Apr 20 15:26:14 localhost kernel: Linux version 6.1.62-1.qubes.fc37.x86_64 (mockbuild@2c90eb99ba994f74a70d51db283f91db) (gcc (GCC) 12.3.1 20230508 (Red Hat 12.3.1-1), GNU ld version 2.38-27.fc37) #1 SMP PREEMPT_DYNAMIC Tue Nov 14 06:16:38 GMT 2023 Apr 20 15:26:14 localhost kernel: Command line: placeholder root=/dev/mapper/qubes_dom0-root ro rd.luks.uuid=luks-5241442a-6636-45da-8731-66d029364f3d rd.lvm.lv=qubes_dom0/root rd.lvm.lv=qubes_dom0/swap plymouth.ignore-serial-consoles 6.1.62-1.qubes.fc37.x86_64 x86_64 rhgb rd.qubes.hide_pci=01:00.0,01:00.1 quiet usbcore.authorized_default=0 Apr 20 15:26:14 localhost kernel: Released 0 page(s) Apr 20 15:26:14 localhost kernel: BIOS-provided physical RAM map: Apr 20 15:26:14 localhost kernel: Xen: [mem 0x0000000000000000-0x000000000009dfff] usable Apr 20 15:26:14 localhost kernel: Xen: [mem 0x000000000009e000-0x000000000009efff] reserved Apr 20 15:26:14 localhost kernel: Xen: [mem 0x000000000009f000-0x000000000009ffff] usable Apr 20 15:26:14 localhost kernel: Xen: [mem 0x00000000000a0000-0x00000000000fffff] reserved Apr 20 15:26:14 localhost kernel: Xen: [mem 0x0000000000100000-0x0000000061e2afff] usable Apr 20 15:26:14 localhost kernel: Xen: [mem 0x0000000061e2b000-0x0000000061e2bfff] reserved Apr 20 15:26:14 localhost kernel: Xen: [mem 0x0000000061e2c000-0x0000000063e9bfff] usable Apr 20 15:26:14 localhost kernel: Xen: [mem 0x0000000063e9c000-0x0000000063e9cfff] reserved Apr 20 15:26:14 localhost kernel: Xen: [mem 0x0000000063e9d000-0x000000006e07cfff] usable Apr 20 15:26:14 localhost kernel: Xen: [mem 0x000000006e07d000-0x0000000071d7cfff] reserved Apr 20 15:26:14 localhost kernel: Xen: [mem 0x0000000071d7d000-0x0000000071ff0fff] ACPI data Apr 20 15:26:14 localhost kernel: Xen: [mem 0x0000000071ff1000-0x000000007261efff] ACPI NVS Apr 20 15:26:14 localhost kernel: Xen: [mem 0x000000007261f000-0x0000000073efefff] reserved Apr 20 15:26:14 localhost kernel: Xen: [mem 0x0000000073eff000-0x0000000073efffff] usable Apr 20 15:26:14 localhost kernel: Xen: [mem 0x0000000073f00000-0x0000000079ffffff] reserved Apr 20 15:26:14 localhost kernel: Xen: [mem 0x000000007a400000-0x000000007a7fffff] reserved Apr 20 15:26:14 localhost kernel: Xen: [mem 0x000000007b000000-0x00000000807fffff] reserved Apr 20 15:26:14 localhost kernel: Xen: [mem 0x00000000c0000000-0x00000000cfffffff] reserved Apr 20 15:26:14 localhost kernel: Xen: [mem 0x00000000fe000000-0x00000000fe010fff] reserved Apr 20 15:26:14 localhost kernel: Xen: [mem 0x00000000fec00000-0x00000000fec00fff] reserved Apr 20 15:26:14 localhost kernel: Xen: [mem 0x00000000fed00000-0x00000000fed00fff] reserved Apr 20 15:26:14 localhost kernel: Xen: [mem 0x00000000fed20000-0x00000000fed7ffff] reserved Apr 20 15:26:14 localhost kernel: Xen: [mem 0x00000000fed90000-0x00000000fed91fff] reserved Apr 20 15:26:14 localhost kernel: Xen: [mem 0x00000000fee00000-0x00000000feefffff] reserved Apr 20 15:26:14 localhost kernel: Xen: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Apr 20 15:26:14 localhost kernel: Xen: [mem 0x0000000100000000-0x0000000191fe4fff] usable Apr 20 15:26:14 localhost kernel: NX (Execute Disable) protection: active Apr 20 15:26:14 localhost kernel: efi: EFI v2.80 by American Megatrends Apr 20 15:26:14 localhost kernel: efi: ACPI=0x71ff0000 ACPI 2.0=0x71ff0014 TPMFinalLog=0x724ec000 SMBIOS=0x73956000 SMBIOS 3.0=0x73955000 (MEMATTR=0x6b191298) may have been clobbered by Xen ESRT=0x71f4cc18 Apr 20 15:26:14 localhost kernel: SMBIOS 3.5.0 present. Apr 20 15:26:14 localhost kernel: DMI: ASUS System Product Name/ROG STRIX Z790-E GAMING WIFI, BIOS 1501 10/05/2023 Apr 20 15:26:14 localhost kernel: Hypervisor detected: Xen PV Apr 20 15:26:14 localhost kernel: tsc: Detected 3187.192 MHz processor Apr 20 15:26:14 localhost kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Apr 20 15:26:14 localhost kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Apr 20 15:26:14 localhost kernel: last_pfn = 0x191fe5 max_arch_pfn = 0x400000000 Apr 20 15:26:14 localhost kernel: Disabled Apr 20 15:26:14 localhost kernel: x86/PAT: MTRRs disabled, skipping PAT initialization too. Apr 20 15:26:14 localhost kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Apr 20 15:26:14 localhost kernel: last_pfn = 0x73f00 max_arch_pfn = 0x400000000 Apr 20 15:26:14 localhost kernel: esrt: Reserving ESRT space from 0x0000000071f4cc18 to 0x0000000071f4ccf0. Apr 20 15:26:14 localhost kernel: Secure boot disabled Apr 20 15:26:14 localhost kernel: RAMDISK: [mem 0x08000000-0x0a619fff] Apr 20 15:26:14 localhost kernel: ACPI: Early table checksum verification disabled Apr 20 15:26:14 localhost kernel: ACPI: RSDP 0x0000000071FF0014 000024 (v02 ALASKA) Apr 20 15:26:14 localhost kernel: ACPI: XSDT 0x0000000071FEF728 0000FC (v01 ALASKA A M I 01072009 AMI 01000013) Apr 20 15:26:14 localhost kernel: ACPI: FACP 0x0000000071FEE000 000114 (v06 ALASKA A M I 01072009 AMI 01000013) Apr 20 15:26:14 localhost kernel: ACPI: DSDT 0x0000000071F62000 08BFBC (v02 ALASKA A M I 01072009 INTL 20200717) Apr 20 15:26:14 localhost kernel: ACPI: FACS 0x000000007261E000 000040 Apr 20 15:26:14 localhost kernel: ACPI: FIDT 0x0000000071F61000 00009C (v01 ALASKA A M I 01072009 AMI 00010013) Apr 20 15:26:14 localhost kernel: ACPI: SSDT 0x0000000071F5F000 00038C (v02 PmaxDv Pmax_Dev 00000001 INTL 20200717) Apr 20 15:26:14 localhost kernel: ACPI: SSDT 0x0000000071F59000 005D34 (v02 CpuRef CpuSsdt 00003000 INTL 20200717) Apr 20 15:26:14 localhost kernel: ACPI: SSDT 0x0000000071F56000 002C11 (v02 SaSsdt SaSsdt 00003000 INTL 20200717) Apr 20 15:26:14 localhost kernel: ACPI: SSDT 0x0000000071F52000 00334F (v02 INTEL IgfxSsdt 00003000 INTL 20200717) Apr 20 15:26:14 localhost kernel: ACPI: HPET 0x0000000071F51000 000038 (v01 ALASKA A M I 01072009 AMI 01000013) Apr 20 15:26:14 localhost kernel: ACPI: APIC 0x0000000071F50000 0001DC (v05 ALASKA A M I 01072009 AMI 01000013) Apr 20 15:26:14 localhost kernel: ACPI: MCFG 0x0000000071F4F000 00003C (v01 ALASKA A M I 01072009 AMI 01000013) Apr 20 15:26:14 localhost kernel: ACPI: SSDT 0x0000000071F4D000 001F1A (v02 ALASKA Ther_Rvp 00001000 INTL 20200717) Apr 20 15:26:14 localhost kernel: ACPI: NHLT 0x0000000071F4B000 00002D (v00 ALASKA A M I 01072009 AMI 01000013) Apr 20 15:26:14 localhost kernel: ACPI: LPIT 0x0000000071F4A000 0000CC (v01 ALASKA A M I 01072009 AMI 01000013) Apr 20 15:26:14 localhost kernel: ACPI: SSDT 0x0000000071F46000 002357 (v02 ALASKA TbtTypeC 00000000 INTL 20200717) Apr 20 15:26:14 localhost kernel: ACPI: SSDT 0x0000000071F43000 002A83 (v02 ALASKA PtidDevc 00001000 INTL 20200717) Apr 20 15:26:14 localhost kernel: ACPI: DBGP 0x0000000071F42000 000034 (v01 ALASKA A M I 01072009 AMI 01000013) Apr 20 15:26:14 localhost kernel: ACPI: DBG2 0x0000000071F41000 000054 (v00 ALASKA A M I 01072009 AMI 01000013) Apr 20 15:26:14 localhost kernel: ACPI: SSDT 0x0000000071F40000 000C1F (v02 ALASKA UsbCTabl 00001000 INTL 20200717) Apr 20 15:26:14 localhost kernel: ACPI: RMAD 0x0000000071F3F000 000088 (v01 INTEL EDK2 00000002 01000013) Apr 20 15:26:14 localhost kernel: ACPI: FPDT 0x0000000071F3E000 000044 (v01 ALASKA A M I 01072009 AMI 01000013) Apr 20 15:26:14 localhost kernel: ACPI: SSDT 0x0000000071F3B000 002181 (v02 INTEL xh_rps14 00000000 INTL 20200717) Apr 20 15:26:14 localhost kernel: ACPI: SSDT 0x0000000071F37000 0039DA (v02 SocGpe SocGpe 00003000 INTL 20200717) Apr 20 15:26:14 localhost kernel: ACPI: SSDT 0x0000000071F33000 0039DA (v02 SocCmn SocCmn 00003000 INTL 20200717) Apr 20 15:26:14 localhost kernel: ACPI: BGRT 0x0000000071F32000 000038 (v01 ALASKA A M I 01072009 AMI 00010013) Apr 20 15:26:14 localhost kernel: ACPI: WPBT 0x0000000071DFD000 000040 (v01 ALASKA A M I 00000001 ASUS 00000001) Apr 20 15:26:14 localhost kernel: ACPI: TPM2 0x0000000071DFC000 00004C (v04 ALASKA A M I 00000001 AMI 00000000) Apr 20 15:26:14 localhost kernel: ACPI: PHAT 0x0000000071DFB000 000AA7 (v01 ALASKA A M I 00000005 MSFT 0100000D) Apr 20 15:26:14 localhost kernel: ACPI: WSMT 0x0000000071F49000 000028 (v01 ALASKA A M I 01072009 AMI 00010013) Apr 20 15:26:14 localhost kernel: ACPI: Reserving FACP table memory at [mem 0x71fee000-0x71fee113] Apr 20 15:26:14 localhost kernel: ACPI: Reserving DSDT table memory at [mem 0x71f62000-0x71fedfbb] Apr 20 15:26:14 localhost kernel: ACPI: Reserving FACS table memory at [mem 0x7261e000-0x7261e03f] Apr 20 15:26:14 localhost kernel: ACPI: Reserving FIDT table memory at [mem 0x71f61000-0x71f6109b] Apr 20 15:26:14 localhost kernel: ACPI: Reserving SSDT table memory at [mem 0x71f5f000-0x71f5f38b] Apr 20 15:26:14 localhost kernel: ACPI: Reserving SSDT table memory at [mem 0x71f59000-0x71f5ed33] Apr 20 15:26:14 localhost kernel: ACPI: Reserving SSDT table memory at [mem 0x71f56000-0x71f58c10] Apr 20 15:26:14 localhost kernel: ACPI: Reserving SSDT table memory at [mem 0x71f52000-0x71f5534e] Apr 20 15:26:14 localhost kernel: ACPI: Reserving HPET table memory at [mem 0x71f51000-0x71f51037] Apr 20 15:26:14 localhost kernel: ACPI: Reserving APIC table memory at [mem 0x71f50000-0x71f501db] Apr 20 15:26:14 localhost kernel: ACPI: Reserving MCFG table memory at [mem 0x71f4f000-0x71f4f03b] Apr 20 15:26:14 localhost kernel: ACPI: Reserving SSDT table memory at [mem 0x71f4d000-0x71f4ef19] Apr 20 15:26:14 localhost kernel: ACPI: Reserving NHLT table memory at [mem 0x71f4b000-0x71f4b02c] Apr 20 15:26:14 localhost kernel: ACPI: Reserving LPIT table memory at [mem 0x71f4a000-0x71f4a0cb] Apr 20 15:26:14 localhost kernel: ACPI: Reserving SSDT table memory at [mem 0x71f46000-0x71f48356] Apr 20 15:26:14 localhost kernel: ACPI: Reserving SSDT table memory at [mem 0x71f43000-0x71f45a82] Apr 20 15:26:14 localhost kernel: ACPI: Reserving DBGP table memory at [mem 0x71f42000-0x71f42033] Apr 20 15:26:14 localhost kernel: ACPI: Reserving DBG2 table memory at [mem 0x71f41000-0x71f41053] Apr 20 15:26:14 localhost kernel: ACPI: Reserving SSDT table memory at [mem 0x71f40000-0x71f40c1e] Apr 20 15:26:14 localhost kernel: ACPI: Reserving RMAD table memory at [mem 0x71f3f000-0x71f3f087] Apr 20 15:26:14 localhost kernel: ACPI: Reserving FPDT table memory at [mem 0x71f3e000-0x71f3e043] Apr 20 15:26:14 localhost kernel: ACPI: Reserving SSDT table memory at [mem 0x71f3b000-0x71f3d180] Apr 20 15:26:14 localhost kernel: ACPI: Reserving SSDT table memory at [mem 0x71f37000-0x71f3a9d9] Apr 20 15:26:14 localhost kernel: ACPI: Reserving SSDT table memory at [mem 0x71f33000-0x71f369d9] Apr 20 15:26:14 localhost kernel: ACPI: Reserving BGRT table memory at [mem 0x71f32000-0x71f32037] Apr 20 15:26:14 localhost kernel: ACPI: Reserving WPBT table memory at [mem 0x71dfd000-0x71dfd03f] Apr 20 15:26:14 localhost kernel: ACPI: Reserving TPM2 table memory at [mem 0x71dfc000-0x71dfc04b] Apr 20 15:26:14 localhost kernel: ACPI: Reserving PHAT table memory at [mem 0x71dfb000-0x71dfbaa6] Apr 20 15:26:14 localhost kernel: ACPI: Reserving WSMT table memory at [mem 0x71f49000-0x71f49027] Apr 20 15:26:14 localhost kernel: Setting APIC routing to Xen PV. Apr 20 15:26:14 localhost kernel: NUMA turned off Apr 20 15:26:14 localhost kernel: Faking a node at [mem 0x0000000000000000-0x0000000191fe4fff] Apr 20 15:26:14 localhost kernel: NODE_DATA(0) allocated [mem 0x6d887000-0x6d8b1fff] Apr 20 15:26:14 localhost kernel: Zone ranges: Apr 20 15:26:14 localhost kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Apr 20 15:26:14 localhost kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Apr 20 15:26:14 localhost kernel: Normal [mem 0x0000000100000000-0x0000000191fe4fff] Apr 20 15:26:14 localhost kernel: Device empty Apr 20 15:26:14 localhost kernel: Movable zone start for each node Apr 20 15:26:14 localhost kernel: Early memory node ranges Apr 20 15:26:14 localhost kernel: node 0: [mem 0x0000000000001000-0x000000000009dfff] Apr 20 15:26:14 localhost kernel: node 0: [mem 0x000000000009f000-0x000000000009ffff] Apr 20 15:26:14 localhost kernel: node 0: [mem 0x0000000000100000-0x0000000061e2afff] Apr 20 15:26:14 localhost kernel: node 0: [mem 0x0000000061e2c000-0x0000000063e9bfff] Apr 20 15:26:14 localhost kernel: node 0: [mem 0x0000000063e9d000-0x000000006e07cfff] Apr 20 15:26:14 localhost kernel: node 0: [mem 0x0000000073eff000-0x0000000073efffff] Apr 20 15:26:14 localhost kernel: node 0: [mem 0x0000000100000000-0x0000000191fe4fff] Apr 20 15:26:14 localhost kernel: Initmem setup node 0 [mem 0x0000000000001000-0x0000000191fe4fff] Apr 20 15:26:14 localhost kernel: On node 0, zone DMA: 1 pages in unavailable ranges Apr 20 15:26:14 localhost kernel: On node 0, zone DMA: 1 pages in unavailable ranges Apr 20 15:26:14 localhost kernel: On node 0, zone DMA: 96 pages in unavailable ranges Apr 20 15:26:14 localhost kernel: On node 0, zone DMA32: 1 pages in unavailable ranges Apr 20 15:26:14 localhost kernel: On node 0, zone DMA32: 1 pages in unavailable ranges Apr 20 15:26:14 localhost kernel: On node 0, zone DMA32: 24194 pages in unavailable ranges Apr 20 15:26:14 localhost kernel: On node 0, zone Normal: 16640 pages in unavailable ranges Apr 20 15:26:14 localhost kernel: On node 0, zone Normal: 24603 pages in unavailable ranges Apr 20 15:26:14 localhost kernel: p2m virtual area at (____ptrval____), size is 40000000 Apr 20 15:26:14 localhost kernel: Remapped 597989 page(s) Apr 20 15:26:14 localhost kernel: Reserving Intel graphics memory at [mem 0x7c800000-0x807fffff] Apr 20 15:26:14 localhost kernel: ACPI: PM-Timer IO Port: 0x1808 Apr 20 15:26:14 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Apr 20 15:26:14 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Apr 20 15:26:14 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Apr 20 15:26:14 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Apr 20 15:26:14 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Apr 20 15:26:14 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Apr 20 15:26:14 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Apr 20 15:26:14 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Apr 20 15:26:14 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Apr 20 15:26:14 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Apr 20 15:26:14 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Apr 20 15:26:14 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Apr 20 15:26:14 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Apr 20 15:26:14 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Apr 20 15:26:14 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Apr 20 15:26:14 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Apr 20 15:26:14 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0x11] high edge lint[0x1]) Apr 20 15:26:14 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0x12] high edge lint[0x1]) Apr 20 15:26:14 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0x13] high edge lint[0x1]) Apr 20 15:26:14 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0x14] high edge lint[0x1]) Apr 20 15:26:14 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0x15] high edge lint[0x1]) Apr 20 15:26:14 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0x16] high edge lint[0x1]) Apr 20 15:26:14 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0x17] high edge lint[0x1]) Apr 20 15:26:14 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0x00] high edge lint[0x1]) Apr 20 15:26:14 localhost kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 Apr 20 15:26:14 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Apr 20 15:26:14 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Apr 20 15:26:14 localhost kernel: ACPI: Using ACPI (MADT) for SMP configuration information Apr 20 15:26:14 localhost kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Apr 20 15:26:14 localhost kernel: smpboot: Allowing 24 CPUs, 0 hotplug CPUs Apr 20 15:26:14 localhost kernel: [mem 0x80800000-0xbfffffff] available for PCI devices Apr 20 15:26:14 localhost kernel: Booting kernel on Xen Apr 20 15:26:14 localhost kernel: Xen version: 4.17.2 (preserve-AD) Apr 20 15:26:14 localhost kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Apr 20 15:26:14 localhost kernel: setup_percpu: NR_CPUS:8192 nr_cpumask_bits:24 nr_cpu_ids:24 nr_node_ids:1 Apr 20 15:26:14 localhost kernel: percpu: Embedded 62 pages/cpu s217088 r8192 d28672 u262144 Apr 20 15:26:14 localhost kernel: pcpu-alloc: s217088 r8192 d28672 u262144 alloc=1*2097152 Apr 20 15:26:14 localhost kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Apr 20 15:26:14 localhost kernel: pcpu-alloc: [0] 16 17 18 19 20 21 22 23 Apr 20 15:26:14 localhost kernel: xen: PV spinlocks enabled Apr 20 15:26:14 localhost kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Apr 20 15:26:14 localhost kernel: Fallback order for Node 0: 0 Apr 20 15:26:14 localhost kernel: Built 1 zonelists, mobility grouping on. Total pages: 1032174 Apr 20 15:26:14 localhost kernel: Policy zone: Normal Apr 20 15:26:14 localhost kernel: Kernel command line: placeholder root=/dev/mapper/qubes_dom0-root ro rd.luks.uuid=luks-5241442a-6636-45da-8731-66d029364f3d rd.lvm.lv=qubes_dom0/root rd.lvm.lv=qubes_dom0/swap plymouth.ignore-serial-consoles 6.1.62-1.qubes.fc37.x86_64 x86_64 rhgb rd.qubes.hide_pci=01:00.0,01:00.1 quiet usbcore.authorized_default=0 Apr 20 15:26:14 localhost kernel: Unknown kernel command line parameters "placeholder x86_64 rhgb", will be passed to user space. Apr 20 15:26:14 localhost kernel: random: crng init done Apr 20 15:26:14 localhost kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Apr 20 15:26:14 localhost kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Apr 20 15:26:14 localhost kernel: mem auto-init: stack:all(zero), heap alloc:on, heap free:on Apr 20 15:26:14 localhost kernel: mem auto-init: clearing system memory may take some time... Apr 20 15:26:14 localhost kernel: software IO TLB: area num 32. Apr 20 15:26:14 localhost kernel: Memory: 3928596K/4194300K available (18441K kernel code, 3244K rwdata, 7544K rodata, 3540K init, 18156K bss, 265452K reserved, 0K cma-reserved) Apr 20 15:26:14 localhost kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=24, Nodes=1 Apr 20 15:26:14 localhost kernel: ftrace: allocating 53584 entries in 210 pages Apr 20 15:26:14 localhost kernel: ftrace: allocated 210 pages with 4 groups Apr 20 15:26:14 localhost kernel: Dynamic Preempt: voluntary Apr 20 15:26:14 localhost kernel: rcu: Preemptible hierarchical RCU implementation. Apr 20 15:26:14 localhost kernel: rcu: RCU restricting CPUs from NR_CPUS=8192 to nr_cpu_ids=24. Apr 20 15:26:14 localhost kernel: Trampoline variant of Tasks RCU enabled. Apr 20 15:26:14 localhost kernel: Rude variant of Tasks RCU enabled. Apr 20 15:26:14 localhost kernel: Tracing variant of Tasks RCU enabled. Apr 20 15:26:14 localhost kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Apr 20 15:26:14 localhost kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=24 Apr 20 15:26:14 localhost kernel: NR_IRQS: 524544, nr_irqs: 2248, preallocated irqs: 16 Apr 20 15:26:14 localhost kernel: xen:events: Using FIFO-based ABI Apr 20 15:26:14 localhost kernel: xen: --> pirq=1 -> irq=1 (gsi=1) Apr 20 15:26:14 localhost kernel: xen: --> pirq=2 -> irq=2 (gsi=2) Apr 20 15:26:14 localhost kernel: xen: --> pirq=3 -> irq=3 (gsi=3) Apr 20 15:26:14 localhost kernel: xen: --> pirq=4 -> irq=4 (gsi=4) Apr 20 15:26:14 localhost kernel: xen: --> pirq=5 -> irq=5 (gsi=5) Apr 20 15:26:14 localhost kernel: xen: --> pirq=6 -> irq=6 (gsi=6) Apr 20 15:26:14 localhost kernel: xen: --> pirq=7 -> irq=7 (gsi=7) Apr 20 15:26:14 localhost kernel: xen: --> pirq=8 -> irq=8 (gsi=8) Apr 20 15:26:14 localhost kernel: xen: --> pirq=9 -> irq=9 (gsi=9) Apr 20 15:26:14 localhost kernel: xen: --> pirq=10 -> irq=10 (gsi=10) Apr 20 15:26:14 localhost kernel: xen: --> pirq=11 -> irq=11 (gsi=11) Apr 20 15:26:14 localhost kernel: xen: --> pirq=12 -> irq=12 (gsi=12) Apr 20 15:26:14 localhost kernel: xen: --> pirq=13 -> irq=13 (gsi=13) Apr 20 15:26:14 localhost kernel: xen: --> pirq=14 -> irq=14 (gsi=14) Apr 20 15:26:14 localhost kernel: xen: --> pirq=15 -> irq=15 (gsi=15) Apr 20 15:26:14 localhost kernel: rcu: srcu_init: Setting srcu_struct sizes based on contention. Apr 20 15:26:14 localhost kernel: kfence: initialized - using 2097152 bytes for 255 objects at 0x(____ptrval____)-0x(____ptrval____) Apr 20 15:26:14 localhost kernel: Console: colour dummy device 80x25 Apr 20 15:26:14 localhost kernel: printk: console [tty0] enabled Apr 20 15:26:14 localhost kernel: printk: console [hvc0] enabled Apr 20 15:26:14 localhost kernel: ACPI: Core revision 20220331 Apr 20 15:26:14 localhost kernel: ACPI BIOS Warning (bug): Incorrect checksum in table [BGRT] - 0xA8, should be 0xAD (20220331/tbprint-174) Apr 20 15:26:14 localhost kernel: clocksource: xen: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Apr 20 15:26:14 localhost kernel: Xen: using vcpuop timer interface Apr 20 15:26:14 localhost kernel: installing Xen timer for CPU 0 Apr 20 15:26:14 localhost kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x2df106bba01, max_idle_ns: 440795268242 ns Apr 20 15:26:14 localhost kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 6374.38 BogoMIPS (lpj=3187192) Apr 20 15:26:14 localhost kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 Apr 20 15:26:14 localhost kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 Apr 20 15:26:14 localhost kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Apr 20 15:26:14 localhost kernel: Spectre V2 : Mitigation: Enhanced IBRS Apr 20 15:26:14 localhost kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Apr 20 15:26:14 localhost kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Apr 20 15:26:14 localhost kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Apr 20 15:26:14 localhost kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl Apr 20 15:26:14 localhost kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Apr 20 15:26:14 localhost kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Apr 20 15:26:14 localhost kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Apr 20 15:26:14 localhost kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Apr 20 15:26:14 localhost kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'compacted' format. Apr 20 15:26:14 localhost kernel: Freeing SMP alternatives memory: 48K Apr 20 15:26:14 localhost kernel: pid_max: default: 32768 minimum: 301 Apr 20 15:26:14 localhost kernel: LSM: Security Framework initializing Apr 20 15:26:14 localhost kernel: Yama: becoming mindful. Apr 20 15:26:14 localhost kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Apr 20 15:26:14 localhost kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Apr 20 15:26:14 localhost kernel: cpu 0 spinlock event irq 121 Apr 20 15:26:14 localhost kernel: VPMU disabled by hypervisor. Apr 20 15:26:14 localhost kernel: cblist_init_generic: Setting adjustable number of callback queues. Apr 20 15:26:14 localhost kernel: cblist_init_generic: Setting shift to 5 and lim to 1. Apr 20 15:26:14 localhost kernel: cblist_init_generic: Setting adjustable number of callback queues. Apr 20 15:26:14 localhost kernel: cblist_init_generic: Setting shift to 5 and lim to 1. Apr 20 15:26:14 localhost kernel: cblist_init_generic: Setting adjustable number of callback queues. Apr 20 15:26:14 localhost kernel: cblist_init_generic: Setting shift to 5 and lim to 1. Apr 20 15:26:14 localhost kernel: Performance Events: unsupported p6 CPU model 183 no PMU driver, software events only. Apr 20 15:26:14 localhost kernel: signal: max sigframe size: 1776 Apr 20 15:26:14 localhost kernel: rcu: Hierarchical SRCU implementation. Apr 20 15:26:14 localhost kernel: rcu: Max phase no-delay instances is 400. Apr 20 15:26:14 localhost kernel: NMI watchdog: Perf NMI watchdog permanently disabled Apr 20 15:26:14 localhost kernel: smp: Bringing up secondary CPUs ... Apr 20 15:26:14 localhost kernel: installing Xen timer for CPU 1 Apr 20 15:26:14 localhost kernel: cpu 1 spinlock event irq 131 Apr 20 15:26:14 localhost kernel: installing Xen timer for CPU 2 Apr 20 15:26:14 localhost kernel: cpu 2 spinlock event irq 137 Apr 20 15:26:14 localhost kernel: installing Xen timer for CPU 3 Apr 20 15:26:14 localhost kernel: cpu 3 spinlock event irq 143 Apr 20 15:26:14 localhost kernel: installing Xen timer for CPU 4 Apr 20 15:26:14 localhost kernel: cpu 4 spinlock event irq 149 Apr 20 15:26:14 localhost kernel: installing Xen timer for CPU 5 Apr 20 15:26:14 localhost kernel: cpu 5 spinlock event irq 155 Apr 20 15:26:14 localhost kernel: installing Xen timer for CPU 6 Apr 20 15:26:14 localhost kernel: cpu 6 spinlock event irq 161 Apr 20 15:26:14 localhost kernel: installing Xen timer for CPU 7 Apr 20 15:26:14 localhost kernel: cpu 7 spinlock event irq 167 Apr 20 15:26:14 localhost kernel: installing Xen timer for CPU 8 Apr 20 15:26:14 localhost kernel: cpu 8 spinlock event irq 173 Apr 20 15:26:14 localhost kernel: installing Xen timer for CPU 9 Apr 20 15:26:14 localhost kernel: cpu 9 spinlock event irq 179 Apr 20 15:26:14 localhost kernel: installing Xen timer for CPU 10 Apr 20 15:26:14 localhost kernel: cpu 10 spinlock event irq 185 Apr 20 15:26:14 localhost kernel: installing Xen timer for CPU 11 Apr 20 15:26:14 localhost kernel: cpu 11 spinlock event irq 191 Apr 20 15:26:14 localhost kernel: installing Xen timer for CPU 12 Apr 20 15:26:14 localhost kernel: cpu 12 spinlock event irq 197 Apr 20 15:26:14 localhost kernel: installing Xen timer for CPU 13 Apr 20 15:26:14 localhost kernel: cpu 13 spinlock event irq 203 Apr 20 15:26:14 localhost kernel: installing Xen timer for CPU 14 Apr 20 15:26:14 localhost kernel: cpu 14 spinlock event irq 209 Apr 20 15:26:14 localhost kernel: installing Xen timer for CPU 15 Apr 20 15:26:14 localhost kernel: cpu 15 spinlock event irq 215 Apr 20 15:26:14 localhost kernel: installing Xen timer for CPU 16 Apr 20 15:26:14 localhost kernel: cpu 16 spinlock event irq 221 Apr 20 15:26:14 localhost kernel: installing Xen timer for CPU 17 Apr 20 15:26:14 localhost kernel: cpu 17 spinlock event irq 227 Apr 20 15:26:14 localhost kernel: installing Xen timer for CPU 18 Apr 20 15:26:14 localhost kernel: cpu 18 spinlock event irq 233 Apr 20 15:26:14 localhost kernel: installing Xen timer for CPU 19 Apr 20 15:26:14 localhost kernel: cpu 19 spinlock event irq 239 Apr 20 15:26:14 localhost kernel: installing Xen timer for CPU 20 Apr 20 15:26:14 localhost kernel: cpu 20 spinlock event irq 245 Apr 20 15:26:14 localhost kernel: installing Xen timer for CPU 21 Apr 20 15:26:14 localhost kernel: cpu 21 spinlock event irq 251 Apr 20 15:26:14 localhost kernel: installing Xen timer for CPU 22 Apr 20 15:26:14 localhost kernel: cpu 22 spinlock event irq 257 Apr 20 15:26:14 localhost kernel: installing Xen timer for CPU 23 Apr 20 15:26:14 localhost kernel: cpu 23 spinlock event irq 263 Apr 20 15:26:14 localhost kernel: smp: Brought up 1 node, 24 CPUs Apr 20 15:26:14 localhost kernel: smpboot: Max logical packages: 1 Apr 20 15:26:14 localhost kernel: devtmpfs: initialized Apr 20 15:26:14 localhost kernel: x86/mm: Memory block size: 128MB Apr 20 15:26:14 localhost kernel: ACPI: PM: Registering ACPI NVS region [mem 0x71ff1000-0x7261efff] (6479872 bytes) Apr 20 15:26:14 localhost kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Apr 20 15:26:14 localhost kernel: futex hash table entries: 8192 (order: 7, 524288 bytes, linear) Apr 20 15:26:14 localhost kernel: pinctrl core: initialized pinctrl subsystem Apr 20 15:26:14 localhost kernel: PM: RTC time: 20:26:14, date: 2024-04-20 Apr 20 15:26:14 localhost kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Apr 20 15:26:14 localhost kernel: xen:grant_table: Grant tables using version 1 layout Apr 20 15:26:14 localhost kernel: Grant table initialized Apr 20 15:26:14 localhost kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Apr 20 15:26:14 localhost kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Apr 20 15:26:14 localhost kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Apr 20 15:26:14 localhost kernel: audit: initializing netlink subsys (disabled) Apr 20 15:26:14 localhost kernel: audit: type=2000 audit(1713644774.179:1): state=initialized audit_enabled=0 res=1 Apr 20 15:26:14 localhost kernel: thermal_sys: Registered thermal governor 'fair_share' Apr 20 15:26:14 localhost kernel: thermal_sys: Registered thermal governor 'bang_bang' Apr 20 15:26:14 localhost kernel: thermal_sys: Registered thermal governor 'step_wise' Apr 20 15:26:14 localhost kernel: thermal_sys: Registered thermal governor 'user_space' Apr 20 15:26:14 localhost kernel: ACPI FADT declares the system doesn't support PCIe ASPM, so disable it Apr 20 15:26:14 localhost kernel: PCI: MMCONFIG for domain 0000 [bus 00-e0] at [mem 0xc0000000-0xce0fffff] (base 0xc0000000) Apr 20 15:26:14 localhost kernel: PCI: MMCONFIG at [mem 0xc0000000-0xce0fffff] reserved in E820 Apr 20 15:26:14 localhost kernel: PCI: Using configuration type 1 for base access Apr 20 15:26:14 localhost kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Apr 20 15:26:14 localhost kernel: cryptd: max_cpu_qlen set to 1000 Apr 20 15:26:14 localhost kernel: raid6: skipped pq benchmark and selected avx2x4 Apr 20 15:26:14 localhost kernel: raid6: using avx2x2 recovery algorithm Apr 20 15:26:14 localhost kernel: ACPI: Added _OSI(Module Device) Apr 20 15:26:14 localhost kernel: ACPI: Added _OSI(Processor Device) Apr 20 15:26:14 localhost kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Apr 20 15:26:14 localhost kernel: ACPI: Added _OSI(Processor Aggregator Device) Apr 20 15:26:14 localhost kernel: ACPI: 12 ACPI AML tables successfully acquired and loaded Apr 20 15:26:14 localhost kernel: xen: registering gsi 9 triggering 0 polarity 0 Apr 20 15:26:14 localhost kernel: ACPI: Dynamic OEM Table Load: Apr 20 15:26:14 localhost kernel: ACPI: SSDT 0xFFFF888101D8F000 000394 (v02 PmRef Cpu0Cst 00003001 INTL 20200717) Apr 20 15:26:14 localhost kernel: ACPI: Dynamic OEM Table Load: Apr 20 15:26:14 localhost kernel: ACPI: SSDT 0xFFFF888101D9F800 000647 (v02 PmRef Cpu0Ist 00003000 INTL 20200717) Apr 20 15:26:14 localhost kernel: ACPI: Dynamic OEM Table Load: Apr 20 15:26:14 localhost kernel: ACPI: SSDT 0xFFFF8881008C6400 0001AB (v02 PmRef Cpu0Psd 00003000 INTL 20200717) Apr 20 15:26:14 localhost kernel: ACPI: Dynamic OEM Table Load: Apr 20 15:26:14 localhost kernel: ACPI: SSDT 0xFFFF888101D9E000 0004B5 (v02 PmRef Cpu0Hwp 00003000 INTL 20200717) Apr 20 15:26:14 localhost kernel: ACPI: Dynamic OEM Table Load: Apr 20 15:26:14 localhost kernel: ACPI: SSDT 0xFFFF88810244E000 001BAF (v02 PmRef ApIst 00003000 INTL 20200717) Apr 20 15:26:14 localhost kernel: ACPI: Dynamic OEM Table Load: Apr 20 15:26:14 localhost kernel: ACPI: SSDT 0xFFFF88810244C000 001038 (v02 PmRef ApHwp 00003000 INTL 20200717) Apr 20 15:26:14 localhost kernel: ACPI: Dynamic OEM Table Load: Apr 20 15:26:14 localhost kernel: ACPI: SSDT 0xFFFF88810244A000 001349 (v02 PmRef ApPsd 00003000 INTL 20200717) Apr 20 15:26:14 localhost kernel: ACPI: Dynamic OEM Table Load: Apr 20 15:26:14 localhost kernel: ACPI: SSDT 0xFFFF888101D93000 000FBB (v02 PmRef ApCst 00003000 INTL 20200717) Apr 20 15:26:14 localhost kernel: ACPI: EC: EC started Apr 20 15:26:14 localhost kernel: ACPI: EC: interrupt blocked Apr 20 15:26:14 localhost kernel: ACPI: EC: EC_CMD/EC_SC=0x66, EC_DATA=0x62 Apr 20 15:26:14 localhost kernel: ACPI: \_SB_.PC00.LPCB.EC0_: Boot DSDT EC used to handle transactions Apr 20 15:26:14 localhost kernel: ACPI: Interpreter enabled Apr 20 15:26:14 localhost kernel: ACPI: PM: (supports S0 S3 S5) Apr 20 15:26:14 localhost kernel: ACPI: Using IOAPIC for interrupt routing Apr 20 15:26:14 localhost kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Apr 20 15:26:14 localhost kernel: PCI: Ignoring E820 reservations for host bridge windows Apr 20 15:26:14 localhost kernel: ACPI: Enabled 6 GPEs in block 00 to 7F Apr 20 15:26:14 localhost kernel: ACPI: PM: Power Resource [WRST] Apr 20 15:26:14 localhost kernel: ACPI: PM: Power Resource [DRST] Apr 20 15:26:14 localhost kernel: ACPI: PM: Power Resource [PRBT] Apr 20 15:26:14 localhost kernel: ACPI: PM: Power Resource [WRST] Apr 20 15:26:14 localhost kernel: ACPI: PM: Power Resource [FN00] Apr 20 15:26:14 localhost kernel: ACPI: PM: Power Resource [FN01] Apr 20 15:26:14 localhost kernel: ACPI: PM: Power Resource [FN02] Apr 20 15:26:14 localhost kernel: ACPI: PM: Power Resource [FN03] Apr 20 15:26:14 localhost kernel: ACPI: PM: Power Resource [FN04] Apr 20 15:26:14 localhost kernel: ACPI: PM: Power Resource [PIN] Apr 20 15:26:14 localhost kernel: ACPI: PCI Root Bridge [PC00] (domain 0000 [bus 00-e0]) Apr 20 15:26:14 localhost kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI EDR HPX-Type3] Apr 20 15:26:14 localhost kernel: acpi PNP0A08:00: _OSC: OS now controls [PME AER PCIeCapability LTR DPC] Apr 20 15:26:14 localhost kernel: acpi PNP0A08:00: FADT indicates ASPM is unsupported, using BIOS configuration Apr 20 15:26:14 localhost kernel: PCI host bridge to bus 0000:00 Apr 20 15:26:14 localhost kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Apr 20 15:26:14 localhost kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Apr 20 15:26:14 localhost kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Apr 20 15:26:14 localhost kernel: pci_bus 0000:00: root bus resource [mem 0x000e0000-0x000effff window] Apr 20 15:26:14 localhost kernel: pci_bus 0000:00: root bus resource [mem 0x80800000-0xbfffffff window] Apr 20 15:26:14 localhost kernel: pci_bus 0000:00: root bus resource [mem 0x4000000000-0x7fffffffff window] Apr 20 15:26:14 localhost kernel: pci_bus 0000:00: root bus resource [bus 00-e0] Apr 20 15:26:14 localhost kernel: pci 0000:00:00.0: [8086:a700] type 00 class 0x060000 Apr 20 15:26:14 localhost kernel: pci 0000:00:01.0: [8086:a70d] type 01 class 0x060400 Apr 20 15:26:14 localhost kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold Apr 20 15:26:14 localhost kernel: pci 0000:00:01.0: PTM enabled (root), 4ns granularity Apr 20 15:26:14 localhost kernel: pci 0000:00:01.1: [8086:a72d] type 01 class 0x060400 Apr 20 15:26:14 localhost kernel: pci 0000:00:01.1: PME# supported from D0 D3hot D3cold Apr 20 15:26:14 localhost kernel: pci 0000:00:01.1: PTM enabled (root), 4ns granularity Apr 20 15:26:14 localhost kernel: pci 0000:00:02.0: [8086:a780] type 00 class 0x030000 Apr 20 15:26:14 localhost kernel: pci 0000:00:02.0: reg 0x10: [mem 0x6806000000-0x6806ffffff 64bit] Apr 20 15:26:14 localhost kernel: pci 0000:00:02.0: reg 0x18: [mem 0x4000000000-0x400fffffff 64bit pref] Apr 20 15:26:14 localhost kernel: pci 0000:00:02.0: reg 0x20: [io 0x5000-0x503f] Apr 20 15:26:14 localhost kernel: pci 0000:00:02.0: BAR 2: assigned to efifb Apr 20 15:26:14 localhost kernel: pci 0000:00:02.0: DMAR: Skip IOMMU disabling for graphics Apr 20 15:26:14 localhost kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Apr 20 15:26:14 localhost kernel: pci 0000:00:02.0: reg 0x344: [mem 0x00000000-0x00ffffff 64bit] Apr 20 15:26:14 localhost kernel: pci 0000:00:02.0: VF(n) BAR0 space: [mem 0x00000000-0x06ffffff 64bit] (contains BAR0 for 7 VFs) Apr 20 15:26:14 localhost kernel: pci 0000:00:02.0: reg 0x34c: [mem 0x00000000-0x1fffffff 64bit pref] Apr 20 15:26:14 localhost kernel: pci 0000:00:02.0: VF(n) BAR2 space: [mem 0x00000000-0xdfffffff 64bit pref] (contains BAR2 for 7 VFs) Apr 20 15:26:14 localhost kernel: pci 0000:00:0a.0: [8086:a77d] type 00 class 0x118000 Apr 20 15:26:14 localhost kernel: pci 0000:00:0a.0: reg 0x10: [mem 0x6807210000-0x6807217fff 64bit] Apr 20 15:26:14 localhost kernel: pci 0000:00:0a.0: enabling Extended Tags Apr 20 15:26:14 localhost kernel: pci 0000:00:0e.0: [8086:a77f] type 00 class 0x010400 Apr 20 15:26:14 localhost kernel: pci 0000:00:0e.0: reg 0x10: [mem 0x6804000000-0x6805ffffff 64bit] Apr 20 15:26:14 localhost kernel: pci 0000:00:0e.0: reg 0x18: [mem 0x82000000-0x83ffffff] Apr 20 15:26:14 localhost kernel: pci 0000:00:0e.0: reg 0x20: [mem 0x6807100000-0x68071fffff 64bit] Apr 20 15:26:14 localhost kernel: pci 0000:00:14.0: [8086:7a60] type 00 class 0x0c0330 Apr 20 15:26:14 localhost kernel: pci 0000:00:14.0: reg 0x10: [mem 0x6807200000-0x680720ffff 64bit] Apr 20 15:26:14 localhost kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold Apr 20 15:26:14 localhost kernel: pci 0000:00:14.2: [8086:7a27] type 00 class 0x050000 Apr 20 15:26:14 localhost kernel: pci 0000:00:14.2: reg 0x10: [mem 0x6807224000-0x6807227fff 64bit] Apr 20 15:26:14 localhost kernel: pci 0000:00:14.2: reg 0x18: [mem 0x680722d000-0x680722dfff 64bit] Apr 20 15:26:14 localhost kernel: pci 0000:00:15.0: [8086:7a4c] type 00 class 0x0c8000 Apr 20 15:26:14 localhost kernel: pci 0000:00:15.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Apr 20 15:26:14 localhost kernel: pci 0000:00:15.1: [8086:7a4d] type 00 class 0x0c8000 Apr 20 15:26:14 localhost kernel: pci 0000:00:15.1: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Apr 20 15:26:14 localhost kernel: pci 0000:00:15.2: [8086:7a4e] type 00 class 0x0c8000 Apr 20 15:26:14 localhost kernel: pci 0000:00:15.2: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Apr 20 15:26:14 localhost kernel: pci 0000:00:16.0: [8086:7a68] type 00 class 0x078000 Apr 20 15:26:14 localhost kernel: pci 0000:00:16.0: reg 0x10: [mem 0x6807229000-0x6807229fff 64bit] Apr 20 15:26:14 localhost kernel: pci 0000:00:16.0: PME# supported from D3hot Apr 20 15:26:14 localhost kernel: pci 0000:00:17.0: [8086:7a62] type 00 class 0x010601 Apr 20 15:26:14 localhost kernel: pci 0000:00:17.0: reg 0x10: [mem 0x86000000-0x86001fff] Apr 20 15:26:14 localhost kernel: pci 0000:00:17.0: reg 0x14: [mem 0x86003000-0x860030ff] Apr 20 15:26:14 localhost kernel: pci 0000:00:17.0: reg 0x18: [io 0x5090-0x5097] Apr 20 15:26:14 localhost kernel: pci 0000:00:17.0: reg 0x1c: [io 0x5080-0x5083] Apr 20 15:26:14 localhost kernel: pci 0000:00:17.0: reg 0x20: [io 0x5060-0x507f] Apr 20 15:26:14 localhost kernel: pci 0000:00:17.0: reg 0x24: [mem 0x86002000-0x860027ff] Apr 20 15:26:14 localhost kernel: pci 0000:00:17.0: PME# supported from D3hot Apr 20 15:26:14 localhost kernel: pci 0000:00:1a.0: [8086:7a48] type 01 class 0x060400 Apr 20 15:26:14 localhost kernel: pci 0000:00:1a.0: PME# supported from D0 D3hot D3cold Apr 20 15:26:14 localhost kernel: pci 0000:00:1b.0: [8086:7a40] type 01 class 0x060400 Apr 20 15:26:14 localhost kernel: pci 0000:00:1b.0: PME# supported from D0 D3hot D3cold Apr 20 15:26:14 localhost kernel: pci 0000:00:1c.0: [8086:7a38] type 01 class 0x060400 Apr 20 15:26:14 localhost kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold Apr 20 15:26:14 localhost kernel: pci 0000:00:1c.0: PTM enabled (root), 4ns granularity Apr 20 15:26:14 localhost kernel: pci 0000:00:1c.3: [8086:7a3b] type 01 class 0x060400 Apr 20 15:26:14 localhost kernel: pci 0000:00:1c.3: PME# supported from D0 D3hot D3cold Apr 20 15:26:14 localhost kernel: pci 0000:00:1c.3: PTM enabled (root), 4ns granularity Apr 20 15:26:14 localhost kernel: pci 0000:00:1d.0: [8086:7a30] type 01 class 0x060400 Apr 20 15:26:14 localhost kernel: pci 0000:00:1d.0: PME# supported from D0 D3hot D3cold Apr 20 15:26:14 localhost kernel: pci 0000:00:1d.0: PTM enabled (root), 4ns granularity Apr 20 15:26:14 localhost kernel: pci 0000:00:1f.0: [8086:7a04] type 00 class 0x060100 Apr 20 15:26:14 localhost kernel: pci 0000:00:1f.3: [8086:7a50] type 00 class 0x040300 Apr 20 15:26:14 localhost kernel: pci 0000:00:1f.3: reg 0x10: [mem 0x6807220000-0x6807223fff 64bit] Apr 20 15:26:14 localhost kernel: pci 0000:00:1f.3: reg 0x20: [mem 0x6807000000-0x68070fffff 64bit] Apr 20 15:26:14 localhost kernel: pci 0000:00:1f.3: PME# supported from D3hot D3cold Apr 20 15:26:14 localhost kernel: pci 0000:00:1f.4: [8086:7a23] type 00 class 0x0c0500 Apr 20 15:26:14 localhost kernel: pci 0000:00:1f.4: reg 0x10: [mem 0x6807228000-0x68072280ff 64bit] Apr 20 15:26:14 localhost kernel: pci 0000:00:1f.4: reg 0x20: [io 0xefa0-0xefbf] Apr 20 15:26:14 localhost kernel: pci 0000:00:1f.5: [8086:7a24] type 00 class 0x0c8000 Apr 20 15:26:14 localhost kernel: pci 0000:00:1f.5: reg 0x10: [mem 0xfe010000-0xfe010fff] Apr 20 15:26:14 localhost kernel: pci 0000:01:00.0: [10de:2684] type 00 class 0x030000 Apr 20 15:26:14 localhost kernel: pci 0000:01:00.0: reg 0x10: [mem 0x84000000-0x84ffffff] Apr 20 15:26:14 localhost kernel: pci 0000:01:00.0: reg 0x14: [mem 0x6000000000-0x67ffffffff 64bit pref] Apr 20 15:26:14 localhost kernel: pci 0000:01:00.0: reg 0x1c: [mem 0x6800000000-0x6801ffffff 64bit pref] Apr 20 15:26:14 localhost kernel: pci 0000:01:00.0: reg 0x24: [io 0x4000-0x407f] Apr 20 15:26:14 localhost kernel: pci 0000:01:00.0: reg 0x30: [mem 0x85000000-0x8507ffff pref] Apr 20 15:26:14 localhost kernel: pci 0000:01:00.0: PME# supported from D0 D3hot Apr 20 15:26:14 localhost kernel: pci 0000:01:00.0: 126.024 Gb/s available PCIe bandwidth, limited by 16.0 GT/s PCIe x8 link at 0000:00:01.0 (capable of 252.048 Gb/s with 16.0 GT/s PCIe x16 link) Apr 20 15:26:14 localhost kernel: pci 0000:01:00.1: [10de:22ba] type 00 class 0x040300 Apr 20 15:26:14 localhost kernel: pci 0000:01:00.1: reg 0x10: [mem 0x85080000-0x85083fff] Apr 20 15:26:14 localhost kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Apr 20 15:26:14 localhost kernel: pci 0000:00:01.0: bridge window [io 0x4000-0x4fff] Apr 20 15:26:14 localhost kernel: pci 0000:00:01.0: bridge window [mem 0x84000000-0x850fffff] Apr 20 15:26:14 localhost kernel: pci 0000:00:01.0: bridge window [mem 0x6000000000-0x6801ffffff 64bit pref] Apr 20 15:26:14 localhost kernel: pci 0000:02:00.0: [144d:a80c] type 00 class 0x010802 Apr 20 15:26:14 localhost kernel: pci 0000:02:00.0: reg 0x10: [mem 0x85f00000-0x85f03fff 64bit] Apr 20 15:26:14 localhost kernel: pci 0000:00:01.1: PCI bridge to [bus 02] Apr 20 15:26:14 localhost kernel: pci 0000:00:01.1: bridge window [mem 0x85f00000-0x85ffffff] Apr 20 15:26:14 localhost kernel: pci 0000:00:1a.0: PCI bridge to [bus 03] Apr 20 15:26:14 localhost kernel: pci 0000:00:1a.0: bridge window [io 0x3000-0x3fff] Apr 20 15:26:14 localhost kernel: pci 0000:00:1a.0: bridge window [mem 0x85100000-0x85afffff] Apr 20 15:26:14 localhost kernel: pci 0000:00:1a.0: bridge window [mem 0x6802100000-0x6802afffff 64bit pref] Apr 20 15:26:14 localhost kernel: pci 0000:00:1b.0: PCI bridge to [bus 04] Apr 20 15:26:14 localhost kernel: pci 0000:05:00.0: [8086:2725] type 00 class 0x028000 Apr 20 15:26:14 localhost kernel: pci 0000:05:00.0: reg 0x10: [mem 0x85e00000-0x85e03fff 64bit] Apr 20 15:26:14 localhost kernel: pci 0000:05:00.0: PME# supported from D0 D3hot D3cold Apr 20 15:26:14 localhost kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Apr 20 15:26:14 localhost kernel: pci 0000:00:1c.0: bridge window [mem 0x85e00000-0x85efffff] Apr 20 15:26:14 localhost kernel: pci 0000:06:00.0: [8086:125c] type 00 class 0x020000 Apr 20 15:26:14 localhost kernel: pci 0000:06:00.0: reg 0x10: [mem 0x85b00000-0x85bfffff] Apr 20 15:26:14 localhost kernel: pci 0000:06:00.0: reg 0x1c: [mem 0x85c00000-0x85c03fff] Apr 20 15:26:14 localhost kernel: pci 0000:06:00.0: PME# supported from D0 D3hot D3cold Apr 20 15:26:14 localhost kernel: pci 0000:00:1c.3: PCI bridge to [bus 06] Apr 20 15:26:14 localhost kernel: pci 0000:00:1c.3: bridge window [mem 0x85b00000-0x85cfffff] Apr 20 15:26:14 localhost kernel: pci 0000:07:00.0: [15b7:5030] type 00 class 0x010802 Apr 20 15:26:14 localhost kernel: pci 0000:07:00.0: reg 0x10: [mem 0x85d00000-0x85d03fff 64bit] Apr 20 15:26:14 localhost kernel: pci 0000:00:1d.0: PCI bridge to [bus 07] Apr 20 15:26:14 localhost kernel: pci 0000:00:1d.0: bridge window [mem 0x85d00000-0x85dfffff] Apr 20 15:26:14 localhost kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 0 Apr 20 15:26:14 localhost kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 1 Apr 20 15:26:14 localhost kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 0 Apr 20 15:26:14 localhost kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 0 Apr 20 15:26:14 localhost kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 0 Apr 20 15:26:14 localhost kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 0 Apr 20 15:26:14 localhost kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 0 Apr 20 15:26:14 localhost kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 0 Apr 20 15:26:14 localhost kernel: xen: registering gsi 14 triggering 0 polarity 1 Apr 20 15:26:14 localhost kernel: ACPI: EC: interrupt unblocked Apr 20 15:26:14 localhost kernel: ACPI: EC: event unblocked Apr 20 15:26:14 localhost kernel: ACPI: EC: EC_CMD/EC_SC=0x66, EC_DATA=0x62 Apr 20 15:26:14 localhost kernel: ACPI: EC: GPE=0x7 Apr 20 15:26:14 localhost kernel: ACPI: \_SB_.PC00.LPCB.EC0_: Boot DSDT EC initialization complete Apr 20 15:26:14 localhost kernel: ACPI: \_SB_.PC00.LPCB.EC0_: EC: Used to handle transactions and events Apr 20 15:26:14 localhost kernel: xen:balloon: Initialising balloon driver Apr 20 15:26:14 localhost kernel: iommu: Default domain type: Translated Apr 20 15:26:14 localhost kernel: iommu: DMA domain TLB invalidation policy: lazy mode Apr 20 15:26:14 localhost kernel: SCSI subsystem initialized Apr 20 15:26:14 localhost kernel: libata version 3.00 loaded. Apr 20 15:26:14 localhost kernel: ACPI: bus type USB registered Apr 20 15:26:14 localhost kernel: usbcore: registered new interface driver usbfs Apr 20 15:26:14 localhost kernel: usbcore: registered new interface driver hub Apr 20 15:26:14 localhost kernel: usbcore: registered new device driver usb Apr 20 15:26:14 localhost kernel: pps_core: LinuxPPS API ver. 1 registered Apr 20 15:26:14 localhost kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Apr 20 15:26:14 localhost kernel: PTP clock support registered Apr 20 15:26:14 localhost kernel: EDAC MC: Ver: 3.0.0 Apr 20 15:26:14 localhost kernel: Registered efivars operations Apr 20 15:26:14 localhost kernel: NetLabel: Initializing Apr 20 15:26:14 localhost kernel: NetLabel: domain hash size = 128 Apr 20 15:26:14 localhost kernel: NetLabel: protocols = UNLABELED CIPSOv4 CALIPSO Apr 20 15:26:14 localhost kernel: NetLabel: unlabeled traffic allowed by default Apr 20 15:26:14 localhost kernel: mctp: management component transport protocol core Apr 20 15:26:14 localhost kernel: NET: Registered PF_MCTP protocol family Apr 20 15:26:14 localhost kernel: PCI: Using ACPI for IRQ routing Apr 20 15:26:14 localhost kernel: PCI: pci_cache_line_size set to 64 bytes Apr 20 15:26:14 localhost kernel: pci 0000:00:1f.5: can't claim BAR 0 [mem 0xfe010000-0xfe010fff]: no compatible bridge window Apr 20 15:26:14 localhost kernel: e820: reserve RAM buffer [mem 0x0009e000-0x0009ffff] Apr 20 15:26:14 localhost kernel: e820: reserve RAM buffer [mem 0x61e2b000-0x63ffffff] Apr 20 15:26:14 localhost kernel: e820: reserve RAM buffer [mem 0x63e9c000-0x63ffffff] Apr 20 15:26:14 localhost kernel: e820: reserve RAM buffer [mem 0x6e07d000-0x6fffffff] Apr 20 15:26:14 localhost kernel: e820: reserve RAM buffer [mem 0x73f00000-0x73ffffff] Apr 20 15:26:14 localhost kernel: e820: reserve RAM buffer [mem 0x191fe5000-0x193ffffff] Apr 20 15:26:14 localhost kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Apr 20 15:26:14 localhost kernel: pci 0000:00:02.0: vgaarb: bridge control possible Apr 20 15:26:14 localhost kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Apr 20 15:26:14 localhost kernel: pci 0000:01:00.0: vgaarb: bridge control possible Apr 20 15:26:14 localhost kernel: pci 0000:01:00.0: vgaarb: VGA device added: decodes=io+mem,owns=none,locks=none Apr 20 15:26:14 localhost kernel: vgaarb: loaded Apr 20 15:26:14 localhost kernel: clocksource: Switched to clocksource tsc-early Apr 20 15:26:14 localhost kernel: VFS: Disk quotas dquot_6.6.0 Apr 20 15:26:14 localhost kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Apr 20 15:26:14 localhost kernel: hugetlbfs: disabling because there are no supported hugepage sizes Apr 20 15:26:14 localhost kernel: pnp: PnP ACPI init Apr 20 15:26:14 localhost kernel: system 00:00: [io 0x0290-0x029f] has been reserved Apr 20 15:26:14 localhost kernel: system 00:00: [io 0x0b00-0x0b1f] has been reserved Apr 20 15:26:14 localhost kernel: system 00:01: [io 0x0680-0x069f] has been reserved Apr 20 15:26:14 localhost kernel: system 00:01: [io 0x164e-0x164f] has been reserved Apr 20 15:26:14 localhost kernel: system 00:02: [io 0x1854-0x1857] has been reserved Apr 20 15:26:14 localhost kernel: pnp 00:03: disabling [mem 0xc0000000-0xcfffffff] because it overlaps 0000:00:02.0 BAR 9 [mem 0x00000000-0xdfffffff 64bit pref] Apr 20 15:26:14 localhost kernel: system 00:03: [mem 0xfedc0000-0xfedc7fff] has been reserved Apr 20 15:26:14 localhost kernel: system 00:03: [mem 0xfeda0000-0xfeda0fff] has been reserved Apr 20 15:26:14 localhost kernel: system 00:03: [mem 0xfeda1000-0xfeda1fff] has been reserved Apr 20 15:26:14 localhost kernel: system 00:03: [mem 0xfed20000-0xfed7ffff] could not be reserved Apr 20 15:26:14 localhost kernel: system 00:03: [mem 0xfed90000-0xfed93fff] could not be reserved Apr 20 15:26:14 localhost kernel: system 00:03: [mem 0xfed45000-0xfed8ffff] could not be reserved Apr 20 15:26:14 localhost kernel: system 00:03: [mem 0xfee00000-0xfeefffff] has been reserved Apr 20 15:26:14 localhost kernel: system 00:04: [io 0x2000-0x20fe] has been reserved Apr 20 15:26:14 localhost kernel: pnp: PnP ACPI: found 6 devices Apr 20 15:26:14 localhost kernel: PM-Timer failed consistency check (0xffffff) - aborting. Apr 20 15:26:14 localhost kernel: NET: Registered PF_INET protocol family Apr 20 15:26:14 localhost kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Apr 20 15:26:14 localhost kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Apr 20 15:26:14 localhost kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Apr 20 15:26:14 localhost kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Apr 20 15:26:14 localhost kernel: TCP bind hash table entries: 32768 (order: 8, 1048576 bytes, linear) Apr 20 15:26:14 localhost kernel: TCP: Hash tables configured (established 32768 bind 32768) Apr 20 15:26:14 localhost kernel: MPTCP token hash table entries: 4096 (order: 4, 98304 bytes, linear) Apr 20 15:26:14 localhost kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Apr 20 15:26:14 localhost kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Apr 20 15:26:14 localhost kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Apr 20 15:26:14 localhost kernel: NET: Registered PF_XDP protocol family Apr 20 15:26:14 localhost kernel: pci 0000:00:02.0: BAR 9: assigned [mem 0x4020000000-0x40ffffffff 64bit pref] Apr 20 15:26:14 localhost kernel: pci 0000:00:02.0: BAR 7: assigned [mem 0x4010000000-0x4016ffffff 64bit] Apr 20 15:26:14 localhost kernel: pci 0000:00:15.0: BAR 0: assigned [mem 0x4017000000-0x4017000fff 64bit] Apr 20 15:26:14 localhost kernel: pci 0000:00:15.1: BAR 0: assigned [mem 0x4017001000-0x4017001fff 64bit] Apr 20 15:26:14 localhost kernel: pci 0000:00:15.2: BAR 0: assigned [mem 0x4017002000-0x4017002fff 64bit] Apr 20 15:26:14 localhost kernel: pci 0000:00:1f.5: BAR 0: assigned [mem 0x80800000-0x80800fff] Apr 20 15:26:14 localhost kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Apr 20 15:26:14 localhost kernel: pci 0000:00:01.0: bridge window [io 0x4000-0x4fff] Apr 20 15:26:14 localhost kernel: pci 0000:00:01.0: bridge window [mem 0x84000000-0x850fffff] Apr 20 15:26:14 localhost kernel: pci 0000:00:01.0: bridge window [mem 0x6000000000-0x6801ffffff 64bit pref] Apr 20 15:26:14 localhost kernel: pci 0000:00:01.1: PCI bridge to [bus 02] Apr 20 15:26:14 localhost kernel: pci 0000:00:01.1: bridge window [mem 0x85f00000-0x85ffffff] Apr 20 15:26:14 localhost kernel: pci 0000:00:1a.0: PCI bridge to [bus 03] Apr 20 15:26:14 localhost kernel: pci 0000:00:1a.0: bridge window [io 0x3000-0x3fff] Apr 20 15:26:14 localhost kernel: pci 0000:00:1a.0: bridge window [mem 0x85100000-0x85afffff] Apr 20 15:26:14 localhost kernel: pci 0000:00:1a.0: bridge window [mem 0x6802100000-0x6802afffff 64bit pref] Apr 20 15:26:14 localhost kernel: pci 0000:00:1b.0: PCI bridge to [bus 04] Apr 20 15:26:14 localhost kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Apr 20 15:26:14 localhost kernel: pci 0000:00:1c.0: bridge window [mem 0x85e00000-0x85efffff] Apr 20 15:26:14 localhost kernel: pci 0000:00:1c.3: PCI bridge to [bus 06] Apr 20 15:26:14 localhost kernel: pci 0000:00:1c.3: bridge window [mem 0x85b00000-0x85cfffff] Apr 20 15:26:14 localhost kernel: pci 0000:00:1d.0: PCI bridge to [bus 07] Apr 20 15:26:14 localhost kernel: pci 0000:00:1d.0: bridge window [mem 0x85d00000-0x85dfffff] Apr 20 15:26:14 localhost kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Apr 20 15:26:14 localhost kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Apr 20 15:26:14 localhost kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Apr 20 15:26:14 localhost kernel: pci_bus 0000:00: resource 7 [mem 0x000e0000-0x000effff window] Apr 20 15:26:14 localhost kernel: pci_bus 0000:00: resource 8 [mem 0x80800000-0xbfffffff window] Apr 20 15:26:14 localhost kernel: pci_bus 0000:00: resource 9 [mem 0x4000000000-0x7fffffffff window] Apr 20 15:26:14 localhost kernel: pci_bus 0000:01: resource 0 [io 0x4000-0x4fff] Apr 20 15:26:14 localhost kernel: pci_bus 0000:01: resource 1 [mem 0x84000000-0x850fffff] Apr 20 15:26:14 localhost kernel: pci_bus 0000:01: resource 2 [mem 0x6000000000-0x6801ffffff 64bit pref] Apr 20 15:26:14 localhost kernel: pci_bus 0000:02: resource 1 [mem 0x85f00000-0x85ffffff] Apr 20 15:26:14 localhost kernel: pci_bus 0000:03: resource 0 [io 0x3000-0x3fff] Apr 20 15:26:14 localhost kernel: pci_bus 0000:03: resource 1 [mem 0x85100000-0x85afffff] Apr 20 15:26:14 localhost kernel: pci_bus 0000:03: resource 2 [mem 0x6802100000-0x6802afffff 64bit pref] Apr 20 15:26:14 localhost kernel: pci_bus 0000:05: resource 1 [mem 0x85e00000-0x85efffff] Apr 20 15:26:14 localhost kernel: pci_bus 0000:06: resource 1 [mem 0x85b00000-0x85cfffff] Apr 20 15:26:14 localhost kernel: pci_bus 0000:07: resource 1 [mem 0x85d00000-0x85dfffff] Apr 20 15:26:14 localhost kernel: xen: registering gsi 16 triggering 0 polarity 1 Apr 20 15:26:14 localhost kernel: xen: --> pirq=16 -> irq=16 (gsi=16) Apr 20 15:26:14 localhost kernel: pci 0000:01:00.1: extending delay after power-on from D3hot to 20 msec Apr 20 15:26:14 localhost kernel: pci 0000:01:00.1: D0 power state depends on 0000:01:00.0 Apr 20 15:26:14 localhost kernel: PCI: CLS 64 bytes, default 64 Apr 20 15:26:14 