Create Volatile Files and Directories.
  3339. Apr 20 15:30:08 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  3340. Apr 20 15:30:08 dom0 systemd[1]: Stopped target local-fs.target - Local File Systems.
  3341. Apr 20 15:30:08 dom0 systemd[1]: Unmounting boot-efi.mount - /boot/efi...
  3342. Apr 20 15:30:08 dom0 systemd[1]: Unmounting tmp.mount - Temporary Directory /tmp...
  3343. Apr 20 15:30:08 dom0 systemd[1]: boot-efi.mount: Deactivated successfully.
  3344. Apr 20 15:30:08 dom0 systemd[1]: Unmounted boot-efi.mount - /boot/efi.
  3345. Apr 20 15:30:08 dom0 systemd[1]: tmp.mount: Deactivated successfully.
  3346. Apr 20 15:30:08 dom0 systemd[1]: Unmounted tmp.mount - Temporary Directory /tmp.
  3347. Apr 20 15:30:08 dom0 systemd[1]: Stopped target swap.target - Swaps.
  3348. Apr 20 15:30:08 dom0 systemd[1]: Deactivating swap dev-disk-by\x2did-dm\x2dname\x2dqubes_dom0\x2dswap.swap - /dev/disk/by-id/dm-name-qubes_dom0-swap...
  3349. Apr 20 15:30:08 dom0 systemd[1]: Unmounting boot.mount - /boot...
  3350. Apr 20 15:30:08 dom0 systemd[1]: systemd-fsck@dev-disk-by\x2duuid-66AB\x2d8D71.service: Deactivated successfully.
  3351. Apr 20 15:30:08 dom0 systemd[1]: Stopped systemd-fsck@dev-disk-by\x2duuid-66AB\x2d8D71.service - File System Check on /dev/disk/by-uuid/66AB-8D71.
  3352. Apr 20 15:30:08 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-fsck@dev-disk-by\x2duuid-66AB\x2d8D71 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  3353. Apr 20 15:30:08 dom0 kernel: EXT4-fs (nvme0n1p2): unmounting filesystem.
  3354. Apr 20 15:30:08 dom0 systemd[1]: dev-disk-by\x2did-dm\x2dname\x2dqubes_dom0\x2dswap.swap: Deactivated successfully.
  3355. Apr 20 15:30:08 dom0 systemd[1]: Deactivated swap dev-disk-by\x2did-dm\x2dname\x2dqubes_dom0\x2dswap.swap - /dev/disk/by-id/dm-name-qubes_dom0-swap.
  3356. Apr 20 15:30:08 dom0 systemd[1]: dev-qubes_dom0-swap.swap: Deactivated successfully.
  3357. Apr 20 15:30:08 dom0 systemd[1]: Deactivated swap dev-qubes_dom0-swap.swap - /dev/qubes_dom0/swap.
  3358. Apr 20 15:30:08 dom0 systemd[1]: dev-disk-by\x2did-dm\x2duuid\x2dLVM\x2dcpu9iL97JGkCCuABawzxZRJ3Lz141uXqemkpozTcRawb1d7G2getTUSGk4FPCLOL.swap: Deactivated successfully.
  3359. Apr 20 15:30:08 dom0 systemd[1]: Deactivated swap dev-disk-by\x2did-dm\x2duuid\x2dLVM\x2dcpu9iL97JGkCCuABawzxZRJ3Lz141uXqemkpozTcRawb1d7G2getTUSGk4FPCLOL.swap - /dev/disk/by-id/dm-uuid-LVM-cpu9iL97JGkCCuABawzxZRJ3Lz141uXqemkpozTcRawb1d7G2getTUSGk4FPCLOL.
  3360. Apr 20 15:30:08 dom0 systemd[1]: dev-disk-by\x2duuid-36798814\x2d87d1\x2d4852\x2d9728\x2df4876e1aa677.swap: Deactivated successfully.
  3361. Apr 20 15:30:08 dom0 systemd[1]: Deactivated swap dev-disk-by\x2duuid-36798814\x2d87d1\x2d4852\x2d9728\x2df4876e1aa677.swap - /dev/disk/by-uuid/36798814-87d1-4852-9728-f4876e1aa677.
