[th6mas@dom0 Desktop]$ cd [th6mas@dom0 ~]$ sudo qubesctl state.sls qvm.usb-keyboard [WARNING ] /usr/lib/python3.8/site-packages/salt/utils/files.py:396: RuntimeWarning: line buffering (buffering=1) isn't supported in binary mode, the default buffer size will be used f_handle = open(*args, **kwargs) # pylint: disable=resource-leakage local: ---------- ID: fedora-36-dvm Function: qvm.vm Result: True Comment: ====== ['present'] ====== [SKIP] A VM with the name 'fedora-36-dvm' already exists. ====== ['prefs'] ====== [SKIP] template_for_dispvms: True [SKIP] label : red ====== ['features'] ====== [SKIP] Feature already in desired state: ENABLE 'appmenus-dispvm' = Enabled Started: 09:45:24.650284 Duration: 283.751 ms Changes: ---------- ID: echo -e 'firefox.desktop\nxterm.desktop' | qvm-appmenus --set-whitelist=- --update fedora-36-dvm Function: cmd.run Result: True Comment: Command "echo -e 'firefox.desktop\nxterm.desktop' | qvm-appmenus --set-whitelist=- --update fedora-36-dvm" run Started: 09:45:24.940899 Duration: 716.809 ms Changes: ---------- pid: 7465 retcode: 0 stderr: fedora-36-dvm: Creating appmenus sys-firewall: Creating appmenus stdout: ---------- ID: hide-usb-from-dom0-uefi Function: cmd.run Name: sed -i -e 's/^kernel=.*/\0 rd.qubes.hide_all_usb/' /boot/efi/EFI/qubes/xen.cfg Result: True Comment: onlyif condition is false unless condition is false Started: 09:45:25.658769 Duration: 2479.859 ms Changes: ---------- ID: hide-usb-from-dom0-grub Function: file.append Name: /etc/default/grub Result: True Comment: Appended 1 lines Started: 09:45:28.139232 Duration: 42.031 ms Changes: ---------- diff: --- +++ @@ -8,3 +8,4 @@ GRUB_THEME="/boot/grub2/themes/qubes/theme.txt" GRUB_CMDLINE_XEN_DEFAULT="console=none dom0_mem=min:1024M dom0_mem=max:4096M ucode=scan smt=off gnttab_max_frames=2048 gnttab_max_maptrack_frames=4096" GRUB_DISABLE_OS_PROBER="true" +GRUB_CMDLINE_LINUX="$GRUB_CMDLINE_LINUX rd.qubes.hide_all_usb" ---------- ID: grub2-mkconfig -o /boot/efi/EFI/qubes/grub.cfg Function: cmd.run Result: True Comment: Command "grub2-mkconfig -o /boot/efi/EFI/qubes/grub.cfg" run Started: 09:45:28.182012 Duration: 30846.875 ms Changes: ---------- pid: 7480 retcode: 0 stderr: Generating grub configuration file ... Found theme: /boot/grub2/themes/qubes/theme.txt Found linux image: /boot/vmlinuz-5.15.52-1.fc32.qubes.x86_64 Found initrd image: /boot/initramfs-5.15.52-1.fc32.qubes.x86_64.img Found linux image: /boot/vmlinuz-5.15.48-1.fc32.qubes.x86_64 Found initrd image: /boot/initramfs-5.15.48-1.fc32.qubes.x86_64.img Found linux image: /boot/vmlinuz-5.15.52-1.fc32.qubes.x86_64 Found initrd image: /boot/initramfs-5.15.52-1.fc32.qubes.x86_64.img Found linux image: /boot/vmlinuz-5.15.48-1.fc32.qubes.x86_64 Found initrd image: /boot/initramfs-5.15.48-1.fc32.qubes.x86_64.img done stdout: ---------- ID: sys-net-usb Function: qvm.prefs Name: sys-net Result: False Comment: The following requisites were not found: require: sls: qvm.sys-net Started: 09:45:59.033374 Duration: 0.013 ms Changes: ---------- ID: qubes-input-proxy Function: pkg.installed Result: True Comment: All specified packages are already installed Started: 09:45:59.080751 Duration: 780.937 ms Changes: ---------- ID: sys-usb-input-proxy Function: file.prepend Name: /etc/qubes-rpc/policy/qubes.InputMouse Result: True Comment: Prepended 1 lines Started: 09:45:59.862343 Duration: 3.573 ms Changes: ---------- diff: --- +++ @@ -1 +1,2 @@ +sys-net dom0 allow,user=root $anyvm $anyvm deny ---------- ID: /etc/systemd/system/qubes-vm@sys-net.service.d/50_autostart.conf Function: file.managed Result: True Comment: File /etc/systemd/system/qubes-vm@sys-net.service.d/50_autostart.conf updated Started: 09:45:59.866054 Duration: 6.117 ms Changes: ---------- diff: New file ---------- ID: sys-usb-input-proxy-keyboard Function: file.prepend Name: /etc/qubes-rpc/policy/qubes.InputKeyboard Result: True Comment: Prepended 1 lines Started: 09:45:59.872386 Duration: 1.891 ms Changes: ---------- diff: --- +++ @@ -1 +1,2 @@ +sys-net dom0 allow,user=root $anyvm $anyvm deny ---------- ID: unhide-usb-from-dom0-uefi Function: file.replace Name: /boot/efi/EFI/qubes/xen.cfg Result: True Comment: onlyif condition is false Started: 09:45:59.874406 Duration: 51.421 ms Changes: ---------- ID: unhide-usb-from-dom0-grub Function: file.replace Name: /etc/default/grub Result: True Comment: Changes were made Started: 09:45:59.926395 Duration: 47.303 ms Changes: ---------- diff: --- +++ @@ -8,4 +8,4 @@ GRUB_THEME="/boot/grub2/themes/qubes/theme.txt" GRUB_CMDLINE_XEN_DEFAULT="console=none dom0_mem=min:1024M dom0_mem=max:4096M ucode=scan smt=off gnttab_max_frames=2048 gnttab_max_maptrack_frames=4096" GRUB_DISABLE_OS_PROBER="true" -GRUB_CMDLINE_LINUX="$GRUB_CMDLINE_LINUX rd.qubes.hide_all_usb" +GRUB_CMDLINE_LINUX="$GRUB_CMDLINE_LINUX usbcore.authorized_default=0" ---------- ID: grub-regenerate-unhide Function: cmd.run Name: grub2-mkconfig -o /boot/efi/EFI/qubes/grub.cfg Result: True Comment: Command "grub2-mkconfig -o /boot/efi/EFI/qubes/grub.cfg" run Started: 09:45:59.974505 Duration: 30610.166 ms Changes: ---------- pid: 10352 retcode: 0 stderr: Generating grub configuration file ... Found theme: /boot/grub2/themes/qubes/theme.txt Found linux image: /boot/vmlinuz-5.15.52-1.fc32.qubes.x86_64 Found initrd image: /boot/initramfs-5.15.52-1.fc32.qubes.x86_64.img Found linux image: /boot/vmlinuz-5.15.48-1.fc32.qubes.x86_64 Found initrd image: /boot/initramfs-5.15.48-1.fc32.qubes.x86_64.img Found linux image: /boot/vmlinuz-5.15.52-1.fc32.qubes.x86_64 Found initrd image: /boot/initramfs-5.15.52-1.fc32.qubes.x86_64.img Found linux image: /boot/vmlinuz-5.15.48-1.fc32.qubes.x86_64 Found initrd image: /boot/initramfs-5.15.48-1.fc32.qubes.x86_64.img done stdout: Summary for local ------------- Succeeded: 12 (changed=8) Failed: 1 ------------- Total states run: 13 Total run time: 65.871 s DOM0 configuration failed, not continuing