localhost kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Apr 20 15:26:14 localhost kernel: software IO TLB: mapped [mem 0x000000018d000000-0x0000000191000000] (64MB) Apr 20 15:26:14 localhost kernel: Trying to unpack rootfs image as initramfs... Apr 20 15:26:14 localhost kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x2df106bba01, max_idle_ns: 440795268242 ns Apr 20 15:26:14 localhost kernel: clocksource: Switched to clocksource tsc Apr 20 15:26:14 localhost kernel: platform rtc_cmos: registered platform RTC device (no PNP device found) Apr 20 15:26:14 localhost kernel: Initialise system trusted keyrings Apr 20 15:26:14 localhost kernel: Key type blacklist registered Apr 20 15:26:14 localhost kernel: workingset: timestamp_bits=36 max_order=20 bucket_order=0 Apr 20 15:26:14 localhost kernel: zbud: loaded Apr 20 15:26:14 localhost kernel: integrity: Platform Keyring initialized Apr 20 15:26:14 localhost kernel: integrity: Machine keyring initialized Apr 20 15:26:14 localhost kernel: NET: Registered PF_ALG protocol family Apr 20 15:26:14 localhost kernel: xor: automatically using best checksumming function avx Apr 20 15:26:14 localhost kernel: Key type asymmetric registered Apr 20 15:26:14 localhost kernel: Asymmetric key parser 'x509' registered Apr 20 15:26:14 localhost kernel: Freeing initrd memory: 39016K Apr 20 15:26:14 localhost kernel: alg: self-tests for CTR-KDF (hmac(sha256)) passed Apr 20 15:26:14 localhost kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 245) Apr 20 15:26:14 localhost kernel: io scheduler mq-deadline registered Apr 20 15:26:14 localhost kernel: io scheduler kyber registered Apr 20 15:26:14 localhost kernel: io scheduler bfq registered Apr 20 15:26:14 localhost kernel: atomic64_test: passed for x86-64 platform with CX8 and with SSE Apr 20 15:26:14 localhost kernel: xen: registering gsi 16 triggering 0 polarity 1 Apr 20 15:26:14 localhost kernel: Already setup the GSI :16 Apr 20 15:26:14 localhost kernel: pcieport 0000:00:01.0: PME: Signaling with IRQ 266 Apr 20 15:26:14 localhost kernel: pcieport 0000:00:01.0: AER: enabled with IRQ 266 Apr 20 15:26:14 localhost kernel: xen: registering gsi 17 triggering 0 polarity 1 Apr 20 15:26:14 localhost kernel: xen: --> pirq=17 -> irq=17 (gsi=17) Apr 20 15:26:14 localhost kernel: pcieport 0000:00:01.1: PME: Signaling with IRQ 267 Apr 20 15:26:14 localhost kernel: pcieport 0000:00:01.1: AER: enabled with IRQ 267 Apr 20 15:26:14 localhost kernel: pcieport 0000:00:1a.0: PME: Signaling with IRQ 268 Apr 20 15:26:14 localhost kernel: pcieport 0000:00:1b.0: PME: Signaling with IRQ 269 Apr 20 15:26:14 localhost kernel: xen: registering gsi 16 triggering 0 polarity 1 Apr 20 15:26:14 localhost kernel: Already setup the GSI :16 Apr 20 15:26:14 localhost kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 270 Apr 20 15:26:14 localhost kernel: pcieport 0000:00:1c.0: AER: enabled with IRQ 270 Apr 20 15:26:14 localhost kernel: xen: registering gsi 19 triggering 0 polarity 1 Apr 20 15:26:14 localhost kernel: xen: --> pirq=19 -> irq=19 (gsi=19) Apr 20 15:26:14 localhost kernel: pcieport 0000:00:1c.3: PME: Signaling with IRQ 271 Apr 20 15:26:14 localhost kernel: pcieport 0000:00:1c.3: AER: enabled with IRQ 271 Apr 20 15:26:14 localhost kernel: xen: registering gsi 16 triggering 0 polarity 1 Apr 20 15:26:14 localhost kernel: Already setup the GSI :16 Apr 20 15:26:14 localhost kernel: pcieport 0000:00:1d.0: PME: Signaling with IRQ 272 Apr 20 15:26:14 localhost kernel: pcieport 0000:00:1d.0: AER: enabled with IRQ 272 Apr 20 15:26:14 localhost kernel: Monitor-Mwait will be used to enter C-1 state Apr 20 15:26:14 localhost kernel: Monitor-Mwait will be used to enter C-2 state Apr 20 15:26:14 localhost kernel: Monitor-Mwait will be used to enter C-3 state Apr 20 15:26:14 localhost kernel: ACPI: \_SB_.PR00: Found 3 idle states Apr 20 15:26:14 localhost kernel: intel_idle: intel_idle yielding to none Apr 20 15:26:14 localhost kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input0 Apr 20 15:26:14 localhost kernel: ACPI: button: Sleep Button [SLPB] Apr 20 15:26:14 localhost kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input1 Apr 20 15:26:14 localhost kernel: ACPI: button: Power Button [PWRB] Apr 20 15:26:14 localhost kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Apr 20 15:26:14 localhost kernel: ACPI: button: Power Button [PWRF] Apr 20 15:26:14 localhost kernel: ACPI: \_SB_.PR00: Found 3 idle states Apr 20 15:26:14 localhost kernel: ACPI: \_SB_.PR01: Found 3 idle states Apr 20 15:26:14 localhost kernel: ACPI: \_SB_.PR02: Found 3 idle states Apr 20 15:26:14 localhost kernel: ACPI: \_SB_.PR03: Found 3 idle states Apr 20 15:26:14 localhost kernel: ACPI: \_SB_.PR04: Found 3 idle states Apr 20 15:26:14 localhost kernel: ACPI: \_SB_.PR05: Found 3 idle states Apr 20 15:26:14 localhost kernel: ACPI: \_SB_.PR06: Found 3 idle states Apr 20 15:26:14 localhost kernel: ACPI: \_SB_.PR07: Found 3 idle states Apr 20 15:26:14 localhost kernel: ACPI: \_SB_.PR08: Found 3 idle states Apr 20 15:26:14 localhost kernel: ACPI: \_SB_.PR09: Found 3 idle states Apr 20 15:26:14 localhost kernel: ACPI: \_SB_.PR10: Found 3 idle states Apr 20 15:26:14 localhost kernel: ACPI: \_SB_.PR11: Found 3 idle states Apr 20 15:26:14 localhost kernel: ACPI: \_SB_.PR12: Found 3 idle states Apr 20 15:26:14 localhost kernel: ACPI: \_SB_.PR13: Found 3 idle states Apr 20 15:26:14 localhost kernel: ACPI: \_SB_.PR14: Found 3 idle states Apr 20 15:26:14 localhost kernel: ACPI: \_SB_.PR15: Found 3 idle states Apr 20 15:26:14 localhost kernel: ACPI: \_SB_.PR16: Found 3 idle states Apr 20 15:26:14 localhost kernel: ACPI: \_SB_.PR17: Found 3 idle states Apr 20 15:26:14 localhost kernel: ACPI: \_SB_.PR18: Found 3 idle states Apr 20 15:26:14 localhost kernel: ACPI: \_SB_.PR19: Found 3 idle states Apr 20 15:26:14 localhost kernel: ACPI: \_SB_.PR20: Found 3 idle states Apr 20 15:26:14 localhost kernel: ACPI: \_SB_.PR21: Found 3 idle states Apr 20 15:26:14 localhost kernel: ACPI: \_SB_.PR22: Found 3 idle states Apr 20 15:26:14 localhost kernel: ACPI: \_SB_.PR23: Found 3 idle states Apr 20 15:26:14 localhost kernel: thermal LNXTHERM:00: registered as thermal_zone0 Apr 20 15:26:14 localhost kernel: ACPI: thermal: Thermal Zone [TZ00] (28 C) Apr 20 15:26:14 localhost kernel: Serial: 8250/16550 driver, 32 ports, IRQ sharing enabled Apr 20 15:26:14 localhost kernel: serial8250: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Apr 20 15:26:14 localhost kernel: hpet_acpi_add: no address or irqs in _CRS Apr 20 15:26:14 localhost kernel: Non-volatile memory driver v1.3 Apr 20 15:26:14 localhost kernel: Linux agpgart interface v0.103 Apr 20 15:26:14 localhost kernel: ACPI: bus type drm_connector registered Apr 20 15:26:14 localhost kernel: intel-lpss 0000:00:15.0: enabling device (0004 -> 0006) Apr 20 15:26:14 localhost kernel: xen: registering gsi 27 triggering 0 polarity 1 Apr 20 15:26:14 localhost kernel: xen: --> pirq=27 -> irq=27 (gsi=27) Apr 20 15:26:14 localhost kernel: intel-lpss 0000:00:15.1: enabling device (0004 -> 0006) Apr 20 15:26:14 localhost kernel: xen: registering gsi 40 triggering 0 polarity 1 Apr 20 15:26:14 localhost kernel: xen: --> pirq=40 -> irq=40 (gsi=40) Apr 20 15:26:14 localhost kernel: i2c i2c-1: Failed to register i2c client ITE8853:00 at 0x40 (-16) Apr 20 15:26:14 localhost kernel: intel-lpss 0000:00:15.2: enabling device (0004 -> 0006) Apr 20 15:26:14 localhost kernel: xen: registering gsi 29 triggering 0 polarity 1 Apr 20 15:26:14 localhost kernel: xen: --> pirq=29 -> irq=29 (gsi=29) Apr 20 15:26:14 localhost kernel: ahci 0000:00:17.0: version 3.0 Apr 20 15:26:14 localhost kernel: ahci 0000:00:17.0: enabling device (0000 -> 0003) Apr 20 15:26:14 localhost kernel: xen: registering gsi 16 triggering 0 polarity 1 Apr 20 15:26:14 localhost kernel: Already setup the GSI :16 Apr 20 15:26:14 localhost kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 4 ports 6 Gbps 0xf0 impl SATA mode Apr 20 15:26:14 localhost kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf led clo only pio slum part ems deso sadm sds Apr 20 15:26:14 localhost kernel: scsi host0: ahci Apr 20 15:26:14 localhost kernel: scsi host1: ahci Apr 20 15:26:14 localhost kernel: scsi host2: ahci Apr 20 15:26:14 localhost kernel: scsi host3: ahci Apr 20 15:26:14 localhost kernel: scsi host4: ahci Apr 20 15:26:14 localhost kernel: scsi host5: ahci Apr 20 15:26:14 localhost kernel: scsi host6: ahci Apr 20 15:26:14 localhost kernel: scsi host7: ahci Apr 20 15:26:14 localhost kernel: ata1: DUMMY Apr 20 15:26:14 localhost kernel: ata2: DUMMY Apr 20 15:26:14 localhost kernel: ata3: DUMMY Apr 20 15:26:14 localhost kernel: ata4: DUMMY Apr 20 15:26:14 localhost kernel: ata5: SATA max UDMA/133 abar m2048@0x86002000 port 0x86002300 irq 274 Apr 20 15:26:14 localhost kernel: ata6: SATA max UDMA/133 abar m2048@0x86002000 port 0x86002380 irq 274 Apr 20 15:26:14 localhost kernel: ata7: SATA max UDMA/133 abar m2048@0x86002000 port 0x86002400 irq 274 Apr 20 15:26:14 localhost kernel: ata8: SATA max UDMA/133 abar m2048@0x86002000 port 0x86002480 irq 274 Apr 20 15:26:14 localhost kernel: usbcore: registered new interface driver usbserial_generic Apr 20 15:26:14 localhost kernel: usbserial: USB Serial support registered for generic Apr 20 15:26:14 localhost kernel: i8042: PNP: No PS/2 controller found. Apr 20 15:26:14 localhost kernel: mousedev: PS/2 mouse device common for all mice Apr 20 15:26:14 localhost kernel: rtc_cmos rtc_cmos: RTC can wake from S4 Apr 20 15:26:14 localhost kernel: rtc_cmos rtc_cmos: registered as rtc0 Apr 20 15:26:14 localhost kernel: rtc_cmos rtc_cmos: setting system clock to 2024-04-20T20:26:14 UTC (1713644774) Apr 20 15:26:14 localhost kernel: rtc_cmos rtc_cmos: alarms up to one month, y3k, 114 bytes nvram Apr 20 15:26:14 localhost kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Apr 20 15:26:14 localhost kernel: device-mapper: uevent: version 1.0.3 Apr 20 15:26:14 localhost kernel: device-mapper: ioctl: 4.47.0-ioctl (2022-07-28) initialised: dm-devel@redhat.com Apr 20 15:26:14 localhost kernel: intel_pstate: CPU model not supported Apr 20 15:26:14 localhost kernel: sysfb: VRAM smaller than advertised Apr 20 15:26:14 localhost kernel: efifb: probing for efifb Apr 20 15:26:14 localhost kernel: efifb: No BGRT, not showing boot graphics Apr 20 15:26:14 localhost kernel: efifb: framebuffer at 0x4000000000, using 16200k, total 16200k Apr 20 15:26:14 localhost kernel: efifb: mode is 3840x1080x32, linelength=15360, pages=1 Apr 20 15:26:14 localhost kernel: efifb: scrolling: redraw Apr 20 15:26:14 localhost kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Apr 20 15:26:14 localhost kernel: fbcon: Deferring console take-over Apr 20 15:26:14 localhost kernel: fb0: EFI VGA frame buffer device Apr 20 15:26:14 localhost kernel: pstore: Registered efi as persistent store backend Apr 20 15:26:14 localhost kernel: hid: raw HID events driver (C) Jiri Kosina Apr 20 15:26:14 localhost kernel: usbcore: registered new interface driver usbhid Apr 20 15:26:14 localhost kernel: usbhid: USB HID core driver Apr 20 15:26:14 localhost kernel: drop_monitor: Initializing network drop monitor service Apr 20 15:26:14 localhost kernel: Initializing XFRM netlink socket Apr 20 15:26:14 localhost kernel: NET: Registered PF_INET6 protocol family Apr 20 15:26:14 localhost kernel: Segment Routing with IPv6 Apr 20 15:26:14 localhost kernel: RPL Segment Routing with IPv6 Apr 20 15:26:14 localhost kernel: In-situ OAM (IOAM) with IPv6 Apr 20 15:26:14 localhost kernel: mip6: Mobile IPv6 Apr 20 15:26:14 localhost kernel: NET: Registered PF_PACKET protocol family Apr 20 15:26:14 localhost kernel: IPI shorthand broadcast: enabled Apr 20 15:26:14 localhost kernel: AVX2 version of gcm_enc/dec engaged. Apr 20 15:26:14 localhost kernel: AES CTR mode by8 optimization enabled Apr 20 15:26:14 localhost kernel: sched_clock: Marking stable (1416350137, 46906578)->(1474183783, -10927068) Apr 20 15:26:14 localhost kernel: registered taskstats version 1 Apr 20 15:26:14 localhost kernel: Loading compiled-in X.509 certificates Apr 20 15:26:14 localhost kernel: Loaded X.509 cert 'Build time autogenerated kernel key: 3c7de4cb38cbce65ccddae94ef3d00e5ae8517ed' Apr 20 15:26:14 localhost kernel: zswap: loaded using pool lzo/zbud Apr 20 15:26:14 localhost kernel: page_owner is disabled Apr 20 15:26:14 localhost kernel: Key type .fscrypt registered Apr 20 15:26:14 localhost kernel: Key type fscrypt-provisioning registered Apr 20 15:26:14 localhost kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=yes, fsverity=yes Apr 20 15:26:14 localhost kernel: pstore: Using crash dump compression: deflate Apr 20 15:26:14 localhost kernel: Key type big_key registered Apr 20 15:26:14 localhost kernel: Key type trusted registered Apr 20 15:26:14 localhost kernel: Key type encrypted registered Apr 20 15:26:14 localhost kernel: integrity: Loading X.509 certificate: UEFI:db Apr 20 15:26:14 localhost kernel: integrity: Loaded X.509 cert 'ASUSTeK MotherBoard SW Key Certificate: da83b990422ebc8c441f8d8b039a65a2' Apr 20 15:26:14 localhost kernel: integrity: Loading X.509 certificate: UEFI:db Apr 20 15:26:14 localhost kernel: integrity: Loaded X.509 cert 'ASUSTeK Notebook SW Key Certificate: b8e581e4df77a5bb4282d5ccfc00c071' Apr 20 15:26:14 localhost kernel: integrity: Loading X.509 certificate: UEFI:db Apr 20 15:26:14 localhost kernel: integrity: Loaded X.509 cert 'Microsoft Corporation UEFI CA 2011: 13adbf4309bd82709c8cd54f316ed522988a1bd4' Apr 20 15:26:14 localhost kernel: integrity: Loading X.509 certificate: UEFI:db Apr 20 15:26:14 localhost kernel: integrity: Loaded X.509 cert 'Microsoft Windows Production PCA 2011: a92902398e16c49778cd90f99e4f9ae17c55af53' Apr 20 15:26:14 localhost kernel: integrity: Loading X.509 certificate: UEFI:db Apr 20 15:26:14 localhost kernel: integrity: Loaded X.509 cert 'Canonical Ltd. Master Certificate Authority: ad91990bc22ab1f517048c23b6655a268e345a63' Apr 20 15:26:14 localhost kernel: Loading compiled-in module X.509 certificates Apr 20 15:26:14 localhost kernel: Loaded X.509 cert 'Build time autogenerated kernel key: 3c7de4cb38cbce65ccddae94ef3d00e5ae8517ed' Apr 20 15:26:14 localhost kernel: ima: Allocated hash algorithm: sha256 Apr 20 15:26:14 localhost kernel: ima: No architecture policies found Apr 20 15:26:14 localhost kernel: evm: Initialising EVM extended attributes: Apr 20 15:26:14 localhost kernel: evm: security.selinux Apr 20 15:26:14 localhost kernel: evm: security.SMACK64 (disabled) Apr 20 15:26:14 localhost kernel: evm: security.SMACK64EXEC (disabled) Apr 20 15:26:14 localhost kernel: evm: security.SMACK64TRANSMUTE (disabled) Apr 20 15:26:14 localhost kernel: evm: security.SMACK64MMAP (disabled) Apr 20 15:26:14 localhost kernel: evm: security.apparmor Apr 20 15:26:14 localhost kernel: evm: security.ima Apr 20 15:26:14 localhost kernel: evm: security.capability Apr 20 15:26:14 localhost kernel: evm: HMAC attrs: 0x1 Apr 20 15:26:14 localhost kernel: alg: No test for 842 (842-scomp) Apr 20 15:26:14 localhost kernel: alg: No test for 842 (842-generic) Apr 20 15:26:14 localhost kernel: PM: Magic number: 4:986:447 Apr 20 15:26:14 localhost kernel: RAS: Correctable Errors collector initialized. Apr 20 15:26:14 localhost kernel: ata6: SATA link down (SStatus 4 SControl 300) Apr 20 15:26:14 localhost kernel: ata7: SATA link down (SStatus 4 SControl 300) Apr 20 15:26:14 localhost kernel: ata8: SATA link down (SStatus 4 SControl 300) Apr 20 15:26:14 localhost kernel: ata5: SATA link down (SStatus 4 SControl 300) Apr 20 15:26:14 localhost kernel: Freeing unused decrypted memory: 2036K Apr 20 15:26:14 localhost kernel: Freeing unused kernel image (initmem) memory: 3540K Apr 20 15:26:14 localhost kernel: Write protecting the kernel read-only data: 28672k Apr 20 15:26:14 localhost kernel: Freeing unused kernel image (text/rodata gap) memory: 2036K Apr 20 15:26:14 localhost kernel: Freeing unused kernel image (rodata/data gap) memory: 648K Apr 20 15:26:14 localhost kernel: rodata_test: all tests were successful Apr 20 15:26:14 localhost kernel: Run /init as init process Apr 20 15:26:14 localhost kernel: with arguments: Apr 20 15:26:14 localhost kernel: /init Apr 20 15:26:14 localhost kernel: placeholder Apr 20 15:26:14 localhost kernel: x86_64 Apr 20 15:26:14 localhost kernel: rhgb Apr 20 15:26:14 localhost kernel: with environment: Apr 20 15:26:14 localhost kernel: HOME=/ Apr 20 15:26:14 localhost kernel: TERM=linux Apr 20 15:26:14 localhost systemd[1]: systemd 251.19-1.fc37 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP -GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS +FIDO2 +IDN2 -IDN -IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 +PWQUALITY +P11KIT +QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD +BPF_FRAMEWORK +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 20 15:26:14 localhost systemd[1]: Detected virtualization xen. Apr 20 15:26:14 localhost systemd[1]: Detected architecture x86-64. Apr 20 15:26:14 localhost systemd[1]: Running in initial RAM disk. Apr 20 15:26:14 localhost systemd[1]: No hostname configured, using default hostname. Apr 20 15:26:14 localhost systemd[1]: Hostname set to . Apr 20 15:26:14 localhost systemd[1]: Failed to open libbpf, cgroup BPF features disabled: Operation not supported Apr 20 15:26:14 localhost systemd[1]: Queued start job for default target initrd.target. Apr 20 15:26:14 localhost systemd[1]: Created slice system-systemd\x2dcryptsetup.slice - Slice /system/systemd-cryptsetup. Apr 20 15:26:14 localhost systemd[1]: Reached target initrd-usr-fs.target - Initrd /usr File System. Apr 20 15:26:14 localhost systemd[1]: Reached target local-fs.target - Local File Systems. Apr 20 15:26:14 localhost systemd[1]: Reached target slices.target - Slice Units. Apr 20 15:26:14 localhost systemd[1]: Reached target swap.target - Swaps. Apr 20 15:26:14 localhost systemd[1]: Reached target timers.target - Timer Units. Apr 20 15:26:14 localhost systemd[1]: Listening on systemd-journald-audit.socket - Journal Audit Socket. Apr 20 15:26:14 localhost systemd[1]: Listening on systemd-journald-dev-log.socket - Journal Socket (/dev/log). Apr 20 15:26:14 localhost systemd[1]: Listening on systemd-journald.socket - Journal Socket. Apr 20 15:26:14 localhost systemd[1]: Listening on systemd-udevd-control.socket - udev Control Socket. Apr 20 15:26:14 localhost systemd[1]: Listening on systemd-udevd-kernel.socket - udev Kernel Socket. Apr 20 15:26:14 localhost systemd[1]: Reached target sockets.target - Socket Units. Apr 20 15:26:14 localhost systemd[1]: Starting kmod-static-nodes.service - Create List of Static Device Nodes... Apr 20 15:26:14 localhost systemd[1]: memstrack.service - Memstrack Anylazing Service was skipped because all trigger condition checks failed. Apr 20 15:26:14 localhost systemd[1]: Starting systemd-journald.service - Journal Service... Apr 20 15:26:14 localhost systemd[1]: Starting systemd-modules-load.service - Load Kernel Modules... Apr 20 15:26:14 localhost systemd[1]: Starting systemd-vconsole-setup.service - Setup Virtual Console... Apr 20 15:26:14 localhost systemd[1]: Finished kmod-static-nodes.service - Create List of Static Device Nodes. Apr 20 15:26:14 localhost systemd[1]: Starting systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev... Apr 20 15:26:14 localhost kernel: alua: device handler registered Apr 20 15:26:14 localhost kernel: emc: device handler registered Apr 20 15:26:14 localhost kernel: rdac: device handler registered Apr 20 15:26:14 localhost kernel: xen:xen_evtchn: Event-channel device installed Apr 20 15:26:14 localhost systemd[1]: Finished systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev. Apr 20 15:26:14 localhost kernel: audit: type=1130 audit(1713644774.947:2): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:14 localhost kernel: xen_pciback: backend is vpci Apr 20 15:26:14 localhost kernel: xen_acpi_processor: Uploading Xen processor PM info Apr 20 15:26:14 localhost systemd[1]: Finished systemd-modules-load.service - Load Kernel Modules. Apr 20 15:26:14 localhost kernel: audit: type=1130 audit(1713644774.963:3): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:14 localhost systemd[1]: Starting systemd-sysctl.service - Apply Kernel Variables... Apr 20 15:26:14 localhost systemd-journald[399]: Journal started Apr 20 15:26:14 localhost systemd-journald[399]: Runtime Journal (/run/log/journal/5e0ed3df2d7f445c9b1c749edb877185) is 8.0M, max 77.6M, 69.6M free. Apr 20 15:26:14 localhost audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:14 localhost audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:14 localhost systemd-modules-load[400]: Module 'msr' is built in Apr 20 15:26:14 localhost audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:14 localhost systemd-modules-load[400]: Inserted module 'dm_multipath' Apr 20 15:26:14 localhost systemd-modules-load[400]: Inserted module 'uinput' Apr 20 15:26:14 localhost systemd-modules-load[400]: Inserted module 'scsi_dh_alua' Apr 20 15:26:14 localhost systemd-modules-load[400]: Inserted module 'scsi_dh_emc' Apr 20 15:26:14 localhost audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:14 localhost systemd-modules-load[400]: Inserted module 'scsi_dh_rdac' Apr 20 15:26:14 localhost systemd-modules-load[400]: Inserted module 'xen_evtchn' Apr 20 15:26:14 localhost systemd-modules-load[400]: Inserted module 'xen_gntdev' Apr 20 15:26:14 localhost systemd-modules-load[400]: Inserted module 'xen_gntalloc' Apr 20 15:26:14 localhost systemd-modules-load[400]: Inserted module 'xen_blkback' Apr 20 15:26:14 localhost systemd-modules-load[400]: Inserted module 'xen_pciback' Apr 20 15:26:14 localhost systemd-modules-load[400]: Inserted module 'xen_privcmd' Apr 20 15:26:14 localhost systemd-modules-load[400]: Inserted module 'xen_acpi_processor' Apr 20 15:26:14 localhost systemd[1]: Finished systemd-sysctl.service - Apply Kernel Variables. Apr 20 15:26:14 localhost systemd[1]: Started systemd-journald.service - Journal Service. Apr 20 15:26:14 localhost kernel: audit: type=1130 audit(1713644774.970:4): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:14 localhost kernel: audit: type=1130 audit(1713644774.970:5): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:14 localhost systemd[1]: Starting systemd-tmpfiles-setup.service - Create Volatile Files and Directories... Apr 20 15:26:14 localhost systemd[1]: Finished systemd-tmpfiles-setup.service - Create Volatile Files and Directories. Apr 20 15:26:14 localhost audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:14 localhost kernel: audit: type=1130 audit(1713644774.978:6): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:14 localhost systemd[1]: Finished systemd-vconsole-setup.service - Setup Virtual Console. Apr 20 15:26:14 localhost audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:14 localhost systemd[1]: dracut-cmdline-ask.service - dracut ask for additional cmdline parameters was skipped because all trigger condition checks failed. Apr 20 15:26:14 localhost kernel: audit: type=1130 audit(1713644774.987:7): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:14 localhost systemd[1]: Starting dracut-cmdline.service - dracut cmdline hook... Apr 20 15:26:15 localhost dracut-cmdline[418]: dracut-4.2 (R4.2) dracut-059-5.fc37 Apr 20 15:26:15 localhost dracut-cmdline[418]: Using kernel command line parameters: placeholder root=/dev/mapper/qubes_dom0-root ro rd.luks.uuid=luks-5241442a-6636-45da-8731-66d029364f3d rd.lvm.lv=qubes_dom0/root rd.lvm.lv=qubes_dom0/swap plymouth.ignore-serial-consoles 6.1.62-1.qubes.fc37.x86_64 x86_64 rhgb rd.qubes.hide_pci=01:00.0,01:00.1 quiet usbcore.authorized_default=0 Apr 20 15:26:15 localhost kernel: pciback 0000:05:00.0: xen_pciback: seizing device Apr 20 15:26:15 localhost kernel: pciback 0000:05:00.0: enabling device (0000 -> 0002) Apr 20 15:26:15 localhost kernel: xen: registering gsi 16 triggering 0 polarity 1 Apr 20 15:26:15 localhost kernel: Already setup the GSI :16 Apr 20 15:26:15 localhost kernel: pciback 0000:06:00.0: xen_pciback: seizing device Apr 20 15:26:15 localhost kernel: pciback 0000:06:00.0: enabling device (0000 -> 0002) Apr 20 15:26:15 localhost kernel: xen: registering gsi 19 triggering 0 polarity 1 Apr 20 15:26:15 localhost kernel: Already setup the GSI :19 Apr 20 15:26:15 localhost kernel: pciback 0000:01:00.0: xen_pciback: seizing device Apr 20 15:26:15 localhost kernel: xen: registering gsi 16 triggering 0 polarity 1 Apr 20 15:26:15 localhost kernel: Already setup the GSI :16 Apr 20 15:26:15 localhost kernel: pciback 0000:01:00.1: xen_pciback: seizing device Apr 20 15:26:15 localhost kernel: pciback 0000:01:00.1: enabling device (0000 -> 0002) Apr 20 15:26:15 localhost kernel: xen: registering gsi 17 triggering 0 polarity 1 Apr 20 15:26:15 localhost kernel: Already setup the GSI :17 Apr 20 15:26:15 localhost dracut-cmdline[418]: Restricting USB in dom0 via usbguard. Apr 20 15:26:15 localhost systemd[1]: Reloading. Apr 20 15:26:15 localhost audit: BPF prog-id=6 op=LOAD Apr 20 15:26:15 localhost audit: BPF prog-id=3 op=UNLOAD Apr 20 15:26:15 localhost audit: BPF prog-id=7 op=LOAD Apr 20 15:26:15 localhost audit: BPF prog-id=8 op=LOAD Apr 20 15:26:15 localhost audit: BPF prog-id=4 op=UNLOAD Apr 20 15:26:15 localhost audit: BPF prog-id=5 op=UNLOAD Apr 20 15:26:15 localhost kernel: audit: type=1334 audit(1713644775.506:8): prog-id=6 op=LOAD Apr 20 15:26:15 localhost kernel: audit: type=1334 audit(1713644775.506:9): prog-id=3 op=UNLOAD Apr 20 15:26:15 localhost kernel: audit: type=1334 audit(1713644775.506:10): prog-id=7 op=LOAD Apr 20 15:26:15 localhost audit: BPF prog-id=9 op=LOAD Apr 20 15:26:15 localhost audit: BPF prog-id=10 op=LOAD Apr 20 15:26:15 localhost audit: BPF prog-id=11 op=LOAD Apr 20 15:26:15 localhost systemd[1]: Starting usbguard.service - USBGuard daemon... Apr 20 15:26:15 localhost usbguard-daemon[515]: [1713644775.553] (W) PERMISSIONS CHECK ON POLICY FILE ARE TURNED OFF! Apr 20 15:26:15 localhost systemd[1]: Started usbguard.service - USBGuard daemon. Apr 20 15:26:15 localhost audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=usbguard comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:15 localhost systemd-escape[558]: Input 'luks-5241442a-6636-45da-8731-66d029364f3d' is not an absolute file system path, escaping is likely not going to be reversible. Apr 20 15:26:15 localhost systemd[1]: Finished dracut-cmdline.service - dracut cmdline hook. Apr 20 15:26:15 localhost audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:15 localhost systemd[1]: Starting dracut-pre-udev.service - dracut pre-udev hook... Apr 20 15:26:15 localhost systemd[1]: Finished dracut-pre-udev.service - dracut pre-udev hook. Apr 20 15:26:15 localhost audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:15 localhost audit: BPF prog-id=12 op=LOAD Apr 20 15:26:15 localhost audit: BPF prog-id=13 op=LOAD Apr 20 15:26:15 localhost systemd[1]: Starting systemd-udevd.service - Rule-based Manager for Device Events and Files... Apr 20 15:26:16 localhost systemd-udevd[613]: Using default interface naming scheme 'v251'. Apr 20 15:26:16 localhost systemd[1]: Started systemd-udevd.service - Rule-based Manager for Device Events and Files. Apr 20 15:26:16 localhost audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:16 localhost systemd[1]: dracut-pre-trigger.service - dracut pre-trigger hook was skipped because all trigger condition checks failed. Apr 20 15:26:16 localhost systemd[1]: Starting systemd-udev-trigger.service - Coldplug All udev Devices... Apr 20 15:26:16 localhost systemd[1]: Created slice system-modprobe.slice - Slice /system/modprobe. Apr 20 15:26:16 localhost systemd[1]: Starting modprobe@configfs.service - Load Kernel Module configfs... Apr 20 15:26:16 localhost systemd[1]: modprobe@configfs.service: Deactivated successfully. Apr 20 15:26:16 localhost systemd[1]: Finished modprobe@configfs.service - Load Kernel Module configfs. Apr 20 15:26:16 localhost audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:16 localhost audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:16 localhost systemd[1]: Mounting sys-kernel-config.mount - Kernel Configuration File System... Apr 20 15:26:16 localhost systemd[1]: Mounted sys-kernel-config.mount - Kernel Configuration File System. Apr 20 15:26:16 localhost kernel: acpi PNP0C14:06: duplicate WMI GUID 97845ED0-4E6D-11DE-8A39-0800200C9A66 (first instance was on PNP0C14:02) Apr 20 15:26:16 localhost systemd[1]: Finished systemd-udev-trigger.service - Coldplug All udev Devices. Apr 20 15:26:16 localhost audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:16 localhost systemd[1]: Starting dracut-initqueue.service - dracut initqueue hook... Apr 20 15:26:16 localhost systemd[1]: Starting plymouth-start.service - Show Plymouth Boot Screen... Apr 20 15:26:16 localhost systemd[1]: Received SIGRTMIN+20 from PID 650 (plymouthd). Apr 20 15:26:16 localhost kernel: vmd 0000:00:0e.0: enabling device (0000 -> 0002) Apr 20 15:26:16 localhost systemd[1]: Started plymouth-start.service - Show Plymouth Boot Screen. Apr 20 15:26:16 localhost audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=plymouth-start comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:16 localhost systemd[1]: systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch was skipped because of a failed condition check (ConditionPathExists=!