  3362. Apr 20 15:30:08 dom0 systemd[1]: dev-dm\x2d5.swap: Deactivated successfully.
  3363. Apr 20 15:30:08 dom0 systemd[1]: Deactivated swap dev-dm\x2d5.swap - /dev/dm-5.
  3364. Apr 20 15:30:08 dom0 systemd[1]: dev-mapper-qubes_dom0\x2dswap.swap: Deactivated successfully.
  3365. Apr 20 15:30:08 dom0 systemd[1]: Deactivated swap dev-mapper-qubes_dom0\x2dswap.swap - /dev/mapper/qubes_dom0-swap.
  3366. Apr 20 15:30:08 dom0 systemd[1]: boot.mount: Deactivated successfully.
  3367. Apr 20 15:30:08 dom0 systemd[1]: Unmounted boot.mount - /boot.
  3368. Apr 20 15:30:08 dom0 systemd[1]: Reached target umount.target - Unmount All Filesystems.
  3369. Apr 20 15:30:08 dom0 systemd[1]: systemd-fsck@dev-disk-by\x2duuid-a8d2f5a4\x2dd25d\x2d45fb\x2da847\x2dc2a89a3d2037.service: Deactivated successfully.
  3370. Apr 20 15:30:08 dom0 systemd[1]: Stopped systemd-fsck@dev-disk-by\x2duuid-a8d2f5a4\x2dd25d\x2d45fb\x2da847\x2dc2a89a3d2037.service - File System Check on /dev/disk/by-uuid/a8d2f5a4-d25d-45fb-a847-c2a89a3d2037.
  3371. Apr 20 15:30:08 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-fsck@dev-disk-by\x2duuid-a8d2f5a4\x2dd25d\x2d45fb\x2da847\x2dc2a89a3d2037 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  3372. Apr 20 15:30:08 dom0 systemd[1]: Removed slice system-systemd\x2dfsck.slice - Slice /system/systemd-fsck.
  3373. Apr 20 15:30:08 dom0 systemd[1]: Stopped target local-fs-pre.target - Preparation for Local File Systems.
  3374. Apr 20 15:30:08 dom0 systemd[1]: Stopping lvm2-monitor.service - Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling...
  3375. Apr 20 15:30:08 dom0 systemd[1]: systemd-remount-fs.service: Deactivated successfully.
  3376. Apr 20 15:30:08 dom0 systemd[1]: Stopped systemd-remount-fs.service - Remount Root and Kernel File Systems.
  3377. Apr 20 15:30:08 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  3378. Apr 20 15:30:08 dom0 systemd[1]: systemd-fsck-root.service: Deactivated successfully.
  3379. Apr 20 15:30:08 dom0 systemd[1]: Stopped systemd-fsck-root.service - File System Check on Root Device.
  3380. Apr 20 15:30:08 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  3381. Apr 20 15:30:08 dom0 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully.
  3382. Apr 20 15:30:08 dom0 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev.
  3383. Apr 20 15:30:08 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  3384. Apr 20 15:30:08 dom0 lvm[2499]: No longer monitoring thin pool qubes_dom0-root--pool-tpool.
  3385. Apr 20 15:30:08 dom0 dmeventd[2499]: No longer monitoring thin pool qubes_dom0-vm--pool-tpool.
  3386. Apr 20 15:30:08 dom0 lvm[7746]: 53 logical volume(s) in volume group "qubes_dom0" unmonitored
  3387. Apr 20 15:30:08 dom0 systemd[1]: lvm2-monitor.service: Deactivated successfully.
  3388. Apr 20 15:30:08 dom0 systemd[1]: Stopped lvm2-monitor.service - Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling.
  3389. Apr 20 15:30:08 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=lvm2-monitor comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  3390. Apr 20 15:30:08 dom0 dmeventd[2499]: dmeventd detected break while being idle for 0 second(s), exiting.