/run/plymouth/pid). Apr 20 15:26:16 localhost systemd[1]: Started systemd-ask-password-plymouth.path - Forward Password Requests to Plymouth Directory Watch. Apr 20 15:26:16 localhost systemd[1]: Reached target paths.target - Path Units. Apr 20 15:26:16 localhost kernel: vmd 0000:00:0e.0: PCI host bridge to bus 10000:e0 Apr 20 15:26:16 localhost kernel: pci_bus 10000:e0: root bus resource [bus e0-ff] Apr 20 15:26:16 localhost kernel: pci_bus 10000:e0: root bus resource [mem 0x82000000-0x83ffffff] Apr 20 15:26:16 localhost kernel: pci_bus 10000:e0: root bus resource [mem 0x6807102000-0x68071fffff 64bit] Apr 20 15:26:16 localhost kernel: vmd 0000:00:0e.0: Bound to PCI domain 10000 Apr 20 15:26:16 localhost kernel: nvme 0000:02:00.0: platform quirk: setting simple suspend Apr 20 15:26:16 localhost kernel: nvme nvme0: pci function 0000:02:00.0 Apr 20 15:26:16 localhost kernel: nvme 0000:07:00.0: platform quirk: setting simple suspend Apr 20 15:26:16 localhost kernel: nvme nvme1: pci function 0000:07:00.0 Apr 20 15:26:16 localhost kernel: xen: registering gsi 17 triggering 0 polarity 1 Apr 20 15:26:16 localhost kernel: xen: registering gsi 16 triggering 0 polarity 1 Apr 20 15:26:16 localhost kernel: Already setup the GSI :17 Apr 20 15:26:16 localhost kernel: Already setup the GSI :16 Apr 20 15:26:16 localhost kernel: nvme nvme0: Shutdown timeout set to 10 seconds Apr 20 15:26:16 localhost kernel: nvme nvme0: 16/0/0 default/read/poll queues Apr 20 15:26:16 localhost kernel: nvme0n1: p1 p2 p3 Apr 20 15:26:16 localhost systemd[1]: Reloading. Apr 20 15:26:16 localhost kernel: nvme nvme1: 24/0/0 default/read/poll queues Apr 20 15:26:16 localhost kernel: nvme1n1: p1 p2 p3 Apr 20 15:26:16 localhost kernel: xen: registering gsi 16 triggering 0 polarity 1 Apr 20 15:26:16 localhost kernel: Already setup the GSI :16 Apr 20 15:26:16 localhost kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Apr 20 15:26:16 localhost kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1 Apr 20 15:26:16 localhost kernel: xhci_hcd 0000:00:14.0: hcc params 0x20007fc1 hci version 0x120 quirks 0x0000000200009810 Apr 20 15:26:16 localhost kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Apr 20 15:26:16 localhost kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 Apr 20 15:26:16 localhost kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.2 Enhanced SuperSpeed Apr 20 15:26:16 localhost kernel: usb usb1: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 6.01 Apr 20 15:26:16 localhost kernel: usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1 Apr 20 15:26:16 localhost kernel: usb usb1: Product: xHCI Host Controller Apr 20 15:26:16 localhost kernel: usb usb1: Manufacturer: Linux 6.1.62-1.qubes.fc37.x86_64 xhci-hcd Apr 20 15:26:16 localhost kernel: usb usb1: SerialNumber: 0000:00:14.0 Apr 20 15:26:16 localhost kernel: hub 1-0:1.0: USB hub found Apr 20 15:26:16 localhost kernel: hub 1-0:1.0: 16 ports detected Apr 20 15:26:16 localhost kernel: usb usb2: New USB device found, idVendor=1d6b, idProduct=0003, bcdDevice= 6.01 Apr 20 15:26:16 localhost kernel: usb usb2: New USB device strings: Mfr=3, Product=2, SerialNumber=1 Apr 20 15:26:16 localhost kernel: usb usb2: Product: xHCI Host Controller Apr 20 15:26:16 localhost kernel: usb usb2: Manufacturer: Linux 6.1.62-1.qubes.fc37.x86_64 xhci-hcd Apr 20 15:26:16 localhost kernel: usb usb2: SerialNumber: 0000:00:14.0 Apr 20 15:26:16 localhost kernel: hub 2-0:1.0: USB hub found Apr 20 15:26:16 localhost kernel: hub 2-0:1.0: 8 ports detected Apr 20 15:26:16 localhost kernel: usb: port power management may be unreliable Apr 20 15:26:16 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:14.0/usb1" device_rule=616C6C6F7720696420316436623A30303032206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362312220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:16 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1" target="allow" device_rule=616C6C6F7720696420316436623A30303032206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362312220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:16 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:14.0/usb2" device_rule=616C6C6F7720696420316436623A30303033206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362322220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:16 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb2" target="allow" device_rule=616C6C6F7720696420316436623A30303033206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362322220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:16 localhost kernel: ACPI Warning: \_SB.PC00.PEG1.PEGP._DSM: Argument #4 type mismatch - Found [Buffer], ACPI requires [Package] (20220331/nsarguments-61) Apr 20 15:26:16 localhost kernel: ACPI: \_SB_.PC00.PEG1.PEGP: failed to evaluate _DSM Apr 20 15:26:16 localhost audit: BPF prog-id=14 op=LOAD Apr 20 15:26:16 localhost audit: BPF prog-id=15 op=LOAD Apr 20 15:26:16 localhost audit: BPF prog-id=12 op=UNLOAD Apr 20 15:26:16 localhost audit: BPF prog-id=13 op=UNLOAD Apr 20 15:26:16 localhost audit: BPF prog-id=16 op=LOAD Apr 20 15:26:16 localhost audit: BPF prog-id=9 op=UNLOAD Apr 20 15:26:16 localhost audit: BPF prog-id=17 op=LOAD Apr 20 15:26:16 localhost audit: BPF prog-id=18 op=LOAD Apr 20 15:26:16 localhost audit: BPF prog-id=10 op=UNLOAD Apr 20 15:26:16 localhost audit: BPF prog-id=11 op=UNLOAD Apr 20 15:26:16 localhost audit: BPF prog-id=19 op=LOAD Apr 20 15:26:16 localhost audit: BPF prog-id=6 op=UNLOAD Apr 20 15:26:16 localhost audit: BPF prog-id=20 op=LOAD Apr 20 15:26:16 localhost audit: BPF prog-id=21 op=LOAD Apr 20 15:26:16 localhost audit: BPF prog-id=7 op=UNLOAD Apr 20 15:26:16 localhost audit: BPF prog-id=8 op=UNLOAD Apr 20 15:26:16 localhost systemd[1]: Found device dev-disk-by\x2duuid-5241442a\x2d6636\x2d45da\x2d8731\x2d66d029364f3d.device - Samsung SSD 990 PRO 2TB 3. Apr 20 15:26:16 localhost kernel: usb 1-1: new high-speed USB device number 2 using xhci_hcd Apr 20 15:26:16 localhost kernel: xen: registering gsi 16 triggering 0 polarity 1 Apr 20 15:26:16 localhost kernel: Already setup the GSI :16 Apr 20 15:26:16 localhost kernel: i915 0000:00:02.0: [drm] VT-d active for gfx access Apr 20 15:26:16 localhost systemd[1]: Starting systemd-cryptsetup@luks\x2d5241442a\x2d6636\x2d45da\x2d8731\x2d66d029364f3d.service - Cryptography Setup for luks-5241442a-6636-45da-8731-66d029364f3d... Apr 20 15:26:16 localhost kernel: i915 0000:00:02.0: vgaarb: deactivate vga console Apr 20 15:26:16 localhost systemd[1]: Started systemd-ask-password-plymouth.service - Forward Password Requests to Plymouth. Apr 20 15:26:16 localhost audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-ask-password-plymouth comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:16 localhost kernel: tmpfs: Unsupported parameter 'huge' Apr 20 15:26:16 localhost kernel: i915 0000:00:02.0: [drm] Transparent Hugepage support is recommended for optimal performance on this platform! Apr 20 15:26:16 localhost kernel: i915 0000:00:02.0: vgaarb: changed VGA decodes: olddecodes=io+mem,decodes=none:owns=io+mem Apr 20 15:26:16 localhost kernel: i915 0000:00:02.0: [drm] Finished loading DMC firmware i915/adls_dmc_ver2_01.bin (v2.1) Apr 20 15:26:16 localhost kernel: usb 1-1: New USB device found, idVendor=174c, idProduct=2074, bcdDevice= 0.01 Apr 20 15:26:16 localhost kernel: usb 1-1: New USB device strings: Mfr=2, Product=3, SerialNumber=0 Apr 20 15:26:16 localhost kernel: usb 1-1: Product: ASM107x Apr 20 15:26:16 localhost kernel: usb 1-1: Manufacturer: ASUS TEK. Apr 20 15:26:16 localhost kernel: usb 1-1: Device is not authorized for usage Apr 20 15:26:16 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-1" device_rule=626C6F636B20696420313734633A32303734206E616D65202241534D3130377822207669612D706F72742022312D312220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:16 localhost kernel: hub 1-1:1.0: USB hub found Apr 20 15:26:16 localhost kernel: hub 1-1:1.0: 4 ports detected Apr 20 15:26:16 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-1" target="allow" device_rule=626C6F636B20696420313734633A32303734206E616D65202241534D3130377822207669612D706F72742022312D312220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:16 localhost usbguard-daemon[531]: Ignoring unknown UEvent action: sysfs_devpath=/devices/pci0000:00/0000:00:14.0/usb1/1-1 action=change Apr 20 15:26:16 localhost kernel: usb 1-1: authorized to connect Apr 20 15:26:16 localhost kernel: i915 0000:00:02.0: [drm] GuC firmware i915/tgl_guc_70.bin version 70.13.1 Apr 20 15:26:16 localhost kernel: i915 0000:00:02.0: [drm] HuC firmware i915/tgl_huc.bin version 7.9.3 Apr 20 15:26:16 localhost kernel: i915 0000:00:02.0: [drm] HuC authenticated Apr 20 15:26:16 localhost kernel: i915 0000:00:02.0: [drm] GuC submission enabled Apr 20 15:26:16 localhost kernel: i915 0000:00:02.0: [drm] GuC SLPC enabled Apr 20 15:26:16 localhost kernel: i915 0000:00:02.0: [drm] GuC RC: enabled Apr 20 15:26:16 localhost kernel: i915 0000:00:02.0: [drm] Protected Xe Path (PXP) protected content support initialized Apr 20 15:26:16 localhost kernel: [drm] Initialized i915 1.6.0 20201103 for 0000:00:02.0 on minor 0 Apr 20 15:26:16 localhost kernel: ACPI: video: Video Device [GFX0] (multi-head: yes rom: no post: no) Apr 20 15:26:16 localhost kernel: input: Video Bus as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0A08:00/LNXVIDEO:00/input/input3 Apr 20 15:26:16 localhost kernel: usb 2-1: new SuperSpeed USB device number 2 using xhci_hcd Apr 20 15:26:16 localhost kernel: fbcon: i915drmfb (fb0) is primary device Apr 20 15:26:16 localhost kernel: fbcon: Deferring console take-over Apr 20 15:26:16 localhost kernel: i915 0000:00:02.0: [drm] fb0: i915drmfb frame buffer device Apr 20 15:26:16 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:14.0/usb2/2-1" device_rule=626C6F636B20696420313734633A33303734206E616D65202241534D3130377822207669612D706F72742022322D312220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:16 localhost kernel: usb 2-1: New USB device found, idVendor=174c, idProduct=3074, bcdDevice= 0.01 Apr 20 15:26:16 localhost kernel: usb 2-1: New USB device strings: Mfr=2, Product=3, SerialNumber=0 Apr 20 15:26:16 localhost kernel: usb 2-1: Product: ASM107x Apr 20 15:26:16 localhost kernel: usb 2-1: Manufacturer: ASUS TEK. Apr 20 15:26:16 localhost kernel: usb 2-1: Device is not authorized for usage Apr 20 15:26:16 localhost kernel: hub 2-1:1.0: USB hub found Apr 20 15:26:16 localhost kernel: hub 2-1:1.0: 4 ports detected Apr 20 15:26:16 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb2/2-1" target="allow" device_rule=626C6F636B20696420313734633A33303734206E616D65202241534D3130377822207669612D706F72742022322D312220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:16 localhost kernel: usb 2-1: authorized to connect Apr 20 15:26:16 localhost usbguard-daemon[531]: Ignoring unknown UEvent action: sysfs_devpath=/devices/pci0000:00/0000:00:14.0/usb2/2-1 action=change Apr 20 15:26:16 localhost kernel: usb 1-2: new high-speed USB device number 3 using xhci_hcd Apr 20 15:26:17 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-2" device_rule=626C6F636B20696420306264613A35343230206E616D652022342D506F72742055534220322E302048756222207669612D706F72742022312D322220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:17 localhost kernel: usb 1-2: New USB device found, idVendor=0bda, idProduct=5420, bcdDevice= 1.63 Apr 20 15:26:17 localhost kernel: usb 1-2: New USB device strings: Mfr=1, Product=2, SerialNumber=0 Apr 20 15:26:17 localhost kernel: usb 1-2: Product: 4-Port USB 2.0 Hub Apr 20 15:26:17 localhost kernel: usb 1-2: Manufacturer: Generic Apr 20 15:26:17 localhost kernel: usb 1-2: Device is not authorized for usage Apr 20 15:26:17 localhost kernel: hub 1-2:1.0: USB hub found Apr 20 15:26:17 localhost kernel: hub 1-2:1.0: 4 ports detected Apr 20 15:26:17 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-2" target="allow" device_rule=626C6F636B20696420306264613A35343230206E616D652022342D506F72742055534220322E302048756222207669612D706F72742022312D322220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:17 localhost usbguard-daemon[531]: Ignoring unknown UEvent action: sysfs_devpath=/devices/pci0000:00/0000:00:14.0/usb1/1-2 action=change Apr 20 15:26:17 localhost kernel: usb 1-2: authorized to connect Apr 20 15:26:17 localhost kernel: usb 2-2: new SuperSpeed Plus Gen 2x1 USB device number 3 using xhci_hcd Apr 20 15:26:17 localhost kernel: usb 2-2: New USB device found, idVendor=0bda, idProduct=0420, bcdDevice= 1.63 Apr 20 15:26:17 localhost kernel: usb 2-2: New USB device strings: Mfr=1, Product=2, SerialNumber=0 Apr 20 15:26:17 localhost kernel: usb 2-2: Product: 4-Port USB 3.0 Hub Apr 20 15:26:17 localhost kernel: usb 2-2: Manufacturer: Generic Apr 20 15:26:17 localhost kernel: usb 2-2: Device is not authorized for usage Apr 20 15:26:17 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:14.0/usb2/2-2" device_rule=626C6F636B20696420306264613A30343230206E616D652022342D506F72742055534220332E302048756222207669612D706F72742022322D322220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:17 localhost kernel: hub 2-2:1.0: USB hub found Apr 20 15:26:17 localhost kernel: hub 2-2:1.0: 4 ports detected Apr 20 15:26:17 localhost kernel: usb 2-2: authorized to connect Apr 20 15:26:17 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb2/2-2" target="allow" device_rule=626C6F636B20696420306264613A30343230206E616D652022342D506F72742055534220332E302048756222207669612D706F72742022322D322220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:17 localhost usbguard-daemon[531]: Ignoring unknown UEvent action: sysfs_devpath=/devices/pci0000:00/0000:00:14.0/usb2/2-2 action=change Apr 20 15:26:17 localhost kernel: usb 1-4: new high-speed USB device number 4 using xhci_hcd Apr 20 15:26:17 localhost kernel: usb 2-1.2: new SuperSpeed USB device number 4 using xhci_hcd Apr 20 15:26:18 localhost kernel: usb 2-1.2: New USB device found, idVendor=13fe, idProduct=5500, bcdDevice= 1.00 Apr 20 15:26:18 localhost kernel: usb 2-1.2: New USB device strings: Mfr=1, Product=2, SerialNumber=3 Apr 20 15:26:18 localhost kernel: usb 2-1.2: Product: Patriot Memory Apr 20 15:26:18 localhost kernel: usb 2-1.2: Manufacturer: Apr 20 15:26:18 localhost kernel: usb 2-1.2: SerialNumber: 9000746EB7272256 Apr 20 15:26:18 localhost kernel: usb 2-1.2: Device is not authorized for usage Apr 20 15:26:18 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:14.0/usb2/2-1/2-1.2" device_rule=626C6F636B20696420313366653A35353030206E616D65202250617472696F74204D656D6F727922207669612D706F72742022322D312E322220776974682D696E746572666163652030383A30363A353020776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:18 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb2/2-1/2-1.2" target="block" device_rule=626C6F636B20696420313366653A35353030206E616D65202250617472696F74204D656D6F727922207669612D706F72742022322D312E322220776974682D696E746572666163652030383A30363A353020776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:18 localhost kernel: usb 2-4: new SuperSpeed USB device number 5 using xhci_hcd Apr 20 15:26:18 localhost kernel: usb 2-4: New USB device found, idVendor=174c, idProduct=3074, bcdDevice= 0.01 Apr 20 15:26:18 localhost kernel: usb 2-4: New USB device strings: Mfr=2, Product=3, SerialNumber=0 Apr 20 15:26:18 localhost kernel: usb 2-4: Product: ASM107x Apr 20 15:26:18 localhost kernel: usb 2-4: Manufacturer: ASUS TEK. Apr 20 15:26:18 localhost kernel: usb 2-4: Device is not authorized for usage Apr 20 15:26:18 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:14.0/usb2/2-4" device_rule=626C6F636B20696420313734633A33303734206E616D65202241534D3130377822207669612D706F72742022322D342220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:18 localhost kernel: hub 2-4:1.0: USB hub found Apr 20 15:26:18 localhost kernel: hub 2-4:1.0: 4 ports detected Apr 20 15:26:18 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb2/2-4" target="allow" device_rule=626C6F636B20696420313734633A33303734206E616D65202241534D3130377822207669612D706F72742022322D342220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:18 localhost kernel: usb 2-4: authorized to connect Apr 20 15:26:18 localhost usbguard-daemon[531]: Ignoring unknown UEvent action: sysfs_devpath=/devices/pci0000:00/0000:00:14.0/usb2/2-4 action=change Apr 20 15:26:18 localhost kernel: usb 1-2.3: new full-speed USB device number 5 using xhci_hcd Apr 20 15:26:18 localhost kernel: usb 1-2.3: New USB device found, idVendor=046d, idProduct=c539, bcdDevice=39.04 Apr 20 15:26:18 localhost kernel: usb 1-2.3: New USB device strings: Mfr=1, Product=2, SerialNumber=0 Apr 20 15:26:18 localhost kernel: usb 1-2.3: Product: USB Receiver Apr 20 15:26:18 localhost kernel: usb 1-2.3: Manufacturer: Logitech Apr 20 15:26:18 localhost kernel: usb 1-2.3: Device is not authorized for usage Apr 20 15:26:18 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-2/1-2.3" device_rule=626C6F636B20696420303436643A63353339206E616D65202255534220526563656976657222207669612D706F72742022312D322E332220776974682D696E74657266616365207B2030333A30313A30312030333A30313A30322030333A30303A3030207D20776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:18 localhost kernel: input: Logitech USB Receiver as /devices/pci0000:00/0000:00:14.0/usb1/1-2/1-2.3/1-2.3:1.0/0003:046D:C539.0001/input/input4 Apr 20 15:26:18 localhost kernel: hid-generic 0003:046D:C539.0001: input,hidraw0: USB HID v1.11 Keyboard [Logitech USB Receiver] on usb-0000:00:14.0-2.3/input0 Apr 20 15:26:18 localhost kernel: input: Logitech USB Receiver Mouse as /devices/pci0000:00/0000:00:14.0/usb1/1-2/1-2.3/1-2.3:1.1/0003:046D:C539.0002/input/input5 Apr 20 15:26:18 localhost kernel: input: Logitech USB Receiver Consumer Control as /devices/pci0000:00/0000:00:14.0/usb1/1-2/1-2.3/1-2.3:1.1/0003:046D:C539.0002/input/input6 Apr 20 15:26:18 localhost kernel: usb 1-2.4: new full-speed USB device number 6 using xhci_hcd Apr 20 15:26:18 localhost kernel: input: Logitech USB Receiver System Control as /devices/pci0000:00/0000:00:14.0/usb1/1-2/1-2.3/1-2.3:1.1/0003:046D:C539.0002/input/input7 Apr 20 15:26:18 localhost kernel: hid-generic 0003:046D:C539.0002: input,hiddev96,hidraw1: USB HID v1.11 Mouse [Logitech USB Receiver] on usb-0000:00:14.0-2.3/input1 Apr 20 15:26:18 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-2/1-2.3" target="allow" device_rule=626C6F636B20696420303436643A63353339206E616D65202255534220526563656976657222207669612D706F72742022312D322E332220776974682D696E74657266616365207B2030333A30313A30312030333A30313A30322030333A30303A3030207D20776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:18 localhost kernel: hid-generic 0003:046D:C539.0003: hiddev97,hidraw2: USB HID v1.11 Device [Logitech USB Receiver] on usb-0000:00:14.0-2.3/input2 Apr 20 15:26:18 localhost kernel: usb 1-2.3: authorized to connect Apr 20 15:26:18 localhost usbguard-daemon[531]: Ignoring unknown UEvent action: sysfs_devpath=/devices/pci0000:00/0000:00:14.0/usb1/1-2/1-2.3 action=change Apr 20 15:26:18 localhost kernel: usb 1-2.4: New USB device found, idVendor=046d, idProduct=c547, bcdDevice= 4.02 Apr 20 15:26:18 localhost kernel: usb 1-2.4: New USB device strings: Mfr=1, Product=2, SerialNumber=0 Apr 20 15:26:18 localhost kernel: usb 1-2.4: Product: USB Receiver Apr 20 15:26:18 localhost kernel: usb 1-2.4: Manufacturer: Logitech Apr 20 15:26:18 localhost kernel: usb 1-2.4: Device is not authorized for usage Apr 20 15:26:18 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-2/1-2.4" device_rule=626C6F636B20696420303436643A63353437206E616D65202255534220526563656976657222207669612D706F72742022312D322E342220776974682D696E74657266616365207B2030333A30313A30322030333A30313A30312030333A30303A3030207D20776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:18 localhost kernel: input: Logitech USB Receiver as /devices/pci0000:00/0000:00:14.0/usb1/1-2/1-2.4/1-2.4:1.0/0003:046D:C547.0004/input/input9 Apr 20 15:26:18 localhost kernel: hid-generic 0003:046D:C547.0004: input,hidraw0: USB HID v1.11 Mouse [Logitech USB Receiver] on usb-0000:00:14.0-2.4/input0 Apr 20 15:26:18 localhost kernel: logitech-djreceiver 0003:046D:C539.0001: hidraw3: USB HID v1.11 Keyboard [Logitech USB Receiver] on usb-0000:00:14.0-2.3/input0 Apr 20 15:26:18 localhost kernel: input: Logitech USB Receiver Keyboard as /devices/pci0000:00/0000:00:14.0/usb1/1-2/1-2.4/1-2.4:1.1/0003:046D:C547.0005/input/input10 Apr 20 15:26:18 localhost kernel: usb 2-4.1: new SuperSpeed USB device number 6 using xhci_hcd Apr 20 15:26:18 localhost kernel: hid-generic 0003:046D:C547.0005: input,hidraw4: USB HID v1.11 Keyboard [Logitech USB Receiver] on usb-0000:00:14.0-2.4/input1 Apr 20 15:26:18 localhost kernel: hid-generic 0003:046D:C547.0006: hiddev98,hidraw5: USB HID v1.11 Device [Logitech USB Receiver] on usb-0000:00:14.0-2.4/input2 Apr 20 15:26:18 localhost kernel: usb 1-2.4: authorized to connect Apr 20 15:26:18 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-2/1-2.4" target="allow" device_rule=626C6F636B20696420303436643A63353437206E616D65202255534220526563656976657222207669612D706F72742022312D322E342220776974682D696E74657266616365207B2030333A30313A30322030333A30313A30312030333A30303A3030207D20776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:18 localhost usbguard-daemon[531]: Ignoring unknown UEvent action: sysfs_devpath=/devices/pci0000:00/0000:00:14.0/usb1/1-2/1-2.4 action=change Apr 20 15:26:18 localhost kernel: usb 2-4.1: New USB device found, idVendor=05e3, idProduct=0620, bcdDevice=93.91 Apr 20 15:26:18 localhost kernel: usb 2-4.1: New USB device strings: Mfr=1, Product=2, SerialNumber=0 Apr 20 15:26:18 localhost kernel: usb 2-4.1: Product: USB3.2 Hub Apr 20 15:26:18 localhost kernel: usb 2-4.1: Manufacturer: GenesysLogic Apr 20 15:26:18 localhost kernel: usb 2-4.1: Device is not authorized for usage Apr 20 15:26:18 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:14.0/usb2/2-4/2-4.1" device_rule=626C6F636B20696420303565333A30363230206E616D652022555342332E322048756222207669612D706F72742022322D342E312220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:18 localhost kernel: hub 2-4.1:1.0: USB hub found Apr 20 15:26:18 localhost kernel: hub 2-4.1:1.0: 4 ports detected Apr 20 15:26:18 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb2/2-4/2-4.1" target="allow" device_rule=626C6F636B20696420303565333A30363230206E616D652022555342332E322048756222207669612D706F72742022322D342E312220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:18 localhost kernel: usb 2-4.1: authorized to connect Apr 20 15:26:18 localhost usbguard-daemon[531]: Ignoring unknown UEvent action: sysfs_devpath=/devices/pci0000:00/0000:00:14.0/usb2/2-4/2-4.1 action=change Apr 20 15:26:18 localhost kernel: logitech-djreceiver 0003:046D:C539.0002: hiddev96,hidraw1: USB HID v1.11 Mouse [Logitech USB Receiver] on usb-0000:00:14.0-2.3/input1 Apr 20 15:26:18 localhost kernel: logitech-djreceiver 0003:046D:C539.0003: hiddev97,hidraw2: USB HID v1.11 Device [Logitech USB Receiver] on usb-0000:00:14.0-2.3/input2 Apr 20 15:26:18 localhost kernel: logitech-djreceiver 0003:046D:C539.0003: device of type eQUAD Lightspeed 1 (0x0c) connected on slot 1 Apr 20 15:26:18 localhost kernel: input: Logitech Wireless Mouse PID:4067 Keyboard as /devices/pci0000:00/0000:00:14.0/usb1/1-2/1-2.3/1-2.3:1.2/0003:046D:C539.0003/0003:046D:4067.0007/input/input11 Apr 20 15:26:18 localhost kernel: input: Logitech Wireless Mouse PID:4067 Mouse as /devices/pci0000:00/0000:00:14.0/usb1/1-2/1-2.3/1-2.3:1.2/0003:046D:C539.0003/0003:046D:4067.0007/input/input12 Apr 20 15:26:18 localhost kernel: hid-generic 0003:046D:4067.0007: input,hidraw6: USB HID v1.11 Keyboard [Logitech Wireless Mouse PID:4067] on usb-0000:00:14.0-2.3/input2:1 Apr 20 15:26:18 localhost kernel: input: Logitech G903 as /devices/pci0000:00/0000:00:14.0/usb1/1-2/1-2.3/1-2.3:1.2/0003:046D:C539.0003/0003:046D:4067.0007/input/input16 Apr 20 15:26:18 localhost kernel: logitech-hidpp-device 0003:046D:4067.0007: input,hidraw6: USB HID v1.11 Keyboard [Logitech G903] on usb-0000:00:14.0-2.3/input2:1 Apr 20 15:26:19 localhost kernel: usb 1-4: New USB device found, idVendor=0b05, idProduct=1a52, bcdDevice= 0.03 Apr 20 15:26:19 localhost kernel: usb 1-4: New USB device strings: Mfr=3, Product=1, SerialNumber=0 Apr 20 15:26:19 localhost kernel: usb 1-4: Product: USB Audio Apr 20 15:26:19 localhost kernel: usb 1-4: Manufacturer: Generic Apr 20 15:26:19 localhost kernel: usb 1-4: Device is not authorized for usage Apr 20 15:26:19 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-4" device_rule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exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:19 localhost kernel: kauditd_printk_skb: 55 callbacks suppressed Apr 20 15:26:19 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-4" target="block" device_rule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exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:19 localhost kernel: audit: type=1137 audit(1713644779.606:66): pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-4" device_rule=626C6F636B20696420306230353A31613532206E616D65202255534220417564696F22207669612D706F72742022312D342220776974682D696E74657266616365207B2030313A30313A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A3032 Apr 20 15:26:19 localhost kernel: audit: type=1137 audit(1713644779.607:67): pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-4" target="block" device_rule=626C6F636B20696420306230353A31613532206E616D65202255534220417564696F22207669612D706F72742022312D342220776974682D696E74657266616365207B2030313A30313A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A323 Apr 20 15:26:19 localhost kernel: usb 1-5: new high-speed USB device number 7 using xhci_hcd Apr 20 15:26:19 localhost kernel: usb 1-5: New USB device found, idVendor=174c, idProduct=2074, bcdDevice= 0.01 Apr 20 15:26:19 localhost kernel: usb 1-5: New USB device strings: Mfr=2, Product=3, SerialNumber=0 Apr 20 15:26:19 localhost kernel: usb 1-5: Product: ASM107x Apr 20 15:26:19 localhost kernel: usb 1-5: Manufacturer: ASUS TEK. Apr 20 15:26:19 localhost kernel: usb 1-5: Device is not authorized for usage Apr 20 15:26:19 localhost kernel: audit: type=1137 audit(1713644779.849:68): pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-5" device_rule=626C6F636B20696420313734633A32303734206E616D65202241534D3130377822207669612D706F72742022312D352220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:19 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-5" device_rule=626C6F636B20696420313734633A32303734206E616D65202241534D3130377822207669612D706F72742022312D352220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:19 localhost kernel: hub 1-5:1.0: USB hub found Apr 20 15:26:19 localhost kernel: hub 1-5:1.0: 4 ports detected Apr 20 15:26:19 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-5" target="allow" device_rule=626C6F636B20696420313734633A32303734206E616D65202241534D3130377822207669612D706F72742022312D352220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:19 localhost usbguard-daemon[531]: Ignoring unknown UEvent action: sysfs_devpath=/devices/pci0000:00/0000:00:14.0/usb1/1-5 action=change Apr 20 15:26:19 localhost kernel: usb 1-5: authorized to connect Apr 20 15:26:19 localhost kernel: audit: type=1137 audit(1713644779.857:69): pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-5" target="allow" device_rule=626C6F636B20696420313734633A32303734206E616D65202241534D3130377822207669612D706F72742022312D352220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:19 localhost kernel: usb 1-10: new high-speed USB device number 8 using xhci_hcd Apr 20 15:26:20 localhost kernel: usb 1-10: New USB device found, idVendor=05e3, idProduct=0608, bcdDevice=60.90 Apr 20 15:26:20 localhost kernel: usb 1-10: New USB device strings: Mfr=0, Product=1, SerialNumber=0 Apr 20 15:26:20 localhost kernel: usb 1-10: Product: USB2.0 Hub Apr 20 15:26:20 localhost kernel: usb 1-10: Device is not authorized for usage Apr 20 15:26:20 localhost kernel: audit: type=1137 audit(1713644780.090:70): pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-10" device_rule=626C6F636B20696420303565333A30363038206E616D652022555342322E302048756222207669612D706F72742022312D31302220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:20 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-10" device_rule=626C6F636B20696420303565333A30363038206E616D652022555342322E302048756222207669612D706F72742022312D31302220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:20 localhost kernel: hub 1-10:1.0: USB hub found Apr 20 15:26:20 localhost kernel: hub 1-10:1.0: 2 ports detected Apr 20 15:26:20 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-10" target="allow" device_rule=626C6F636B20696420303565333A30363038206E616D652022555342322E302048756222207669612D706F72742022312D31302220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:20 localhost usbguard-daemon[531]: Ignoring unknown UEvent action: sysfs_devpath=/devices/pci0000:00/0000:00:14.0/usb1/1-10 action=change Apr 20 15:26:20 localhost kernel: usb 1-10: authorized to connect Apr 20 15:26:20 localhost kernel: audit: type=1137 audit(1713644780.096:71): pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-10" target="allow" device_rule=626C6F636B20696420303565333A30363038206E616D652022555342322E302048756222207669612D706F72742022312D31302220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:20 localhost kernel: usb 1-5.1: new high-speed USB device number 9 using xhci_hcd Apr 20 15:26:20 localhost kernel: usb 1-5.1: New USB device found, idVendor=05e3, idProduct=0610, bcdDevice=93.91 Apr 20 15:26:20 localhost kernel: usb 1-5.1: New USB device strings: Mfr=1, Product=2, SerialNumber=0 Apr 20 15:26:20 localhost kernel: usb 1-5.1: Product: USB2.1 Hub Apr 20 15:26:20 localhost kernel: usb 1-5.1: Manufacturer: GenesysLogic Apr 20 15:26:20 localhost kernel: usb 1-5.1: Device is not authorized for usage Apr 20 15:26:20 localhost kernel: audit: type=1137 audit(1713644780.268:72): pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-5/1-5.1" device_rule=626C6F636B20696420303565333A30363130206E616D652022555342322E312048756222207669612D706F72742022312D352E312220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:20 localhost kernel: hub 1-5.1:1.0: USB hub found Apr 20 15:26:20 localhost kernel: hub 1-5.1:1.0: 4 ports detected Apr 20 15:26:20 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-5/1-5.1" device_rule=626C6F636B20696420303565333A30363130206E616D652022555342322E312048756222207669612D706F72742022312D352E312220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:20 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-5/1-5.1" target="allow" device_rule=626C6F636B20696420303565333A30363130206E616D652022555342322E312048756222207669612D706F72742022312D352E312220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:20 localhost usbguard-daemon[531]: Ignoring unknown UEvent action: sysfs_devpath=/devices/pci0000:00/0000:00:14.0/usb1/1-5/1-5.1 action=change Apr 20 15:26:20 localhost kernel: usb 1-5.1: authorized to connect Apr 20 15:26:20 localhost kernel: audit: type=1137 audit(1713644780.275:73): pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-5/1-5.1" target="allow" device_rule=626C6F636B20696420303565333A30363130206E616D652022555342322E312048756222207669612D706F72742022312D352E312220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:20 localhost kernel: usb 1-11: new high-speed USB device number 10 using xhci_hcd Apr 20 15:26:20 localhost kernel: usb 1-11: New USB device found, idVendor=0416, idProduct=7395, bcdDevice= 0.01 Apr 20 15:26:20 localhost kernel: usb 1-11: New USB device strings: Mfr=0, Product=2, SerialNumber=3 Apr 20 15:26:20 localhost kernel: usb 1-11: Product: LianLi-GA_II-LCD_v1.3 Apr 20 15:26:20 localhost kernel: usb 1-11: SerialNumber: 00000055FA92 Apr 20 15:26:20 localhost kernel: usb 1-11: Device is not authorized for usage Apr 20 15:26:20 localhost kernel: audit: type=1137 audit(1713644780.507:74): pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-11" device_rule=626C6F636B20696420303431363A37333935206E616D6520224C69616E4C692D47415F49492D4C43445F76312E3322207669612D706F72742022312D31312220776974682D696E74657266616365207B2066663A30303A30302030333A30303A3030207D20776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:20 localhost kernel: audit: type=1137 audit(1713644780.508:75): pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-11" target="block" device_rule=626C6F636B20696420303431363A37333935206E616D6520224C69616E4C692D47415F49492D4C43445F76312E3322207669612D706F72742022312D31312220776974682D696E74657266616365207B2066663A30303A30302030333A30303A3030207D20776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:20 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-11" device_rule=626C6F636B20696420303431363A37333935206E616D6520224C69616E4C692D47415F49492D4C43445F76312E3322207669612D706F72742022312D31312220776974682D696E74657266616365207B2066663A30303A30302030333A30303A3030207D20776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:20 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-11" target="block" device_rule=626C6F636B20696420303431363A37333935206E616D6520224C69616E4C692D47415F49492D4C43445F76312E3322207669612D706F72742022312D31312220776974682D696E74657266616365207B2066663A30303A30302030333A30303A3030207D20776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:20 localhost kernel: usb 1-5.3: new high-speed USB device number 11 using xhci_hcd Apr 20 15:26:20 localhost kernel: usb 1-5.3: New USB device found, idVendor=2708, idProduct=0001, bcdDevice= 2.07 Apr 20 15:26:20 localhost kernel: usb 1-5.3: New USB device strings: Mfr=1, Product=3, SerialNumber=0 Apr 20 15:26:20 localhost kernel: usb 1-5.3: Product: Audient iD22 Apr 20 15:26:20 localhost kernel: usb 1-5.3: Manufacturer: Audient Apr 20 15:26:20 localhost kernel: usb 1-5.3: Device is not authorized for usage Apr 20 15:26:20 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-5/1-5.3" device_rule=626C6F636B20696420323730383A30303031206E616D65202241756469656E74206944323222207669612D706F72742022312D352E332220776974682D696E74657266616365207B2030313A30313A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302066653A30313A30312030313A30313A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302066653A30313A3031207D20776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:20 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-5/1-5.3" target="block" device_rule=626C6F636B20696420323730383A30303031206E616D65202241756469656E74206944323222207669612D706F72742022312D352E332220776974682D696E74657266616365207B2030313A30313A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302066653A30313A30312030313A30313A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302066653A30313A3031207D20776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:20 localhost kernel: usb 1-10.1: new high-speed USB device number 12 using xhci_hcd Apr 20 15:26:20 localhost kernel: usb 1-10.1: New USB device found, idVendor=1a40, idProduct=0101, bcdDevice= 1.11 Apr 20 15:26:20 localhost kernel: usb 1-10.1: New USB device strings: Mfr=0, Product=1, SerialNumber=0 Apr 20 15:26:20 localhost kernel: usb 1-10.1: Product: USB 2.0 Hub Apr 20 15:26:20 localhost kernel: usb 1-10.1: Device is not authorized for usage Apr 20 15:26:20 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-10/1-10.1" device_rule=626C6F636B20696420316134303A30313031206E616D65202255534220322E302048756222207669612D706F72742022312D31302E312220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:20 localhost kernel: hub 1-10.1:1.0: USB hub found Apr 20 15:26:20 localhost kernel: hub 1-10.1:1.0: 4 ports detected Apr 20 15:26:20 localhost kernel: usb 1-10.1: authorized to connect Apr 20 15:26:20 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-10/1-10.1" target="allow" device_rule=626C6F636B20696420316134303A30313031206E616D65202255534220322E302048756222207669612D706F72742022312D31302E312220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:20 localhost usbguard-daemon[531]: Ignoring unknown UEvent action: sysfs_devpath=/devices/pci0000:00/0000:00:14.0/usb1/1-10/1-10.1 action=change Apr 20 15:26:20 localhost kernel: usb 1-5.1.1: new full-speed USB device number 13 using xhci_hcd Apr 20 15:26:21 localhost kernel: usb 1-5.1.1: New USB device found, idVendor=046d, idProduct=c53a, bcdDevice=40.03 Apr 20 15:26:21 localhost kernel: usb 1-5.1.1: New USB device strings: Mfr=1, Product=2, SerialNumber=0 Apr 20 15:26:21 localhost kernel: usb 1-5.1.1: Product: USB Receiver Apr 20 15:26:21 localhost kernel: usb 1-5.1.1: Manufacturer: Logitech Apr 20 15:26:21 localhost kernel: usb 1-5.1.1: Device is not authorized for usage Apr 20 15:26:21 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-5/1-5.1/1-5.1.1" device_rule=626C6F636B20696420303436643A63353361206E616D65202255534220526563656976657222207669612D706F72742022312D352E312E312220776974682D696E74657266616365207B2030333A30313A30312030333A30313A30322030333A30303A3030207D20776974682D636F6E6E6563742D747970652022756E6B6E6F776E22 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:21 localhost kernel: logitech-djreceiver 0003:046D:C53A.0008: hidraw7: USB HID v1.11 Keyboard [Logitech USB Receiver] on usb-0000:00:14.0-5.1.1/input0 Apr 20 15:26:21 localhost kernel: logitech-djreceiver 0003:046D:C53A.0009: hidraw8: USB HID v1.11 Mouse [Logitech USB Receiver] on usb-0000:00:14.0-5.1.1/input1 Apr 20 15:26:21 localhost kernel: usb 1-13: new full-speed USB device number 14 using xhci_hcd Apr 20 15:26:21 localhost kernel: logitech-djreceiver 0003:046D:C53A.000A: hiddev99,hidraw9: USB HID v1.11 Device [Logitech USB Receiver] on usb-0000:00:14.0-5.1.1/input2 Apr 20 15:26:21 localhost kernel: usb 1-5.1.1: authorized to connect Apr 20 15:26:21 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-5/1-5.1/1-5.1.1" target="allow" device_rule=626C6F636B20696420303436643A63353361206E616D65202255534220526563656976657222207669612D706F72742022312D352E312E312220776974682D696E74657266616365207B2030333A30313A30312030333A30313A30322030333A30303A3030207D20776974682D636F6E6E6563742D747970652022756E6B6E6F776E22 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:21 localhost kernel: logitech-djreceiver 0003:046D:C53A.000A: device of type eQUAD Lightspeed 1.2 (0x11) connected on slot 1 Apr 20 15:26:21 localhost usbguard-daemon[531]: Ignoring unknown UEvent action: sysfs_devpath=/devices/pci0000:00/0000:00:14.0/usb1/1-5/1-5.1/1-5.1.1 action=change Apr 20 15:26:21 localhost kernel: logitech-djreceiver 0003:046D:C53A.000A: device of type eQUAD Lightspeed 1 (0x0c) connected on slot 7 Apr 20 15:26:21 localhost kernel: logitech-hidpp-device 0003:046D:4099.000B: HID++ 4.2 device connected. Apr 20 15:26:21 localhost kernel: usb 1-13: config 1 has an invalid interface number: 2 but max is 1 Apr 20 15:26:21 localhost kernel: usb 1-13: config 1 has no interface number 1 Apr 20 15:26:21 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-13" device_rule=626C6F636B20696420306230353A31396166206E616D65202241555241204C454420436F6E74726F6C6C657222207669612D706F72742022312D31332220776974682D696E74657266616365207B2066663A66663A66662030333A30303A3030207D20776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:21 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-13" target="block" device_rule=626C6F636B20696420306230353A31396166206E616D65202241555241204C454420436F6E74726F6C6C657222207669612D706F72742022312D31332220776974682D696E74657266616365207B2066663A66663A66662030333A30303A3030207D20776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:21 localhost kernel: usb 1-13: New USB device found, idVendor=0b05, idProduct=19af, bcdDevice= 1.00 Apr 20 15:26:21 localhost kernel: usb 1-13: New USB device strings: Mfr=1, Product=2, SerialNumber=3 Apr 20 15:26:21 localhost kernel: usb 1-13: Product: AURA LED Controller Apr 20 15:26:21 localhost kernel: usb 1-13: Manufacturer: AsusTek Computer Inc. Apr 20 15:26:21 localhost kernel: usb 1-13: SerialNumber: 9876543210 Apr 20 15:26:21 localhost kernel: usb 1-13: Device is not authorized for usage Apr 20 15:26:21 localhost kernel: usb 1-10.2: new high-speed USB device number 15 using xhci_hcd Apr 20 15:26:21 localhost kernel: input: Logitech G502 X PLUS as /devices/pci0000:00/0000:00:14.0/usb1/1-5/1-5.1/1-5.1.1/1-5.1.1:1.2/0003:046D:C53A.000A/0003:046D:4099.000B/input/input17 Apr 20 15:26:21 localhost kernel: logitech-hidpp-device 0003:046D:4099.000B: input,hidraw10: USB HID v1.11 Keyboard [Logitech G502 X PLUS] on usb-0000:00:14.0-5.1.1/input2:1 Apr 20 15:26:21 localhost kernel: logitech-hidpp-device 0003:046D:405F.000C: HID++ 4.2 device connected. Apr 20 15:26:21 localhost kernel: usb 1-10.2: New USB device found, idVendor=1a40, idProduct=0101, bcdDevice= 1.11 Apr 20 15:26:21 localhost kernel: usb 1-10.2: New USB device strings: Mfr=0, Product=1, SerialNumber=0 Apr 20 15:26:21 localhost kernel: usb 1-10.2: Product: USB 2.0 Hub Apr 20 15:26:21 localhost kernel: usb 1-10.2: Device is not authorized for usage Apr 20 15:26:21 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-10/1-10.2" device_rule=626C6F636B20696420316134303A30313031206E616D65202255534220322E302048756222207669612D706F72742022312D31302E322220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:21 localhost kernel: input: Logitech Candy as /devices/pci0000:00/0000:00:14.0/usb1/1-5/1-5.1/1-5.1.1/1-5.1.1:1.2/0003:046D:C53A.000A/0003:046D:405F.000C/input/input18 Apr 20 15:26:21 localhost kernel: logitech-hidpp-device 0003:046D:405F.000C: input,hidraw11: USB HID v1.11 Keyboard [Logitech Candy] on usb-0000:00:14.0-5.1.1/input2:7 Apr 20 15:26:21 localhost kernel: hub 1-10.2:1.0: USB hub found Apr 20 15:26:21 localhost kernel: hub 1-10.2:1.0: 4 ports detected Apr 20 15:26:21 localhost kernel: usb 1-10.2: authorized to connect Apr 20 15:26:21 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-10/1-10.2" target="allow" device_rule=626C6F636B20696420316134303A30313031206E616D65202255534220322E302048756222207669612D706F72742022312D31302E322220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:21 localhost usbguard-daemon[531]: Ignoring unknown UEvent action: sysfs_devpath=/devices/pci0000:00/0000:00:14.0/usb1/1-10/1-10.2 action=change Apr 20 15:26:21 localhost kernel: usb 1-10.1.2: new full-speed USB device number 16 using xhci_hcd Apr 20 15:26:21 localhost kernel: usb 1-10.1.2: New USB device found, idVendor=0cf2, idProduct=a200, bcdDevice= 1.00 Apr 20 15:26:21 localhost kernel: usb 1-10.1.2: New USB device strings: Mfr=1, Product=2, SerialNumber=3 Apr 20 15:26:21 localhost kernel: usb 1-10.1.2: Product: LianLi-Strimer Plus-1.5 Apr 20 15:26:21 localhost kernel: usb 1-10.1.2: Manufacturer: ENE Apr 20 15:26:21 localhost kernel: usb 1-10.1.2: SerialNumber: 6243168001 Apr 20 15:26:21 localhost kernel: usb 1-10.1.2: Device is not authorized for usage Apr 20 15:26:21 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-10/1-10.1/1-10.1.2" device_rule=626C6F636B20696420306366323A61323030206E616D6520224C69616E4C692D537472696D657220506C75732D312E3522207669612D706F72742022312D31302E312E322220776974682D696E74657266616365207B2066663A66663A66662030333A30303A3030207D20776974682D636F6E6E6563742D747970652022756E6B6E6F776E22 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:21 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-10/1-10.1/1-10.1.2" target="block" device_rule=626C6F636B20696420306366323A61323030206E616D6520224C69616E4C692D537472696D657220506C75732D312E3522207669612D706F72742022312D31302E312E322220776974682D696E74657266616365207B2066663A66663A66662030333A30303A3030207D20776974682D636F6E6E6563742D747970652022756E6B6E6F776E22 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:21 localhost kernel: usb 1-14: new full-speed USB device number 17 using xhci_hcd Apr 20 15:26:22 localhost kernel: usb 1-14: New USB device found, idVendor=8087, idProduct=0032, bcdDevice= 0.00 Apr 20 15:26:22 localhost kernel: usb 1-14: New USB device strings: Mfr=0, Product=0, SerialNumber=0 Apr 20 15:26:22 localhost kernel: usb 1-14: Device is not authorized for usage Apr 20 15:26:22 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-14" device_rule=626C6F636B20696420383038373A30303332206E616D65202222207669612D706F72742022312D31342220776974682D696E74657266616365207B2065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A3031207D20776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:22 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-14" target="block" device_rule=626C6F636B20696420383038373A30303332206E616D65202222207669612D706F72742022312D31342220776974682D696E74657266616365207B2065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A3031207D20776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:22 localhost kernel: usb 1-10.1.4: new full-speed USB device number 18 using xhci_hcd Apr 20 15:26:22 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="inserted-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-10/1-10.1/1-10.1.4" device_rule=626C6F636B20696420306366323A61313032206E616D6520224C69616E4C692D534C2D696E66696E6974792D76312E3422207669612D706F72742022312D31302E312E342220776974682D696E74657266616365207B2066663A66663A66662030333A30303A3030207D20776974682D636F6E6E6563742D747970652022756E6B6E6F776E22 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:22 localhost audit[531]: USER_DEVICE pid=531 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-10/1-10.1/1-10.1.4" target="block" device_rule=626C6F636B20696420306366323A61313032206E616D6520224C69616E4C692D534C2D696E66696E6974792D76312E3422207669612D706F72742022312D31302E312E342220776974682D696E74657266616365207B2066663A66663A66662030333A30303A3030207D20776974682D636F6E6E6563742D747970652022756E6B6E6F776E22 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:22 localhost kernel: usb 1-10.1.4: New USB device found, idVendor=0cf2, idProduct=a102, bcdDevice= 1.00 Apr 20 15:26:22 localhost kernel: usb 1-10.1.4: New USB device strings: Mfr=1, Product=2, SerialNumber=3 Apr 20 15:26:22 localhost kernel: usb 1-10.1.4: Product: LianLi-SL-infinity-v1.4 Apr 20 15:26:22 localhost kernel: usb 1-10.1.4: Manufacturer: ENE Apr 20 15:26:22 localhost kernel: usb 1-10.1.4: SerialNumber: 6243168001 Apr 20 15:26:22 localhost kernel: usb 1-10.1.4: Device is not authorized for usage Apr 20 15:26:48 localhost systemd-cryptsetup[742]: Set cipher aes, mode xts-plain64, key size 512 bits for device /dev/disk/by-uuid/5241442a-6636-45da-8731-66d029364f3d. Apr 20 15:26:49 localhost audit[742]: DM_CTRL module=crypt op=ctr ppid=1 pid=742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-cryptse" exe="/usr/lib/systemd/systemd-cryptsetup" dev=253:0 error_msg='success' res=1 Apr 20 15:26:49 localhost audit[742]: SYSCALL arch=c000003e syscall=16 success=yes exit=0 a0=4 a1=c138fd09 a2=62a4400f5bd0 a3=0 items=6 ppid=1 pid=742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-cryptse" exe="/usr/lib/systemd/systemd-cryptsetup" key=(null) Apr 20 15:26:49 localhost audit: CWD cwd="/" Apr 20 15:26:49 localhost audit: PATH item=0 name=(null) inode=1025 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 20 15:26:49 localhost audit: PATH item=1 name=(null) inode=28214 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 20 15:26:49 localhost audit: PATH item=2 name=(null) inode=26 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 20 15:26:49 localhost kernel: kauditd_printk_skb: 16 callbacks suppressed Apr 20 15:26:49 localhost kernel: audit: type=1338 audit(1713644809.579:92): module=crypt op=ctr ppid=1 pid=742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-cryptse" exe="/usr/lib/systemd/systemd-cryptsetup" dev=253:0 error_msg='success' res=1 Apr 20 15:26:49 localhost kernel: audit: type=1300 audit(1713644809.579:92): arch=c000003e syscall=16 success=yes exit=0 a0=4 a1=c138fd09 a2=62a4400f5bd0 a3=0 items=6 ppid=1 pid=742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-cryptse" exe="/usr/lib/systemd/systemd-cryptsetup" key=(null) Apr 20 15:26:49 localhost kernel: audit: type=1307 audit(1713644809.579:92): cwd="/" Apr 20 15:26:49 localhost kernel: audit: type=1302 audit(1713644809.579:92): item=0 name=(null) inode=1025 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 20 15:26:49 localhost kernel: audit: type=1302 audit(1713644809.579:92): item=1 name=(null) inode=28214 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 20 15:26:49 localhost kernel: audit: type=1302 audit(1713644809.579:92): item=2 name=(null) inode=26 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 20 15:26:49 localhost kernel: audit: type=1302 audit(1713644809.579:92): item=3 name=(null) inode=28215 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 20 15:26:49 localhost kernel: audit: type=1302 audit(1713644809.579:92): item=4 name=(null) inode=28215 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 20 15:26:49 localhost kernel: audit: type=1302 audit(1713644809.579:92): item=5 name=(null) inode=28216 dev=00:07 mode=0100444 ouid=0 ogid=0 rdev=00:00 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 20 15:26:49 localhost kernel: audit: type=1327 audit(1713644809.579:92): proctitle=2F7573722F6C69622F73797374656D642F73797374656D642D6372797074736574757000617474616368006C756B732D35323431343432612D363633362D343564612D383733312D363664303239333634663364002F6465762F6469736B2F62792D757569642F35323431343432612D363633362D343564612D383733312D36 Apr 20 15:26:49 localhost audit: PATH item=3 name=(null) inode=28215 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 20 15:26:49 localhost audit: PATH item=4 name=(null) inode=28215 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 20 15:26:49 localhost audit: PATH item=5 name=(null) inode=28216 dev=00:07 mode=0100444 ouid=0 ogid=0 rdev=00:00 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 20 15:26:49 localhost audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D642D6372797074736574757000617474616368006C756B732D35323431343432612D363633362D343564612D383733312D363664303239333634663364002F6465762F6469736B2F62792D757569642F35323431343432612D363633362D343564612D383733312D36 Apr 20 15:26:49 localhost systemd[1]: Finished systemd-cryptsetup@luks\x2d5241442a\x2d6636\x2d45da\x2d8731\x2d66d029364f3d.service - Cryptography Setup for luks-5241442a-6636-45da-8731-66d029364f3d. Apr 20 15:26:49 localhost audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-cryptsetup@luks\x2d5241442a\x2d6636\x2d45da\x2d8731\x2d66d029364f3d comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:49 localhost systemd[1]: Reached target cryptsetup.target - Local Encrypted Volumes. Apr 20 15:26:49 localhost systemd[1]: Reached target sysinit.target - System Initialization. Apr 20 15:26:49 localhost systemd[1]: Reached target basic.target - Basic System. Apr 20 15:26:49 localhost dracut-initqueue[1216]: Scanning devices dm-0 for LVM logical volumes qubes_dom0/root Apr 20 15:26:49 localhost dracut-initqueue[1216]: qubes_dom0/swap Apr 20 15:26:49 localhost dracut-initqueue[1238]: WARNING: File locking is disabled. Apr 20 15:26:50 localhost dracut-initqueue[1216]: qubes_dom0/root thin Apr 20 15:26:50 localhost dracut-initqueue[1216]: qubes_dom0/swap linear Apr 20 15:26:50 localhost systemd[1]: Found device dev-mapper-qubes_dom0\x2droot.device - /dev/mapper/qubes_dom0-root. Apr 20 15:26:50 localhost systemd[1]: Reached target initrd-root-device.target - Initrd Root Device. Apr 20 15:26:50 localhost systemd[1]: Finished dracut-initqueue.service - dracut initqueue hook. Apr 20 15:26:50 localhost audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:50 localhost systemd[1]: Reached target remote-fs-pre.target - Preparation for Remote File Systems. Apr 20 15:26:50 localhost systemd[1]: Reached target remote-cryptsetup.target - Remote Encrypted Volumes. Apr 20 15:26:50 localhost systemd[1]: Reached target remote-fs.target - Remote File Systems. Apr 20 15:26:50 localhost systemd[1]: dracut-pre-mount.service - dracut pre-mount hook was skipped because all trigger condition checks failed. Apr 20 15:26:50 localhost systemd[1]: Starting systemd-fsck-root.service - File System Check on /dev/mapper/qubes_dom0-root... Apr 20 15:26:50 localhost systemd-fsck[1282]: /dev/mapper/qubes_dom0-root: clean, 120624/1310720 files, 1188282/5242880 blocks Apr 20 15:26:50 localhost systemd[1]: Finished systemd-fsck-root.service - File System Check on /dev/mapper/qubes_dom0-root. Apr 20 15:26:50 localhost audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:50 localhost systemd[1]: Mounting sysroot.mount - /sysroot... Apr 20 15:26:50 localhost kernel: EXT4-fs (dm-4): mounted filesystem with ordered data mode. Quota mode: none. Apr 20 15:26:50 localhost systemd[1]: Mounted sysroot.mount - /sysroot. Apr 20 15:26:50 localhost systemd[1]: Reached target initrd-root-fs.target - Initrd Root File System. Apr 20 15:26:50 localhost systemd[1]: Starting initrd-parse-etc.service - Reload Configuration from the Real Root... Apr 20 15:26:50 localhost systemd[1]: Reloading. Apr 20 15:26:50 localhost audit: BPF prog-id=22 op=LOAD Apr 20 15:26:50 localhost audit: BPF prog-id=23 op=LOAD Apr 20 15:26:50 localhost audit: BPF prog-id=14 op=UNLOAD Apr 20 15:26:50 localhost audit: BPF prog-id=15 op=UNLOAD Apr 20 15:26:50 localhost audit: BPF prog-id=24 op=LOAD Apr 20 15:26:50 localhost audit: BPF prog-id=19 op=UNLOAD Apr 20 15:26:50 localhost audit: BPF prog-id=25 op=LOAD Apr 20 15:26:50 localhost audit: BPF prog-id=26 op=LOAD Apr 20 15:26:50 localhost audit: BPF prog-id=20 op=UNLOAD Apr 20 15:26:50 localhost audit: BPF prog-id=21 op=UNLOAD Apr 20 15:26:50 localhost audit: BPF prog-id=27 op=LOAD Apr 20 15:26:50 localhost audit: BPF prog-id=16 op=UNLOAD Apr 20 15:26:50 localhost audit: BPF prog-id=28 op=LOAD Apr 20 15:26:50 localhost audit: BPF prog-id=29 op=LOAD Apr 20 15:26:50 localhost audit: BPF prog-id=17 op=UNLOAD Apr 20 15:26:50 localhost audit: BPF prog-id=18 op=UNLOAD Apr 20 15:26:50 localhost systemd[1]: initrd-parse-etc.service: Deactivated successfully. Apr 20 15:26:50 localhost systemd[1]: Finished initrd-parse-etc.service - Reload Configuration from the Real Root. Apr 20 15:26:50 localhost audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:50 localhost audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:50 localhost systemd[1]: Reached target initrd-fs.target - Initrd File Systems. Apr 20 15:26:50 localhost systemd[1]: Reached target initrd.target - Initrd Default Target. Apr 20 15:26:50 localhost systemd[1]: dracut-mount.service - dracut mount hook was skipped because all trigger condition checks failed. Apr 20 15:26:50 localhost systemd[1]: Starting dracut-pre-pivot.service - dracut pre-pivot and cleanup hook... Apr 20 15:26:50 localhost systemd[1]: Finished dracut-pre-pivot.service - dracut pre-pivot and cleanup hook. Apr 20 15:26:50 localhost audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:50 localhost systemd[1]: Starting initrd-cleanup.service - Cleaning Up and Shutting Down Daemons... Apr 20 15:26:50 localhost systemd[1]: Stopped target remote-cryptsetup.target - Remote Encrypted Volumes. Apr 20 15:26:50 localhost systemd[1]: Stopped target timers.target - Timer Units. Apr 20 15:26:50 localhost systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Apr 20 15:26:50 localhost systemd[1]: Stopped dracut-pre-pivot.service - dracut pre-pivot and cleanup hook. Apr 20 15:26:50 localhost audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:50 localhost systemd[1]: Stopped target initrd.target - Initrd Default Target. Apr 20 15:26:50 localhost systemd[1]: Stopped target basic.target - Basic System. Apr 20 15:26:50 localhost systemd[1]: Stopped target initrd-root-device.target - Initrd Root Device. Apr 20 15:26:50 localhost systemd[1]: Stopped target initrd-usr-fs.target - Initrd /usr File System. Apr 20 15:26:50 localhost systemd[1]: Stopped target paths.target - Path Units. Apr 20 15:26:50 localhost systemd[1]: Stopped target remote-fs.target - Remote File Systems. Apr 20 15:26:50 localhost systemd[1]: Stopped target remote-fs-pre.target - Preparation for Remote File Systems. Apr 20 15:26:50 localhost systemd[1]: Stopped target slices.target - Slice Units. Apr 20 15:26:50 localhost systemd[1]: Stopped target sockets.target - Socket Units. Apr 20 15:26:50 localhost systemd[1]: Stopped target sysinit.target - System Initialization. Apr 20 15:26:50 localhost systemd[1]: Stopped target cryptsetup.target - Local Encrypted Volumes. Apr 20 15:26:50 localhost systemd[1]: Stopped target swap.target - Swaps. Apr 20 15:26:50 localhost systemd[1]: dracut-initqueue.service: Deactivated successfully. Apr 20 15:26:50 localhost systemd[1]: Stopped dracut-initqueue.service - dracut initqueue hook. Apr 20 15:26:50 localhost audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:50 localhost systemd[1]: dracut-initqueue.service: Consumed 4.002s CPU time. Apr 20 15:26:50 localhost systemd[1]: Starting plymouth-switch-root.service - Plymouth switch root service... Apr 20 15:26:50 localhost systemd[1]: systemd-sysctl.service: Deactivated successfully. Apr 20 15:26:50 localhost systemd[1]: Stopped systemd-sysctl.service - Apply Kernel Variables. Apr 20 15:26:50 localhost audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:50 localhost systemd[1]: systemd-modules-load.service: Deactivated successfully. Apr 20 15:26:50 localhost systemd[1]: Stopped systemd-modules-load.service - Load Kernel Modules. Apr 20 15:26:50 localhost audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:50 localhost systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Apr 20 15:26:50 localhost systemd[1]: Stopped systemd-udev-trigger.service - Coldplug All udev Devices. Apr 20 15:26:50 localhost audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:50 localhost systemd[1]: Stopping systemd-udevd.service - Rule-based Manager for Device Events and Files... Apr 20 15:26:50 localhost systemd[1]: Stopping usbguard.service - USBGuard daemon... Apr 20 15:26:50 localhost systemd[1]: usbguard.service: Deactivated successfully. Apr 20 15:26:50 localhost systemd[1]: Stopped usbguard.service - USBGuard daemon. Apr 20 15:26:50 localhost audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=usbguard comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:50 localhost systemd[1]: systemd-udevd.service: Deactivated successfully. Apr 20 15:26:50 localhost systemd[1]: Stopped systemd-udevd.service - Rule-based Manager for Device Events and Files. Apr 20 15:26:50 localhost audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:50 localhost systemd[1]: systemd-udevd.service: Consumed 2.205s CPU time. Apr 20 15:26:50 localhost systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Apr 20 15:26:50 localhost systemd[1]: Closed systemd-udevd-control.socket - udev Control Socket. Apr 20 15:26:50 localhost systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Apr 20 15:26:50 localhost systemd[1]: Closed systemd-udevd-kernel.socket - udev Kernel Socket. Apr 20 15:26:50 localhost systemd[1]: dracut-pre-udev.service: Deactivated successfully. Apr 20 15:26:50 localhost systemd[1]: Stopped dracut-pre-udev.service - dracut pre-udev hook. Apr 20 15:26:50 localhost audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:50 localhost systemd[1]: dracut-cmdline.service: Deactivated successfully. Apr 20 15:26:50 localhost systemd[1]: Stopped dracut-cmdline.service - dracut cmdline hook. Apr 20 15:26:50 localhost audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:50 localhost systemd[1]: Starting initrd-udevadm-cleanup-db.service - Cleanup udev Database... Apr 20 15:26:50 localhost systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Apr 20 15:26:50 localhost systemd[1]: Stopped systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev. Apr 20 15:26:50 localhost audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:50 localhost systemd[1]: kmod-static-nodes.service: Deactivated successfully. Apr 20 15:26:50 localhost systemd[1]: Stopped kmod-static-nodes.service - Create List of Static Device Nodes. Apr 20 15:26:50 localhost audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:50 localhost systemd[1]: systemd-tmpfiles-setup.service: Deactivated successfully. Apr 20 15:26:50 localhost systemd[1]: Stopped systemd-tmpfiles-setup.service - Create Volatile Files and Directories. Apr 20 15:26:50 localhost audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:50 localhost systemd[1]: Stopped target local-fs.target - Local File Systems. Apr 20 15:26:50 localhost systemd[1]: initrd-cleanup.service: Deactivated successfully. Apr 20 15:26:50 localhost systemd[1]: Finished initrd-cleanup.service - Cleaning Up and Shutting Down Daemons. Apr 20 15:26:50 localhost audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:50 localhost audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:50 localhost systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Apr 20 15:26:50 localhost systemd[1]: Finished initrd-udevadm-cleanup-db.service - Cleanup udev Database. Apr 20 15:26:50 localhost audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:50 localhost audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:50 localhost systemd[1]: Reached target initrd-switch-root.target - Switch Root. Apr 20 15:26:51 localhost audit: BPF prog-id=27 op=UNLOAD Apr 20 15:26:51 localhost systemd[1]: Finished plymouth-switch-root.service - Plymouth switch root service. Apr 20 15:26:51 localhost audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=plymouth-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:51 localhost systemd[1]: Starting initrd-switch-root.service - Switch Root... Apr 20 15:26:51 localhost systemd[1]: Switching root. Apr 20 15:26:51 localhost systemd-journald[399]: Journal stopped Apr 20 15:26:51 dom0 systemd-journald[399]: Received SIGTERM from PID 1 (systemd). Apr 20 15:26:51 dom0 systemd[1]: systemd 251.19-1.fc37 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP -GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS +FIDO2 +IDN2 -IDN -IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 +PWQUALITY +P11KIT +QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD +BPF_FRAMEWORK +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 20 15:26:51 dom0 systemd[1]: Detected virtualization xen. Apr 20 15:26:51 dom0 systemd[1]: Detected architecture x86-64. Apr 20 15:26:51 dom0 systemd[1]: Hostname set to . Apr 20 15:26:51 dom0 systemd[1]: bpf-lsm: BPF LSM hook not enabled in the kernel, BPF LSM not supported Apr 20 15:26:51 dom0 systemd[1]: /usr/lib/systemd/system/qubesd.service:8: Standard output type syslog is obsolete, automatically updating to journal. Please update your unit file, and consider removing the setting altogether. Apr 20 15:26:51 dom0 systemd[1]: /usr/lib/systemd/system/qubes-qmemman.service:7: Standard output type syslog is obsolete, automatically updating to journal. Please update your unit file, and consider removing the setting altogether. Apr 20 15:26:51 dom0 systemd[1]: /usr/lib/systemd/system/qubes-db-dom0.service:9: Standard output type syslog is obsolete, automatically updating to journal. Please update your unit file, and consider removing the setting altogether. Apr 20 15:26:51 dom0 systemd[1]: /usr/lib/systemd/system/qubes-core.service:8: Standard output type syslog is obsolete, automatically updating to journal. Please update your unit file, and consider removing the setting altogether. Apr 20 15:26:51 dom0 systemd[1]: systemd-ask-password-plymouth.service: Deactivated successfully. Apr 20 15:26:51 dom0 systemd[1]: initrd-switch-root.service: Deactivated successfully. Apr 20 15:26:51 dom0 systemd[1]: Stopped initrd-switch-root.service - Switch Root. Apr 20 15:26:51 dom0 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Apr 20 15:26:51 dom0 systemd[1]: Created slice system-getty.slice - Slice /system/getty. Apr 20 15:26:51 dom0 systemd[1]: Created slice system-qubes\x2dvm.slice - Slice /system/qubes-vm. Apr 20 15:26:51 dom0 systemd[1]: Created slice system-serial\x2dgetty.slice - Slice /system/serial-getty. Apr 20 15:26:51 dom0 systemd[1]: Created slice system-systemd\x2dfsck.slice - Slice /system/systemd-fsck. Apr 20 15:26:51 dom0 systemd[1]: Created slice user.slice - User and Session Slice. Apr 20 15:26:51 dom0 systemd[1]: systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch was skipped because of a failed condition check (ConditionPathExists=!/run/plymouth/pid). Apr 20 15:26:51 dom0 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount - Arbitrary Executable File Formats File System Automount Point. Apr 20 15:26:51 dom0 systemd[1]: Reached target blockdev@dev-mapper-luks\x2d5241442a\x2d6636\x2d45da\x2d8731\x2d66d029364f3d.target - Block Device Preparation for /dev/mapper/luks-5241442a-6636-45da-8731-66d029364f3d. Apr 20 15:26:51 dom0 systemd[1]: Stopped target initrd-switch-root.target - Switch Root. Apr 20 15:26:51 dom0 systemd[1]: Stopped target initrd-fs.target - Initrd File Systems. Apr 20 15:26:51 dom0 systemd[1]: Stopped target initrd-root-fs.target - Initrd Root File System. Apr 20 15:26:51 dom0 systemd[1]: Reached target integritysetup.target - Local Integrity Protected Volumes. Apr 20 15:26:51 dom0 systemd[1]: Reached target remote-cryptsetup.target - Remote Encrypted Volumes. Apr 20 15:26:51 dom0 systemd[1]: Reached target remote-fs.target - Remote File Systems. Apr 20 15:26:51 dom0 systemd[1]: Reached target slices.target - Slice Units. Apr 20 15:26:51 dom0 systemd[1]: Reached target veritysetup.target - Local Verity Protected Volumes. Apr 20 15:26:51 dom0 systemd[1]: Listening on dm-event.socket - Device-mapper event daemon FIFOs. Apr 20 15:26:51 dom0 systemd[1]: Listening on systemd-coredump.socket - Process Core Dump Socket. Apr 20 15:26:51 dom0 systemd[1]: Listening on systemd-initctl.socket - initctl Compatibility Named Pipe. Apr 20 15:26:51 dom0 systemd[1]: Listening on systemd-udevd-control.socket - udev Control Socket. Apr 20 15:26:51 dom0 systemd[1]: Listening on systemd-udevd-kernel.socket - udev Kernel Socket. Apr 20 15:26:51 dom0 systemd[1]: Listening on systemd-userdbd.socket - User Database Manager Socket. Apr 20 15:26:51 dom0 systemd[1]: Activating swap dev-mapper-qubes_dom0\x2dswap.swap - /dev/mapper/qubes_dom0-swap... Apr 20 15:26:51 dom0 systemd[1]: dev-hugepages.mount - Huge Pages File System was skipped because of a failed condition check (ConditionPathExists=/sys/kernel/mm/hugepages). Apr 20 15:26:51 dom0 systemd[1]: Mounting dev-mqueue.mount - POSIX Message Queue File System... Apr 20 15:26:51 dom0 systemd[1]: Mounting proc-xen.mount - Mount /proc/xen files... Apr 20 15:26:51 dom0 kernel: Adding 4108284k swap on /dev/mapper/qubes_dom0-swap. Priority:-2 extents:1 across:4108284k SSFS Apr 20 15:26:51 dom0 systemd[1]: Mounting sys-kernel-debug.mount - Kernel Debug File System... Apr 20 15:26:51 dom0 systemd[1]: Mounting sys-kernel-tracing.mount - Kernel Trace File System... Apr 20 15:26:51 dom0 systemd[1]: Starting kmod-static-nodes.service - Create List of Static Device Nodes... Apr 20 15:26:51 dom0 systemd[1]: Starting lvm2-monitor.service - Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling... Apr 20 15:26:51 dom0 systemd[1]: Starting modprobe@configfs.service - Load Kernel Module configfs... Apr 20 15:26:51 dom0 systemd[1]: Starting modprobe@dm_mod.service - Load Kernel Module dm_mod... Apr 20 15:26:51 dom0 systemd[1]: Starting modprobe@drm.service - Load Kernel Module drm... Apr 20 15:26:51 dom0 systemd[1]: Starting modprobe@fuse.service - Load Kernel Module fuse... Apr 20 15:26:51 dom0 systemd[1]: Starting modprobe@loop.service - Load Kernel Module loop... Apr 20 15:26:51 dom0 systemd[1]: plymouth-switch-root.service: Deactivated successfully. Apr 20 15:26:51 dom0 systemd[1]: Stopped plymouth-switch-root.service - Plymouth switch root service. Apr 20 15:26:51 dom0 systemd[1]: Stopped systemd-journald.service - Journal Service. Apr 20 15:26:51 dom0 systemd[1]: Starting systemd-journald.service - Journal Service... Apr 20 15:26:51 dom0 systemd[1]: Starting systemd-modules-load.service - Load Kernel Modules... Apr 20 15:26:51 dom0 kernel: fuse: init (API version 7.37) Apr 20 15:26:51 dom0 systemd[1]: Starting systemd-network-generator.service - Generate network units from Kernel command line... Apr 20 15:26:51 dom0 kernel: loop: module loaded Apr 20 15:26:51 dom0 systemd[1]: Starting systemd-remount-fs.service - Remount Root and Kernel File Systems... Apr 20 15:26:51 dom0 systemd[1]: Starting systemd-udev-trigger.service - Coldplug All udev Devices... Apr 20 15:26:51 dom0 systemd[1]: Activated swap dev-mapper-qubes_dom0\x2dswap.swap - /dev/mapper/qubes_dom0-swap. Apr 20 15:26:51 dom0 systemd[1]: Mounted dev-mqueue.mount - POSIX Message Queue File System. Apr 20 15:26:51 dom0 systemd[1]: Mounted proc-xen.mount - Mount /proc/xen files. Apr 20 15:26:51 dom0 systemd[1]: Mounted sys-kernel-debug.mount - Kernel Debug File System. Apr 20 15:26:51 dom0 systemd[1]: Mounted sys-kernel-tracing.mount - Kernel Trace File System. Apr 20 15:26:51 dom0 systemd[1]: Finished kmod-static-nodes.service - Create List of Static Device Nodes. Apr 20 15:26:51 dom0 systemd[1]: modprobe@configfs.service: Deactivated successfully. Apr 20 15:26:51 dom0 systemd[1]: Finished modprobe@configfs.service - Load Kernel Module configfs. Apr 20 15:26:51 dom0 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Apr 20 15:26:51 dom0 systemd[1]: Finished modprobe@dm_mod.service - Load Kernel Module dm_mod. Apr 20 15:26:51 dom0 systemd[1]: modprobe@drm.service: Deactivated successfully. Apr 20 15:26:51 dom0 systemd[1]: Finished modprobe@drm.service - Load Kernel Module drm. Apr 20 15:26:51 dom0 systemd[1]: modprobe@fuse.service: Deactivated successfully. Apr 20 15:26:51 dom0 systemd[1]: Finished modprobe@fuse.service - Load Kernel Module fuse. Apr 20 15:26:51 dom0 systemd[1]: modprobe@loop.service: Deactivated successfully. Apr 20 15:26:51 dom0 systemd[1]: Finished modprobe@loop.service - Load Kernel Module loop. Apr 20 15:26:51 dom0 systemd[1]: Finished systemd-modules-load.service - Load Kernel Modules. Apr 20 15:26:51 dom0 systemd[1]: Finished systemd-network-generator.service - Generate network units from Kernel command line. Apr 20 15:26:51 dom0 systemd[1]: Reached target network-pre.target - Preparation for Network. Apr 20 15:26:51 dom0 systemd[1]: Reached target swap.target - Swaps. Apr 20 15:26:51 dom0 kernel: EXT4-fs (dm-4): re-mounted. Quota mode: none. Apr 20 15:26:51 dom0 systemd[1]: Mounting sys-fs-fuse-connections.mount - FUSE Control File System... Apr 20 15:26:51 dom0 systemd-journald[1380]: Journal started Apr 20 15:26:51 dom0 systemd-journald[1380]: Runtime Journal (/run/log/journal/5e0ed3df2d7f445c9b1c749edb877185) is 8.0M, max 77.6M, 69.6M free. Apr 20 15:26:51 dom0 audit: BPF prog-id=30 op=LOAD Apr 20 15:26:51 dom0 audit: BPF prog-id=30 op=UNLOAD Apr 20 15:26:51 dom0 audit: BPF prog-id=31 op=LOAD Apr 20 15:26:51 dom0 audit: BPF prog-id=31 op=UNLOAD Apr 20 15:26:51 dom0 audit: BPF prog-id=32 op=LOAD Apr 20 15:26:51 dom0 audit: BPF prog-id=32 op=UNLOAD Apr 20 15:26:51 dom0 audit: BPF prog-id=33 op=LOAD Apr 20 15:26:51 dom0 audit: BPF prog-id=33 op=UNLOAD Apr 20 15:26:51 dom0 audit: BPF prog-id=34 op=LOAD Apr 20 15:26:51 dom0 audit: BPF prog-id=34 op=UNLOAD Apr 20 15:26:51 dom0 audit: BPF prog-id=35 op=LOAD Apr 20 15:26:51 dom0 audit: BPF prog-id=36 op=LOAD Apr 20 15:26:51 dom0 audit: BPF prog-id=35 op=UNLOAD Apr 20 15:26:51 dom0 audit: BPF prog-id=36 op=UNLOAD Apr 20 15:26:51 dom0 audit: BPF prog-id=37 op=LOAD Apr 20 15:26:51 dom0 audit: BPF prog-id=37 op=UNLOAD Apr 20 15:26:51 dom0 audit: BPF prog-id=38 op=LOAD Apr 20 15:26:51 dom0 audit: BPF prog-id=38 op=UNLOAD Apr 20 15:26:51 dom0 audit: BPF prog-id=39 op=LOAD Apr 20 15:26:51 dom0 audit: BPF prog-id=39 op=UNLOAD Apr 20 15:26:51 dom0 audit: BPF prog-id=40 op=LOAD Apr 20 15:26:51 dom0 audit: BPF prog-id=40 op=UNLOAD Apr 20 15:26:51 dom0 audit: BPF prog-id=41 op=LOAD Apr 20 15:26:51 dom0 audit: BPF prog-id=42 op=LOAD Apr 20 15:26:51 dom0 audit: BPF prog-id=42 op=UNLOAD Apr 20 15:26:51 dom0 audit: BPF prog-id=43 op=LOAD Apr 20 15:26:51 dom0 audit: BPF prog-id=41 op=UNLOAD Apr 20 15:26:51 dom0 audit: BPF prog-id=43 op=UNLOAD Apr 20 15:26:51 dom0 audit: BPF prog-id=44 op=LOAD Apr 20 15:26:51 dom0 audit: BPF prog-id=24 op=UNLOAD Apr 20 15:26:51 dom0 audit: BPF prog-id=45 op=LOAD Apr 20 15:26:51 dom0 audit: BPF prog-id=46 op=LOAD Apr 20 15:26:51 dom0 audit: BPF prog-id=25 op=UNLOAD Apr 20 15:26:51 dom0 audit: BPF prog-id=26 op=UNLOAD Apr 20 15:26:51 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:51 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-ask-password-plymouth comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:51 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:51 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:51 dom0 audit: BPF prog-id=44 op=UNLOAD Apr 20 15:26:51 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=plymouth-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:51 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:51 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:51 dom0 audit: BPF prog-id=47 op=LOAD Apr 20 15:26:51 dom0 audit: BPF prog-id=48 op=LOAD Apr 20 15:26:51 dom0 audit: BPF prog-id=49 op=LOAD Apr 20 15:26:51 dom0 audit: BPF prog-id=45 op=UNLOAD Apr 20 15:26:51 dom0 audit: BPF prog-id=46 op=UNLOAD Apr 20 15:26:51 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:51 dom0 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 res=1 Apr 20 15:26:51 dom0 audit[1380]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffc4c426cf0 a2=4000 a3=7ffc4c426d7c items=0 ppid=1 pid=1380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" key=(null) Apr 20 15:26:51 dom0 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Apr 20 15:26:51 dom0 systemd[1]: Mounting tmp.mount - Temporary Directory /tmp... Apr 20 15:26:51 dom0 systemd[1]: systemd-repart.service - Repartition Root Disk was skipped because all trigger condition checks failed. Apr 20 15:26:51 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:51 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:51 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:51 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:51 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:51 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:51 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:51 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:51 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:51 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:51 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:51 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:51 dom0 systemd[1]: Queued start job for default target graphical.target. Apr 20 15:26:51 dom0 systemd[1]: Unnecessary job was removed for dev-disk-by\x2duuid-5241442a\x2d6636\x2d45da\x2d8731\x2d66d029364f3d.device - /dev/disk/by-uuid/5241442a-6636-45da-8731-66d029364f3d. Apr 20 15:26:51 dom0 systemd[1]: systemd-journald.service: Deactivated successfully. Apr 20 15:26:51 dom0 systemd-modules-load[1381]: Module 'msr' is built in Apr 20 15:26:51 dom0 systemd[1]: Starting systemd-sysctl.service - Apply Kernel Variables... Apr 20 15:26:51 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:51 dom0 systemd[1]: Started systemd-journald.service - Journal Service. Apr 20 15:26:51 dom0 systemd[1]: Finished systemd-remount-fs.service - Remount Root and Kernel File Systems. Apr 20 15:26:51 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:51 dom0 systemd[1]: Mounted sys-fs-fuse-connections.mount - FUSE Control File System. Apr 20 15:26:51 dom0 systemd[1]: Mounted tmp.mount - Temporary Directory /tmp. Apr 20 15:26:51 dom0 systemd[1]: systemd-firstboot.service - First Boot Wizard was skipped because of a failed condition check (ConditionFirstBoot=yes). Apr 20 15:26:51 dom0 systemd[1]: systemd-hwdb-update.service - Rebuild Hardware Database was skipped because of a failed condition check (ConditionNeedsUpdate=/etc). Apr 20 15:26:51 dom0 systemd[1]: Starting systemd-journal-flush.service - Flush Journal to Persistent Storage... Apr 20 15:26:51 dom0 systemd[1]: systemd-pstore.service - Platform Persistent Storage Archival was skipped because of a failed condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Apr 20 15:26:51 dom0 systemd[1]: Starting systemd-random-seed.service - Load/Save Random Seed... Apr 20 15:26:51 dom0 systemd[1]: systemd-sysusers.service - Create System Users was skipped because of a failed condition check (ConditionNeedsUpdate=/etc). Apr 20 15:26:51 dom0 systemd[1]: Starting systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev... Apr 20 15:26:51 dom0 systemd[1]: Finished systemd-sysctl.service - Apply Kernel Variables. Apr 20 15:26:51 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:51 dom0 systemd-journald[1380]: Time spent on flushing to /var/log/journal/5e0ed3df2d7f445c9b1c749edb877185 is 33.732ms for 1666 entries. Apr 20 15:26:51 dom0 systemd-journald[1380]: System Journal (/var/log/journal/5e0ed3df2d7f445c9b1c749edb877185) is 80.0M, max 1.9G, 1.8G free. Apr 20 15:26:51 dom0 systemd-journald[1380]: Received client request to flush runtime journal. Apr 20 15:26:51 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:51 dom0 audit: BPF prog-id=50 op=LOAD Apr 20 15:26:51 dom0 audit: BPF prog-id=51 op=LOAD Apr 20 15:26:51 dom0 audit: BPF prog-id=22 op=UNLOAD Apr 20 15:26:51 dom0 audit: BPF prog-id=23 op=UNLOAD Apr 20 15:26:51 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:51 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:51 dom0 systemd[1]: Finished systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev. Apr 20 15:26:51 dom0 systemd[1]: Starting systemd-udevd.service - Rule-based Manager for Device Events and Files... Apr 20 15:26:51 dom0 systemd-udevd[1393]: Using default interface naming scheme 'v251'. Apr 20 15:26:51 dom0 systemd[1]: Finished systemd-random-seed.service - Load/Save Random Seed. Apr 20 15:26:51 dom0 systemd[1]: first-boot-complete.target - First Boot Complete was skipped because of a failed condition check (ConditionFirstBoot=yes). Apr 20 15:26:51 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:51 dom0 systemd[1]: Started systemd-udevd.service - Rule-based Manager for Device Events and Files. Apr 20 15:26:51 dom0 systemd[1]: Finished systemd-journal-flush.service - Flush Journal to Persistent Storage. Apr 20 15:26:51 dom0 systemd[1]: Starting modprobe@configfs.service - Load Kernel Module configfs... Apr 20 15:26:51 dom0 systemd[1]: modprobe@configfs.service: Deactivated successfully. Apr 20 15:26:51 dom0 systemd[1]: Finished modprobe@configfs.service - Load Kernel Module configfs. Apr 20 15:26:51 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:51 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:51 dom0 