  3391. Apr 20 15:30:08 dom0 dmeventd[2499]: dmeventd shutting down.
  3392. Apr 20 15:30:08 dom0 systemd[1]: Stopping dm-event.service - Device-mapper event daemon...
  3393. Apr 20 15:30:08 dom0 systemd[1]: dm-event.service: Deactivated successfully.
  3394. Apr 20 15:30:08 dom0 systemd[1]: Stopped dm-event.service - Device-mapper event daemon.
  3395. Apr 20 15:30:08 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dm-event comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  3396. Apr 20 15:30:08 dom0 systemd[1]: Reached target shutdown.target - System Shutdown.
  3397. Apr 20 15:30:08 dom0 systemd[1]: Reached target final.target - Late Shutdown Services.
  3398. Apr 20 15:30:08 dom0 systemd[1]: systemd-reboot.service: Deactivated successfully.
  3399. Apr 20 15:30:08 dom0 systemd[1]: Finished systemd-reboot.service - System Reboot.
  3400. Apr 20 15:30:08 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-reboot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  3401. Apr 20 15:30:08 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-reboot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
  3402. Apr 20 15:30:08 dom0 systemd[1]: Reached target reboot.target - System Reboot.
  3403. Apr 20 15:30:08 dom0 systemd[1]: Shutting down.
  3404. Apr 20 15:30:08 dom0 audit: BPF prog-id=54 op=UNLOAD
  3405. Apr 20 15:30:08 dom0 audit: BPF prog-id=53 op=UNLOAD
  3406. Apr 20 15:30:08 dom0 audit: BPF prog-id=52 op=UNLOAD
  3407. Apr 20 15:30:08 dom0 audit: BPF prog-id=51 op=UNLOAD
  3408. Apr 20 15:30:08 dom0 audit: BPF prog-id=50 op=UNLOAD
  3409. Apr 20 15:30:08 dom0 audit: BPF prog-id=61 op=UNLOAD
  3410. Apr 20 15:30:08 dom0 audit: BPF prog-id=60 op=UNLOAD
  3411. Apr 20 15:30:08 dom0 audit: BPF prog-id=49 op=UNLOAD
  3412. Apr 20 15:30:08 dom0 audit: BPF prog-id=48 op=UNLOAD
  3413. Apr 20 15:30:08 dom0 audit: BPF prog-id=47 op=UNLOAD
  3414. Apr 20 15:30:08 dom0 audit: BPF prog-id=58 op=UNLOAD
  3415. Apr 20 15:30:08 dom0 audit: BPF prog-id=57 op=UNLOAD
  3416. Apr 20 15:30:08 dom0 audit: BPF prog-id=56 op=UNLOAD
  3417. Apr 20 15:30:08 dom0 audit: BPF prog-id=63 op=UNLOAD
  3418. Apr 20 15:30:08 dom0 audit: BPF prog-id=62 op=UNLOAD
  3419. Apr 20 15:30:08 dom0 systemd[1]: Using hardware watchdog 'iTCO_wdt', version 0, device /dev/watchdog0
  3420. Apr 20 15:30:08 dom0 systemd[1]: Watchdog running with a timeout of 10min.
  3421. Apr 20 15:30:08 dom0 kernel: watchdog: watchdog0: watchdog did not stop!
  3422. Apr 20 15:30:08 dom0 systemd-shutdown[1]: Using hardware watchdog 'iTCO_wdt', version 0, device /dev/watchdog0
  3423. Apr 20 15:30:08 dom0 systemd-shutdown[1]: Watchdog running with a timeout of 10min.
  3424. Apr 20 15:30:08 dom0 systemd-shutdown[1]: Syncing filesystems and block devices.
  3425. Apr 20 15:30:08 dom0 systemd-shutdown[1]: Sending SIGTERM to remaining processes...
  3426. Apr 20 15:30:08 dom0 systemd-journald[1380]: Received SIGTERM from PID 1 (systemd-shutdow).
  3427. Apr 20 15:30:08 dom0 systemd-journald[1380]: Journal stopped
  3428.  
Add Comment
Please, Sign In to add comment