systemd[1]: Finished systemd-udev-trigger.service - Coldplug All udev Devices. Apr 20 15:26:51 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:51 dom0 systemd[1]: Condition check resulted in dev-hvc0.device - /dev/hvc0 being skipped. Apr 20 15:26:51 dom0 kernel: intel_pmc_core INT33A1:00: initialized Apr 20 15:26:51 dom0 kernel: Intel(R) 2.5G Ethernet Linux Driver Apr 20 15:26:51 dom0 kernel: Copyright(c) 2018 Intel Corporation. Apr 20 15:26:51 dom0 kernel: xen: registering gsi 18 triggering 0 polarity 1 Apr 20 15:26:51 dom0 kernel: xen: --> pirq=18 -> irq=18 (gsi=18) Apr 20 15:26:51 dom0 kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set Apr 20 15:26:51 dom0 kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt Apr 20 15:26:51 dom0 kernel: i2c i2c-13: 2/4 memory slots populated (from DMI) Apr 20 15:26:51 dom0 kernel: i2c i2c-13: Memory type 0x22 not supported yet, not instantiating SPD Apr 20 15:26:51 dom0 kernel: idma64 idma64.0: Found Intel integrated DMA 64-bit Apr 20 15:26:51 dom0 kernel: mei_me 0000:00:16.0: enabling device (0000 -> 0002) Apr 20 15:26:51 dom0 kernel: input: PC Speaker as /devices/platform/pcspkr/input/input19 Apr 20 15:26:51 dom0 kernel: xen: registering gsi 16 triggering 0 polarity 1 Apr 20 15:26:51 dom0 kernel: Already setup the GSI :16 Apr 20 15:26:51 dom0 kernel: idma64 idma64.1: Found Intel integrated DMA 64-bit Apr 20 15:26:51 dom0 systemd[1]: Condition check resulted in dev-block-253:0.device - /dev/block/253:0 being skipped. Apr 20 15:26:51 dom0 kernel: idma64 idma64.2: Found Intel integrated DMA 64-bit Apr 20 15:26:51 dom0 systemd[1]: Created slice system-lvm2\x2dpvscan.slice - Slice /system/lvm2-pvscan. Apr 20 15:26:51 dom0 systemd[1]: Starting lvm2-pvscan@253:0.service - LVM event activation on device 253:0... Apr 20 15:26:51 dom0 systemd[1]: Started dm-event.service - Device-mapper event daemon. Apr 20 15:26:51 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dm-event comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:51 dom0 kernel: cfg80211: Loading compiled-in X.509 certificates for regulatory database Apr 20 15:26:51 dom0 kernel: cfg80211: Loaded X.509 cert 'sforshee: 00b28ddf47aef9cea7' Apr 20 15:26:51 dom0 dmeventd[2499]: dmeventd ready for processing. Apr 20 15:26:51 dom0 systemd[1]: Condition check resulted in dev-disk-by\x2duuid-a8d2f5a4\x2dd25d\x2d45fb\x2da847\x2dc2a89a3d2037.device - Samsung SSD 990 PRO 2TB 2 being skipped. Apr 20 15:26:51 dom0 kernel: platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 Apr 20 15:26:51 dom0 kernel: cfg80211: failed to load regulatory.db Apr 20 15:26:51 dom0 systemd[1]: Condition check resulted in dev-disk-by\x2duuid-66AB\x2d8D71.device - Samsung SSD 990 PRO 2TB EFI\x20System\x20Partition being skipped. Apr 20 15:26:51 dom0 kernel: intel_powerclamp: No package C-state available Apr 20 15:26:51 dom0 kernel: Intel(R) Wireless WiFi driver for Linux Apr 20 15:26:51 dom0 lvm[1800]: pvscan[1800] PV /dev/mapper/luks-5241442a-6636-45da-8731-66d029364f3d online, VG qubes_dom0 is complete. Apr 20 15:26:51 dom0 lvm[1800]: pvscan[1800] VG qubes_dom0 run autoactivation. Apr 20 15:26:51 dom0 lvm[2499]: Monitoring thin pool qubes_dom0-root--pool-tpool. Apr 20 15:26:51 dom0 lvm[1374]: 5 logical volume(s) in volume group "qubes_dom0" monitored Apr 20 15:26:51 dom0 systemd[1]: Finished lvm2-monitor.service - Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling. Apr 20 15:26:51 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=lvm2-monitor comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:51 dom0 systemd[1]: Reached target local-fs-pre.target - Preparation for Local File Systems. Apr 20 15:26:51 dom0 systemd[1]: Starting systemd-fsck@dev-disk-by\x2duuid-66AB\x2d8D71.service - File System Check on /dev/disk/by-uuid/66AB-8D71... Apr 20 15:26:51 dom0 systemd[1]: Starting systemd-fsck@dev-disk-by\x2duuid-a8d2f5a4\x2dd25d\x2d45fb\x2da847\x2dc2a89a3d2037.service - File System Check on /dev/disk/by-uuid/a8d2f5a4-d25d-45fb-a847-c2a89a3d2037... Apr 20 15:26:51 dom0 systemd[1]: Listening on systemd-rfkill.socket - Load/Save RF Kill Switch Status /dev/rfkill Watch. Apr 20 15:26:51 dom0 kernel: iTCO_vendor_support: vendor-support=0 Apr 20 15:26:51 dom0 kernel: intel_powerclamp: No package C-state available Apr 20 15:26:51 dom0 kernel: mei_hdcp 0000:00:16.0-b638ab7e-94e2-4ea2-a552-d1c54b627f04: bound 0000:00:02.0 (ops i915_hdcp_component_ops [i915]) Apr 20 15:26:51 dom0 kernel: iTCO_wdt iTCO_wdt: Found a Intel PCH TCO device (Version=6, TCOBASE=0x0400) Apr 20 15:26:51 dom0 kernel: iTCO_wdt iTCO_wdt: initialized. heartbeat=30 sec (nowayout=0) Apr 20 15:26:51 dom0 kernel: mei_pxp 0000:00:16.0-fbf6fcf1-96cf-4e2e-a6a6-1bab8cbe36b1: bound 0000:00:02.0 (ops i915_pxp_tee_component_ops [i915]) Apr 20 15:26:51 dom0 kernel: snd_hda_intel 0000:00:1f.3: enabling device (0000 -> 0002) Apr 20 15:26:51 dom0 kernel: xen: registering gsi 17 triggering 0 polarity 1 Apr 20 15:26:51 dom0 kernel: Already setup the GSI :17 Apr 20 15:26:51 dom0 kernel: snd_hda_intel 0000:00:1f.3: bound 0000:00:02.0 (ops i915_audio_component_bind_ops [i915]) Apr 20 15:26:51 dom0 systemd-fsck[2718]: /dev/nvme0n1p2: clean, 33/65536 files, 30286/262144 blocks Apr 20 15:26:51 dom0 kernel: intel_rapl_msr: PL4 support detected. Apr 20 15:26:51 dom0 systemd[1]: Finished systemd-fsck@dev-disk-by\x2duuid-a8d2f5a4\x2dd25d\x2d45fb\x2da847\x2dc2a89a3d2037.service - File System Check on /dev/disk/by-uuid/a8d2f5a4-d25d-45fb-a847-c2a89a3d2037. Apr 20 15:26:51 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-fsck@dev-disk-by\x2duuid-a8d2f5a4\x2dd25d\x2d45fb\x2da847\x2dc2a89a3d2037 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:51 dom0 systemd-fsck[2719]: fsck.fat 4.2 (2021-01-31) Apr 20 15:26:51 dom0 systemd-fsck[2719]: /dev/nvme0n1p1: 9 files, 7282/153296 clusters Apr 20 15:26:51 dom0 systemd[1]: Mounting boot.mount - /boot... Apr 20 15:26:51 dom0 systemd[1]: Finished systemd-fsck@dev-disk-by\x2duuid-66AB\x2d8D71.service - File System Check on /dev/disk/by-uuid/66AB-8D71. Apr 20 15:26:51 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-fsck@dev-disk-by\x2duuid-66AB\x2d8D71 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:51 dom0 kernel: EXT4-fs (nvme0n1p2): mounted filesystem with ordered data mode. Quota mode: none. Apr 20 15:26:51 dom0 systemd[1]: Mounted boot.mount - /boot. Apr 20 15:26:51 dom0 systemd[1]: Created slice system-qubes\x2dinput\x2dsender\x2dkeyboard\x2dmouse.slice - Slice /system/qubes-input-sender-keyboard-mouse. Apr 20 15:26:51 dom0 systemd[1]: systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch was skipped because of a failed condition check (ConditionPathExists=!/run/plymouth/pid). Apr 20 15:26:51 dom0 systemd[1]: Mounting boot-efi.mount - /boot/efi... Apr 20 15:26:51 dom0 systemd[1]: dev-hugepages.mount - Huge Pages File System was skipped because of a failed condition check (ConditionPathExists=/sys/kernel/mm/hugepages). Apr 20 15:26:51 dom0 systemd[1]: Starting modprobe@dm_mod.service - Load Kernel Module dm_mod... Apr 20 15:26:51 dom0 systemd[1]: Starting modprobe@loop.service - Load Kernel Module loop... Apr 20 15:26:51 dom0 systemd[1]: systemd-firstboot.service - First Boot Wizard was skipped because of a failed condition check (ConditionFirstBoot=yes). Apr 20 15:26:51 dom0 systemd[1]: first-boot-complete.target - First Boot Complete was skipped because of a failed condition check (ConditionFirstBoot=yes). Apr 20 15:26:51 dom0 systemd[1]: systemd-hwdb-update.service - Rebuild Hardware Database was skipped because of a failed condition check (ConditionNeedsUpdate=/etc). Apr 20 15:26:51 dom0 systemd[1]: systemd-pstore.service - Platform Persistent Storage Archival was skipped because of a failed condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Apr 20 15:26:51 dom0 systemd[1]: systemd-sysusers.service - Create System Users was skipped because of a failed condition check (ConditionNeedsUpdate=/etc). Apr 20 15:26:51 dom0 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Apr 20 15:26:51 dom0 systemd[1]: Finished modprobe@dm_mod.service - Load Kernel Module dm_mod. Apr 20 15:26:51 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:51 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:51 dom0 systemd[1]: modprobe@loop.service: Deactivated successfully. Apr 20 15:26:51 dom0 systemd[1]: Finished modprobe@loop.service - Load Kernel Module loop. Apr 20 15:26:51 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:51 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:51 dom0 systemd[1]: Mounted boot-efi.mount - /boot/efi. Apr 20 15:26:51 dom0 systemd[1]: Created slice system-qubes\x2dinput\x2dsender\x2dkeyboard.slice - Slice /system/qubes-input-sender-keyboard. Apr 20 15:26:51 dom0 systemd[1]: systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch was skipped because of a failed condition check (ConditionPathExists=!/run/plymouth/pid). Apr 20 15:26:51 dom0 systemd[1]: Reached target local-fs.target - Local File Systems. Apr 20 15:26:51 dom0 systemd[1]: dev-hugepages.mount - Huge Pages File System was skipped because of a failed condition check (ConditionPathExists=/sys/kernel/mm/hugepages). Apr 20 15:26:51 dom0 systemd[1]: ldconfig.service - Rebuild Dynamic Linker Cache was skipped because all trigger condition checks failed. Apr 20 15:26:51 dom0 systemd[1]: Starting plymouth-read-write.service - Tell Plymouth To Write Out Runtime Data... Apr 20 15:26:51 dom0 systemd[1]: systemd-binfmt.service - Set Up Additional Binary Formats was skipped because all trigger condition checks failed. Apr 20 15:26:51 dom0 systemd[1]: systemd-boot-system-token.service - Store a System Token in an EFI Variable was skipped because of a failed condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 20 15:26:51 dom0 systemd[1]: systemd-firstboot.service - First Boot Wizard was skipped because of a failed condition check (ConditionFirstBoot=yes). Apr 20 15:26:51 dom0 systemd[1]: first-boot-complete.target - First Boot Complete was skipped because of a failed condition check (ConditionFirstBoot=yes). Apr 20 15:26:51 dom0 systemd[1]: systemd-hwdb-update.service - Rebuild Hardware Database was skipped because of a failed condition check (ConditionNeedsUpdate=/etc). Apr 20 15:26:51 dom0 systemd[1]: systemd-machine-id-commit.service - Commit a transient machine-id on disk was skipped because of a failed condition check (ConditionPathIsMountPoint=/etc/machine-id). Apr 20 15:26:51 dom0 systemd[1]: systemd-pstore.service - Platform Persistent Storage Archival was skipped because of a failed condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Apr 20 15:26:51 dom0 systemd[1]: systemd-repart.service - Repartition Root Disk was skipped because all trigger condition checks failed. Apr 20 15:26:51 dom0 systemd[1]: systemd-sysusers.service - Create System Users was skipped because of a failed condition check (ConditionNeedsUpdate=/etc). Apr 20 15:26:51 dom0 systemd[1]: Starting systemd-tmpfiles-setup.service - Create Volatile Files and Directories... Apr 20 15:26:51 dom0 systemd[1]: Finished plymouth-read-write.service - Tell Plymouth To Write Out Runtime Data. Apr 20 15:26:51 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=plymouth-read-write comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:51 dom0 systemd[1]: Received SIGRTMIN+20 from PID 650 (plymouthd). Apr 20 15:26:51 dom0 systemd[1]: Finished systemd-tmpfiles-setup.service - Create Volatile Files and Directories. Apr 20 15:26:51 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:51 dom0 systemd[1]: systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch was skipped because of a failed condition check (ConditionPathExists=!/run/plymouth/pid). Apr 20 15:26:51 dom0 systemd[1]: dev-hugepages.mount - Huge Pages File System was skipped because of a failed condition check (ConditionPathExists=/sys/kernel/mm/hugepages). Apr 20 15:26:51 dom0 systemd[1]: ldconfig.service - Rebuild Dynamic Linker Cache was skipped because all trigger condition checks failed. Apr 20 15:26:51 dom0 systemd[1]: Starting modprobe@dm_mod.service - Load Kernel Module dm_mod... Apr 20 15:26:51 dom0 systemd[1]: Starting modprobe@loop.service - Load Kernel Module loop... Apr 20 15:26:51 dom0 systemd[1]: systemd-binfmt.service - Set Up Additional Binary Formats was skipped because all trigger condition checks failed. Apr 20 15:26:51 dom0 systemd[1]: systemd-boot-system-token.service - Store a System Token in an EFI Variable was skipped because of a failed condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 20 15:26:51 dom0 systemd[1]: systemd-firstboot.service - First Boot Wizard was skipped because of a failed condition check (ConditionFirstBoot=yes). Apr 20 15:26:51 dom0 systemd[1]: first-boot-complete.target - First Boot Complete was skipped because of a failed condition check (ConditionFirstBoot=yes). Apr 20 15:26:51 dom0 systemd[1]: systemd-hwdb-update.service - Rebuild Hardware Database was skipped because of a failed condition check (ConditionNeedsUpdate=/etc). Apr 20 15:26:51 dom0 systemd[1]: systemd-journal-catalog-update.service - Rebuild Journal Catalog was skipped because of a failed condition check (ConditionNeedsUpdate=/var). Apr 20 15:26:51 dom0 systemd[1]: systemd-machine-id-commit.service - Commit a transient machine-id on disk was skipped because of a failed condition check (ConditionPathIsMountPoint=/etc/machine-id). Apr 20 15:26:51 dom0 systemd[1]: systemd-pstore.service - Platform Persistent Storage Archival was skipped because of a failed condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Apr 20 15:26:51 dom0 systemd[1]: systemd-sysusers.service - Create System Users was skipped because of a failed condition check (ConditionNeedsUpdate=/etc). Apr 20 15:26:51 dom0 systemd[1]: systemd-update-done.service - Update is Completed was skipped because all trigger condition checks failed. Apr 20 15:26:51 dom0 systemd[1]: Starting systemd-update-utmp.service - Record System Boot/Shutdown in UTMP... Apr 20 15:26:51 dom0 audit: BPF prog-id=52 op=LOAD Apr 20 15:26:51 dom0 audit: BPF prog-id=53 op=LOAD Apr 20 15:26:51 dom0 audit: BPF prog-id=54 op=LOAD Apr 20 15:26:51 dom0 audit: BPF prog-id=28 op=UNLOAD Apr 20 15:26:51 dom0 audit: BPF prog-id=29 op=UNLOAD Apr 20 15:26:51 dom0 systemd[1]: Starting usbguard.service - USBGuard daemon... Apr 20 15:26:51 dom0 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Apr 20 15:26:51 dom0 systemd[1]: Finished modprobe@dm_mod.service - Load Kernel Module dm_mod. Apr 20 15:26:51 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:51 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:51 dom0 systemd[1]: modprobe@loop.service: Deactivated successfully. Apr 20 15:26:51 dom0 systemd[1]: Finished modprobe@loop.service - Load Kernel Module loop. Apr 20 15:26:51 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:51 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:51 dom0 audit[2851]: SYSTEM_BOOT pid=2851 uid=0 auid=4294967295 ses=4294967295 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 systemd[1]: Created slice system-qubes\x2dinput\x2dsender\x2dmouse.slice - Slice /system/qubes-input-sender-mouse. Apr 20 15:26:52 dom0 systemd[1]: systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch was skipped because of a failed condition check (ConditionPathExists=!/run/plymouth/pid). Apr 20 15:26:52 dom0 systemd[1]: dev-hugepages.mount - Huge Pages File System was skipped because of a failed condition check (ConditionPathExists=/sys/kernel/mm/hugepages). Apr 20 15:26:52 dom0 systemd[1]: ldconfig.service - Rebuild Dynamic Linker Cache was skipped because all trigger condition checks failed. Apr 20 15:26:52 dom0 systemd[1]: Starting modprobe@dm_mod.service - Load Kernel Module dm_mod... Apr 20 15:26:52 dom0 systemd[1]: Starting modprobe@loop.service - Load Kernel Module loop... Apr 20 15:26:52 dom0 systemd[1]: systemd-binfmt.service - Set Up Additional Binary Formats was skipped because all trigger condition checks failed. Apr 20 15:26:52 dom0 systemd[1]: systemd-boot-system-token.service - Store a System Token in an EFI Variable was skipped because of a failed condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 20 15:26:52 dom0 systemd[1]: systemd-firstboot.service - First Boot Wizard was skipped because of a failed condition check (ConditionFirstBoot=yes). Apr 20 15:26:52 dom0 systemd[1]: first-boot-complete.target - First Boot Complete was skipped because of a failed condition check (ConditionFirstBoot=yes). Apr 20 15:26:52 dom0 systemd[1]: systemd-hwdb-update.service - Rebuild Hardware Database was skipped because of a failed condition check (ConditionNeedsUpdate=/etc). Apr 20 15:26:52 dom0 systemd[1]: systemd-journal-catalog-update.service - Rebuild Journal Catalog was skipped because of a failed condition check (ConditionNeedsUpdate=/var). Apr 20 15:26:52 dom0 systemd[1]: systemd-machine-id-commit.service - Commit a transient machine-id on disk was skipped because of a failed condition check (ConditionPathIsMountPoint=/etc/machine-id). Apr 20 15:26:52 dom0 systemd[1]: systemd-pstore.service - Platform Persistent Storage Archival was skipped because of a failed condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Apr 20 15:26:52 dom0 systemd[1]: systemd-sysusers.service - Create System Users was skipped because of a failed condition check (ConditionNeedsUpdate=/etc). Apr 20 15:26:52 dom0 systemd[1]: systemd-update-done.service - Update is Completed was skipped because all trigger condition checks failed. Apr 20 15:26:52 dom0 systemd[1]: Finished systemd-update-utmp.service - Record System Boot/Shutdown in UTMP. Apr 20 15:26:52 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Apr 20 15:26:52 dom0 systemd[1]: Finished modprobe@dm_mod.service - Load Kernel Module dm_mod. Apr 20 15:26:52 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 systemd[1]: modprobe@loop.service: Deactivated successfully. Apr 20 15:26:52 dom0 systemd[1]: Finished modprobe@loop.service - Load Kernel Module loop. Apr 20 15:26:52 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 systemd[1]: systemd-repart.service - Repartition Root Disk was skipped because all trigger condition checks failed. Apr 20 15:26:52 dom0 kernel: input: HDA Intel PCH HDMI/DP,pcm=3 as /devices/pci0000:00/0000:00:1f.3/sound/card0/input20 Apr 20 15:26:52 dom0 kernel: input: HDA Intel PCH HDMI/DP,pcm=7 as /devices/pci0000:00/0000:00:1f.3/sound/card0/input21 Apr 20 15:26:52 dom0 kernel: input: HDA Intel PCH HDMI/DP,pcm=8 as /devices/pci0000:00/0000:00:1f.3/sound/card0/input22 Apr 20 15:26:52 dom0 kernel: input: HDA Intel PCH HDMI/DP,pcm=9 as /devices/pci0000:00/0000:00:1f.3/sound/card0/input23 Apr 20 15:26:52 dom0 usbguard-daemon[2856]: [1713644812.018] (W) PERMISSIONS CHECK ON POLICY FILE ARE TURNED OFF! Apr 20 15:26:52 dom0 systemd[1]: Started usbguard.service - USBGuard daemon. Apr 20 15:26:52 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=usbguard comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 systemd[1]: Started systemd-ask-password-wall.path - Forward Password Requests to Wall Directory Watch. Apr 20 15:26:52 dom0 systemd[1]: Reached target cryptsetup.target - Local Encrypted Volumes. Apr 20 15:26:52 dom0 systemd[1]: Reached target paths.target - Path Units. Apr 20 15:26:52 dom0 systemd[1]: Reached target sysinit.target - System Initialization. Apr 20 15:26:52 dom0 systemd[1]: Started fstrim.timer - Discard unused blocks once a week. Apr 20 15:26:52 dom0 systemd[1]: Started logrotate.timer - Daily rotation of log files. Apr 20 15:26:52 dom0 systemd[1]: Started systemd-tmpfiles-clean.timer - Daily Cleanup of Temporary Directories. Apr 20 15:26:52 dom0 systemd[1]: Reached target timers.target - Timer Units. Apr 20 15:26:52 dom0 systemd[1]: Listening on dbus.socket - D-Bus System Message Bus Socket. Apr 20 15:26:52 dom0 systemd[1]: Listening on libvirtd.socket - Libvirt local socket. Apr 20 15:26:52 dom0 systemd[1]: Listening on libvirtd-admin.socket - Libvirt admin socket. Apr 20 15:26:52 dom0 systemd[1]: Listening on libvirtd-ro.socket - Libvirt local read-only socket. Apr 20 15:26:52 dom0 systemd[1]: Listening on virtlockd.socket - Virtual machine lock manager socket. Apr 20 15:26:52 dom0 systemd[1]: Listening on virtlogd.socket - Virtual machine log manager socket. Apr 20 15:26:52 dom0 systemd[1]: Reached target sockets.target - Socket Units. Apr 20 15:26:52 dom0 audit: BPF prog-id=55 op=LOAD Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:14.0/usb1" device_rule=616C6C6F7720696420316436623A30303032206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362312220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1" target="allow" device_rule=616C6C6F7720696420316436623A30303032206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362312220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:14.0/usb2" device_rule=616C6C6F7720696420316436623A30303033206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362322220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb2" target="allow" device_rule=616C6C6F7720696420316436623A30303033206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362322220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-1" device_rule=616C6C6F7720696420313734633A32303734206E616D65202241534D3130377822207669612D706F72742022312D312220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-1" target="allow" device_rule=616C6C6F7720696420313734633A32303734206E616D65202241534D3130377822207669612D706F72742022312D312220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 systemd[1]: Starting dbus-broker.service - D-Bus System Message Bus... Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-2" device_rule=616C6C6F7720696420306264613A35343230206E616D652022342D506F72742055534220322E302048756222207669612D706F72742022312D322220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-2" target="allow" device_rule=616C6C6F7720696420306264613A35343230206E616D652022342D506F72742055534220322E302048756222207669612D706F72742022312D322220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 systemd[1]: rpmdb-migrate.service - RPM database migration to /usr was skipped because of a failed condition check (ConditionPathExists=/var/lib/rpm/.migratedb). Apr 20 15:26:52 dom0 systemd[1]: rpmdb-rebuild.service - RPM database rebuild was skipped because of a failed condition check (ConditionPathExists=/usr/lib/sysimage/rpm/.rebuilddb). Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-4" device_rule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exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-4" target="block" device_rule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exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-5" device_rule=616C6C6F7720696420313734633A32303734206E616D65202241534D3130377822207669612D706F72742022312D352220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-5" target="allow" device_rule=616C6C6F7720696420313734633A32303734206E616D65202241534D3130377822207669612D706F72742022312D352220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:14.0/usb2/2-1" device_rule=616C6C6F7720696420313734633A33303734206E616D65202241534D3130377822207669612D706F72742022322D312220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb2/2-1" target="allow" device_rule=616C6C6F7720696420313734633A33303734206E616D65202241534D3130377822207669612D706F72742022322D312220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:14.0/usb2/2-2" device_rule=616C6C6F7720696420306264613A30343230206E616D652022342D506F72742055534220332E302048756222207669612D706F72742022322D322220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb2/2-2" target="allow" device_rule=616C6C6F7720696420306264613A30343230206E616D652022342D506F72742055534220332E302048756222207669612D706F72742022322D322220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:14.0/usb2/2-4" device_rule=616C6C6F7720696420313734633A33303734206E616D65202241534D3130377822207669612D706F72742022322D342220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb2/2-4" target="allow" device_rule=616C6C6F7720696420313734633A33303734206E616D65202241534D3130377822207669612D706F72742022322D342220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-10" device_rule=616C6C6F7720696420303565333A30363038206E616D652022555342322E302048756222207669612D706F72742022312D31302220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-10" target="allow" device_rule=616C6C6F7720696420303565333A30363038206E616D652022555342322E302048756222207669612D706F72742022312D31302220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-11" device_rule=626C6F636B20696420303431363A37333935206E616D6520224C69616E4C692D47415F49492D4C43445F76312E3322207669612D706F72742022312D31312220776974682D696E74657266616365207B2066663A30303A30302030333A30303A3030207D20776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-11" target="block" device_rule=626C6F636B20696420303431363A37333935206E616D6520224C69616E4C692D47415F49492D4C43445F76312E3322207669612D706F72742022312D31312220776974682D696E74657266616365207B2066663A30303A30302030333A30303A3030207D20776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-13" device_rule=626C6F636B20696420306230353A31396166206E616D65202241555241204C454420436F6E74726F6C6C657222207669612D706F72742022312D31332220776974682D696E74657266616365207B2066663A66663A66662030333A30303A3030207D20776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-13" target="block" device_rule=626C6F636B20696420306230353A31396166206E616D65202241555241204C454420436F6E74726F6C6C657222207669612D706F72742022312D31332220776974682D696E74657266616365207B2066663A66663A66662030333A30303A3030207D20776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-14" device_rule=626C6F636B20696420383038373A30303332206E616D65202222207669612D706F72742022312D31342220776974682D696E74657266616365207B2065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A3031207D20776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-14" target="block" device_rule=626C6F636B20696420383038373A30303332206E616D65202222207669612D706F72742022312D31342220776974682D696E74657266616365207B2065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A3031207D20776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-2/1-2.3" device_rule=616C6C6F7720696420303436643A63353339206E616D65202255534220526563656976657222207669612D706F72742022312D322E332220776974682D696E74657266616365207B2030333A30313A30312030333A30313A30322030333A30303A3030207D20776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-2/1-2.3" target="allow" device_rule=616C6C6F7720696420303436643A63353339206E616D65202255534220526563656976657222207669612D706F72742022312D322E332220776974682D696E74657266616365207B2030333A30313A30312030333A30313A30322030333A30303A3030207D20776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-2/1-2.4" device_rule=616C6C6F7720696420303436643A63353437206E616D65202255534220526563656976657222207669612D706F72742022312D322E342220776974682D696E74657266616365207B2030333A30313A30322030333A30313A30312030333A30303A3030207D20776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-2/1-2.4" target="allow" device_rule=616C6C6F7720696420303436643A63353437206E616D65202255534220526563656976657222207669612D706F72742022312D322E342220776974682D696E74657266616365207B2030333A30313A30322030333A30313A30312030333A30303A3030207D20776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-5/1-5.1" device_rule=616C6C6F7720696420303565333A30363130206E616D652022555342322E312048756222207669612D706F72742022312D352E312220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-5/1-5.1" target="allow" device_rule=616C6C6F7720696420303565333A30363130206E616D652022555342322E312048756222207669612D706F72742022312D352E312220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-5/1-5.3" device_rule=626C6F636B20696420323730383A30303031206E616D65202241756469656E74206944323222207669612D706F72742022312D352E332220776974682D696E74657266616365207B2030313A30313A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302066653A30313A30312030313A30313A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302066653A30313A3031207D20776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-5/1-5.3" target="block" device_rule=626C6F636B20696420323730383A30303031206E616D65202241756469656E74206944323222207669612D706F72742022312D352E332220776974682D696E74657266616365207B2030313A30313A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302066653A30313A30312030313A30313A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302066653A30313A3031207D20776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:14.0/usb2/2-1/2-1.2" device_rule=626C6F636B20696420313366653A35353030206E616D65202250617472696F74204D656D6F727922207669612D706F72742022322D312E322220776974682D696E746572666163652030383A30363A353020776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb2/2-1/2-1.2" target="block" device_rule=626C6F636B20696420313366653A35353030206E616D65202250617472696F74204D656D6F727922207669612D706F72742022322D312E322220776974682D696E746572666163652030383A30363A353020776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:14.0/usb2/2-4/2-4.1" device_rule=616C6C6F7720696420303565333A30363230206E616D652022555342332E322048756222207669612D706F72742022322D342E312220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb2/2-4/2-4.1" target="allow" device_rule=616C6C6F7720696420303565333A30363230206E616D652022555342332E322048756222207669612D706F72742022322D342E312220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-10/1-10.1" device_rule=616C6C6F7720696420316134303A30313031206E616D65202255534220322E302048756222207669612D706F72742022312D31302E312220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-10/1-10.1" target="allow" device_rule=616C6C6F7720696420316134303A30313031206E616D65202255534220322E302048756222207669612D706F72742022312D31302E312220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-10/1-10.2" device_rule=616C6C6F7720696420316134303A30313031206E616D65202255534220322E302048756222207669612D706F72742022312D31302E322220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-10/1-10.2" target="allow" device_rule=616C6C6F7720696420316134303A30313031206E616D65202255534220322E302048756222207669612D706F72742022312D31302E322220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-5/1-5.1/1-5.1.1" device_rule=616C6C6F7720696420303436643A63353361206E616D65202255534220526563656976657222207669612D706F72742022312D352E312E312220776974682D696E74657266616365207B2030333A30313A30312030333A30313A30322030333A30303A3030207D20776974682D636F6E6E6563742D747970652022756E6B6E6F776E22 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-5/1-5.1/1-5.1.1" target="allow" device_rule=616C6C6F7720696420303436643A63353361206E616D65202255534220526563656976657222207669612D706F72742022312D352E312E312220776974682D696E74657266616365207B2030333A30313A30312030333A30313A30322030333A30303A3030207D20776974682D636F6E6E6563742D747970652022756E6B6E6F776E22 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-10/1-10.1/1-10.1.2" device_rule=626C6F636B20696420306366323A61323030206E616D6520224C69616E4C692D537472696D657220506C75732D312E3522207669612D706F72742022312D31302E312E322220776974682D696E74657266616365207B2066663A66663A66662030333A30303A3030207D20776974682D636F6E6E6563742D747970652022756E6B6E6F776E22 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-10/1-10.1/1-10.1.2" target="block" device_rule=626C6F636B20696420306366323A61323030206E616D6520224C69616E4C692D537472696D657220506C75732D312E3522207669612D706F72742022312D31302E312E322220776974682D696E74657266616365207B2066663A66663A66662030333A30303A3030207D20776974682D636F6E6E6563742D747970652022756E6B6E6F776E22 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="discovered-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-10/1-10.1/1-10.1.4" device_rule=626C6F636B20696420306366323A61313032206E616D6520224C69616E4C692D534C2D696E66696E6974792D76312E3422207669612D706F72742022312D31302E312E342220776974682D696E74657266616365207B2066663A66663A66662030333A30303A3030207D20776974682D636F6E6E6563742D747970652022756E6B6E6F776E22 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="changed-authorization-state-for" device="/devices/pci0000:00/0000:00:14.0/usb1/1-10/1-10.1/1-10.1.4" target="block" device_rule=626C6F636B20696420306366323A61313032206E616D6520224C69616E4C692D534C2D696E66696E6974792D76312E3422207669612D706F72742022312D31302E312E342220776974682D696E74657266616365207B2066663A66663A66662030333A30303A3030207D20776974682D636F6E6E6563742D747970652022756E6B6E6F776E22 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 dbus-broker-launch[2864]: Looking up NSS user entry for 'geoclue'... Apr 20 15:26:52 dom0 audit: BPF prog-id=56 op=LOAD Apr 20 15:26:52 dom0 audit: BPF prog-id=57 op=LOAD Apr 20 15:26:52 dom0 audit: BPF prog-id=58 op=LOAD Apr 20 15:26:52 dom0 systemd[1]: Starting systemd-userdbd.service - User Database Manager... Apr 20 15:26:52 dom0 lvm[2499]: Monitoring thin pool qubes_dom0-vm--pool-tpool. Apr 20 15:26:52 dom0 systemd[1]: Started systemd-userdbd.service - User Database Manager. Apr 20 15:26:52 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 dbus-broker-launch[2864]: NSS returned no entry for 'geoclue' Apr 20 15:26:52 dom0 dbus-broker-launch[2864]: Invalid user-name in /etc/dbus-1/system.d/net.hadess.SensorProxy.conf +14: user="geoclue" Apr 20 15:26:52 dom0 systemd[1]: Started dbus-broker.service - D-Bus System Message Bus. Apr 20 15:26:52 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dbus-broker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 systemd[1]: Reached target basic.target - Basic System. Apr 20 15:26:52 dom0 dbus-broker-launch[2864]: Ready Apr 20 15:26:52 dom0 systemd[1]: Starting dracut-shutdown.service - Restore /run/initramfs on shutdown... Apr 20 15:26:52 dom0 systemd[1]: Starting qubes-db-dom0.service - Qubes DB agent... Apr 20 15:26:52 dom0 systemd[1]: Started qubes-input-sender-keyboard-mouse@event5.service - Qubes input proxy sender (keyboard, fallback to mouse). Apr 20 15:26:52 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard-mouse@event5 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 systemd[1]: Started qubes-input-sender-keyboard-mouse@event6.service - Qubes input proxy sender (keyboard, fallback to mouse). Apr 20 15:26:52 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard-mouse@event6 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 systemd[1]: Started qubes-input-sender-keyboard@event7.service - Qubes input proxy sender (keyboard). Apr 20 15:26:52 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event7 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 qubes-input-sender[2891]: Device /dev/input/event5 is already in dom0 Apr 20 15:26:52 dom0 systemd[1]: Started qubes-input-sender-keyboard@event8.service - Qubes input proxy sender (keyboard). Apr 20 15:26:52 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event8 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 qubes-input-sender[2892]: Device /dev/input/event6 is already in dom0 Apr 20 15:26:52 dom0 systemd[1]: Started qubes-input-sender-mouse@event4.service - Qubes input proxy sender (mouse). Apr 20 15:26:52 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-mouse@event4 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 qubes-input-sender[2893]: Device /dev/input/event7 is already in dom0 Apr 20 15:26:52 dom0 systemd[1]: Starting qubes-qmemman.service - Qubes memory management daemon... Apr 20 15:26:52 dom0 qubes-input-sender[2895]: Device /dev/input/event8 is already in dom0 Apr 20 15:26:52 dom0 qubes-input-sender[2896]: Device /dev/input/event4 is already in dom0 Apr 20 15:26:52 dom0 audit: BPF prog-id=59 op=LOAD Apr 20 15:26:52 dom0 audit: BPF prog-id=60 op=LOAD Apr 20 15:26:52 dom0 audit: BPF prog-id=61 op=LOAD Apr 20 15:26:52 dom0 systemd[1]: Starting systemd-logind.service - User Login Management... Apr 20 15:26:52 dom0 systemd[1]: Starting udisks2.service - Disk Manager... Apr 20 15:26:52 dom0 audit: BPF prog-id=62 op=LOAD Apr 20 15:26:52 dom0 audit: BPF prog-id=63 op=LOAD Apr 20 15:26:52 dom0 systemd[1]: Starting upower.service - Daemon for power management... Apr 20 15:26:52 dom0 systemd[1]: Starting xenstored.service - The Xen xenstore... Apr 20 15:26:52 dom0 systemd[1]: Started qubes-db-dom0.service - Qubes DB agent. Apr 20 15:26:52 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-db-dom0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 systemd[1]: Finished dracut-shutdown.service - Restore /run/initramfs on shutdown. Apr 20 15:26:52 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dracut-shutdown comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 systemd[1]: qubes-input-sender-keyboard-mouse@event5.service: Deactivated successfully. Apr 20 15:26:52 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard-mouse@event5 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 systemd[1]: qubes-input-sender-keyboard-mouse@event6.service: Deactivated successfully. Apr 20 15:26:52 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard-mouse@event6 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 systemd[1]: qubes-input-sender-keyboard@event7.service: Deactivated successfully. Apr 20 15:26:52 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event7 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 systemd[1]: qubes-input-sender-keyboard@event8.service: Deactivated successfully. Apr 20 15:26:52 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event8 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 systemd[1]: qubes-input-sender-mouse@event4.service: Deactivated successfully. Apr 20 15:26:52 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-mouse@event4 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 udisksd[2906]: udisks daemon version 2.9.4 starting Apr 20 15:26:52 dom0 systemd[1]: alsa-restore.service - Save/Restore Sound Card State was skipped because of a failed condition check (ConditionPathExists=!/etc/alsa/state-daemon.conf). Apr 20 15:26:52 dom0 systemd[1]: Started alsa-state.service - Manage Sound Card State (restore and store). Apr 20 15:26:52 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=alsa-state comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 systemd[1]: Reached target sound.target - Sound Card. Apr 20 15:26:52 dom0 kernel: intel_powerclamp: No package C-state available Apr 20 15:26:52 dom0 alsactl[2920]: alsactl 1.2.9 daemon started Apr 20 15:26:52 dom0 systemd[1]: Starting modprobe@drm.service - Load Kernel Module drm... Apr 20 15:26:52 dom0 systemd[1]: modprobe@drm.service: Deactivated successfully. Apr 20 15:26:52 dom0 systemd[1]: Finished modprobe@drm.service - Load Kernel Module drm. Apr 20 15:26:52 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 xenstored[2933]: Checking store ... Apr 20 15:26:52 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=xenstored comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 xenstored[2933]: Checking store complete. Apr 20 15:26:52 dom0 systemd[1]: Started xenstored.service - The Xen xenstore. Apr 20 15:26:52 dom0 systemd[1]: Starting xen-init-dom0.service - xen-init-dom0, initialise Dom0 configuration (xenstore nodes, JSON configuration stub)... Apr 20 15:26:52 dom0 systemd[1]: Starting xenconsoled.service - Xenconsoled - handles logging from guest consoles and hypervisor... Apr 20 15:26:52 dom0 systemd-logind[2904]: New seat seat0. Apr 20 15:26:52 dom0 launch-xenstore[2916]: Starting /usr/sbin/xenstored... Apr 20 15:26:52 dom0 systemd-logind[2904]: Watching system buttons on /dev/input/event2 (Power Button) Apr 20 15:26:52 dom0 systemd-logind[2904]: Watching system buttons on /dev/input/event1 (Power Button) Apr 20 15:26:52 dom0 systemd-logind[2904]: Watching system buttons on /dev/input/event0 (Sleep Button) Apr 20 15:26:52 dom0 systemd-logind[2904]: Watching system buttons on /dev/input/event5 (Logitech G903) Apr 20 15:26:52 dom0 systemd-logind[2904]: Watching system buttons on /dev/input/event8 (Logitech USB Receiver Keyboard) Apr 20 15:26:52 dom0 systemd-logind[2904]: Watching system buttons on /dev/input/event7 (Logitech Candy) Apr 20 15:26:52 dom0 systemd-logind[2904]: Watching system buttons on /dev/input/event6 (Logitech G502 X PLUS) Apr 20 15:26:52 dom0 systemd[1]: Starting polkit.service - Authorization Manager... Apr 20 15:26:52 dom0 systemd[1]: Started xenconsoled.service - Xenconsoled - handles logging from guest consoles and hypervisor. Apr 20 15:26:52 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=xenconsoled comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 systemd[1]: Started systemd-logind.service - User Login Management. Apr 20 15:26:52 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-logind comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 systemd[1]: Starting libvirtd.service - Virtualization daemon... Apr 20 15:26:52 dom0 xen-init-dom0[2940]: Done setting up Dom0 Apr 20 15:26:52 dom0 systemd[1]: Finished xen-init-dom0.service - xen-init-dom0, initialise Dom0 configuration (xenstore nodes, JSON configuration stub). Apr 20 15:26:52 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=xen-init-dom0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 polkitd[2947]: Started polkitd version 121 Apr 20 15:26:52 dom0 systemd[1]: Started libvirtd.service - Virtualization daemon. Apr 20 15:26:52 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=libvirtd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 polkitd[2947]: Loading rules from directory /etc/polkit-1/rules.d Apr 20 15:26:52 dom0 polkitd[2947]: Loading rules from directory /usr/share/polkit-1/rules.d Apr 20 15:26:52 dom0 polkitd[2947]: Finished loading, compiling and executing 9 rules Apr 20 15:26:52 dom0 systemd[1]: Started polkit.service - Authorization Manager. Apr 20 15:26:52 dom0 polkitd[2947]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Apr 20 15:26:52 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=polkit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 systemd[1]: Started upower.service - Daemon for power management. Apr 20 15:26:52 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=upower comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 systemd[1]: Started udisks2.service - Disk Manager. Apr 20 15:26:52 dom0 udisksd[2906]: Acquired the name org.freedesktop.UDisks2 on the system message bus Apr 20 15:26:52 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=udisks2 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:52 dom0 kernel: intel_powerclamp: No package C-state available Apr 20 15:26:52 dom0 systemd[1]: Started qubes-qmemman.service - Qubes memory management daemon. Apr 20 15:26:52 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-qmemman comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:53 dom0 lvm[1800]: 49 logical volume(s) in volume group "qubes_dom0" now active Apr 20 15:26:53 dom0 systemd[1]: Finished lvm2-pvscan@253:0.service - LVM event activation on device 253:0. Apr 20 15:26:53 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=lvm2-pvscan@253:0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:53 dom0 systemd[1]: Starting qubesd.service - Qubes OS daemon... Apr 20 15:26:53 dom0 systemd[1]: Started qubesd.service - Qubes OS daemon. Apr 20 15:26:53 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubesd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:53 dom0 systemd[1]: Starting qubes-core.service - Qubes Dom0 startup setup... Apr 20 15:26:53 dom0 systemd[1]: Started qubes-qrexec-policy-daemon.service - Qubes remote exec policy daemon. Apr 20 15:26:53 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-qrexec-policy-daemon comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:53 dom0 startup-misc.sh[3203]: libxl: error: libxl_sched.c:232:sched_credit_domain_set: Getting domain sched credit: Invalid argument Apr 20 15:26:53 dom0 startup-misc.sh[3203]: libxl_domain_sched_params_set failed. Apr 20 15:26:53 dom0 qrexec-policy-daemon[3179]: warning: !compat-4.0 directive in file /etc/qubes/policy.d/35-compat.policy line 16 is transitional and will be deprecated Apr 20 15:26:53 dom0 systemd[1]: Finished qubes-core.service - Qubes Dom0 startup setup. Apr 20 15:26:53 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-core comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:53 dom0 systemd[1]: Started qubes-meminfo-writer-dom0.service - Qubes memory information reporter. Apr 20 15:26:53 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-meminfo-writer-dom0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:26:53 dom0 systemd[1]: Starting qubes-vm@sys-audio.service - Start Qubes VM sys-audio... Apr 20 15:26:53 dom0 systemd[1]: Starting qubes-vm@sys-firewall.service - Start Qubes VM sys-firewall... Apr 20 15:26:53 dom0 systemd[1]: Starting qubes-vm@sys-net.service - Start Qubes VM sys-net... Apr 20 15:26:53 dom0 systemd[1]: Starting qubes-vm@sys-usb.service - Start Qubes VM sys-usb... Apr 20 15:26:53 dom0 systemd[1]: Starting qubes-vm@sys-whonix.service - Start Qubes VM sys-whonix... Apr 20 15:26:53 dom0 qubesd[3175]: vm.sys-whonix: Starting sys-whonix Apr 20 15:26:53 dom0 qubesd[3175]: vm.sys-firewall: Starting sys-firewall Apr 20 15:26:53 dom0 qubesd[3175]: vm.sys-net: Starting sys-net Apr 20 15:26:53 dom0 qubesd[3175]: vm.sys-usb: Starting sys-usb Apr 20 15:26:53 dom0 kernel: xhci_hcd 0000:00:14.0: remove, state 1 Apr 20 15:26:53 dom0 kernel: usb usb2: USB disconnect, device number 1 Apr 20 15:26:53 dom0 kernel: usb 2-1: USB disconnect, device number 2 Apr 20 15:26:53 dom0 kernel: usb 2-1.2: USB disconnect, device number 4 Apr 20 15:26:53 dom0 kernel: usb 2-2: USB disconnect, device number 3 Apr 20 15:26:53 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:14.0/usb2/2-1/2-1.2" device_rule=626C6F636B20696420313366653A35353030206E616D65202250617472696F74204D656D6F727922207669612D706F72742022322D312E322220776974682D696E746572666163652030383A30363A353020776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:53 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:14.0/usb2/2-1" device_rule=616C6C6F7720696420313734633A33303734206E616D65202241534D3130377822207669612D706F72742022322D312220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:53 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:14.0/usb2/2-2" device_rule=616C6C6F7720696420306264613A30343230206E616D652022342D506F72742055534220332E302048756222207669612D706F72742022322D322220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:53 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:14.0/usb2/2-4/2-4.1" device_rule=616C6C6F7720696420303565333A30363230206E616D652022555342332E322048756222207669612D706F72742022322D342E312220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:53 dom0 kernel: usb 2-4: USB disconnect, device number 5 Apr 20 15:26:53 dom0 kernel: usb 2-4.1: USB disconnect, device number 6 Apr 20 15:26:53 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:14.0/usb2/2-4" device_rule=616C6C6F7720696420313734633A33303734206E616D65202241534D3130377822207669612D706F72742022322D342220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:53 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:14.0/usb2" device_rule=616C6C6F7720696420316436623A30303033206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362322220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:53 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-1" device_rule=616C6C6F7720696420313734633A32303734206E616D65202241534D3130377822207669612D706F72742022312D312220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:53 dom0 kernel: xhci_hcd 0000:00:14.0: USB bus 2 deregistered Apr 20 15:26:53 dom0 kernel: xhci_hcd 0000:00:14.0: remove, state 1 Apr 20 15:26:53 dom0 kernel: usb usb1: USB disconnect, device number 1 Apr 20 15:26:53 dom0 kernel: usb 1-1: USB disconnect, device number 2 Apr 20 15:26:53 dom0 kernel: usb 1-2: USB disconnect, device number 3 Apr 20 15:26:53 dom0 kernel: usb 1-2.3: USB disconnect, device number 5 Apr 20 15:26:53 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-2/1-2.3" device_rule=616C6C6F7720696420303436643A63353339206E616D65202255534220526563656976657222207669612D706F72742022312D322E332220776974682D696E74657266616365207B2030333A30313A30312030333A30313A30322030333A30303A3030207D20776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:53 dom0 kernel: usb 1-2.4: USB disconnect, device number 6 Apr 20 15:26:53 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-2/1-2.4" device_rule=616C6C6F7720696420303436643A63353437206E616D65202255534220526563656976657222207669612D706F72742022312D322E342220776974682D696E74657266616365207B2030333A30313A30322030333A30313A30312030333A30303A3030207D20776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:53 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-2" device_rule=616C6C6F7720696420306264613A35343230206E616D652022342D506F72742055534220322E302048756222207669612D706F72742022312D322220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:53 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-4" device_rule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exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:53 dom0 kernel: usb 1-4: USB disconnect, device number 4 Apr 20 15:26:53 dom0 kernel: usb 1-5: USB disconnect, device number 7 Apr 20 15:26:53 dom0 kernel: usb 1-5.1: USB disconnect, device number 9 Apr 20 15:26:53 dom0 kernel: usb 1-5.1.1: USB disconnect, device number 13 Apr 20 15:26:54 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-5/1-5.1/1-5.1.1" device_rule=616C6C6F7720696420303436643A63353361206E616D65202255534220526563656976657222207669612D706F72742022312D352E312E312220776974682D696E74657266616365207B2030333A30313A30312030333A30313A30322030333A30303A3030207D20776974682D636F6E6E6563742D747970652022756E6B6E6F776E22 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:54 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-5/1-5.1" device_rule=616C6C6F7720696420303565333A30363130206E616D652022555342322E312048756222207669612D706F72742022312D352E312220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:54 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-5/1-5.3" device_rule=626C6F636B20696420323730383A30303031206E616D65202241756469656E74206944323222207669612D706F72742022312D352E332220776974682D696E74657266616365207B2030313A30313A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302066653A30313A30312030313A30313A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302030313A30323A32302066653A30313A3031207D20776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:54 dom0 kernel: usb 1-5.3: USB disconnect, device number 11 Apr 20 15:26:54 dom0 kernel: usb 1-10: USB disconnect, device number 8 Apr 20 15:26:54 dom0 kernel: usb 1-10.1: USB disconnect, device number 12 Apr 20 15:26:54 dom0 kernel: usb 1-10.1.2: USB disconnect, device number 16 Apr 20 15:26:54 dom0 kernel: usb 1-10.1.4: USB disconnect, device number 18 Apr 20 15:26:54 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-5" device_rule=616C6C6F7720696420313734633A32303734206E616D65202241534D3130377822207669612D706F72742022312D352220776974682D696E74657266616365207B2030393A30303A30312030393A30303A3032207D20776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:54 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-10/1-10.1/1-10.1.2" device_rule=626C6F636B20696420306366323A61323030206E616D6520224C69616E4C692D537472696D657220506C75732D312E3522207669612D706F72742022312D31302E312E322220776974682D696E74657266616365207B2066663A66663A66662030333A30303A3030207D20776974682D636F6E6E6563742D747970652022756E6B6E6F776E22 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:54 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-10/1-10.1/1-10.1.4" device_rule=626C6F636B20696420306366323A61313032206E616D6520224C69616E4C692D534C2D696E66696E6974792D76312E3422207669612D706F72742022312D31302E312E342220776974682D696E74657266616365207B2066663A66663A66662030333A30303A3030207D20776974682D636F6E6E6563742D747970652022756E6B6E6F776E22 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:54 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-10/1-10.1" device_rule=616C6C6F7720696420316134303A30313031206E616D65202255534220322E302048756222207669612D706F72742022312D31302E312220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:54 dom0 kernel: usb 1-10.2: USB disconnect, device number 15 Apr 20 15:26:54 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-10/1-10.2" device_rule=616C6C6F7720696420316134303A30313031206E616D65202255534220322E302048756222207669612D706F72742022312D31302E322220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:54 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-10" device_rule=616C6C6F7720696420303565333A30363038206E616D652022555342322E302048756222207669612D706F72742022312D31302220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:54 dom0 kernel: usb 1-11: USB disconnect, device number 10 Apr 20 15:26:54 dom0 kernel: usb 1-13: USB disconnect, device number 14 Apr 20 15:26:54 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-11" device_rule=626C6F636B20696420303431363A37333935206E616D6520224C69616E4C692D47415F49492D4C43445F76312E3322207669612D706F72742022312D31312220776974682D696E74657266616365207B2066663A30303A30302030333A30303A3030207D20776974682D636F6E6E6563742D747970652022686F74706C756722 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:54 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-13" device_rule=626C6F636B20696420306230353A31396166206E616D65202241555241204C454420436F6E74726F6C6C657222207669612D706F72742022312D31332220776974682D696E74657266616365207B2066663A66663A66662030333A30303A3030207D20776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:54 dom0 kernel: usb 1-14: USB disconnect, device number 17 Apr 20 15:26:54 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:14.0/usb1/1-14" device_rule=626C6F636B20696420383038373A30303332206E616D65202222207669612D706F72742022312D31342220776974682D696E74657266616365207B2065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A30312065303A30313A3031207D20776974682D636F6E6E6563742D7479706520226E6F74207573656422 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:54 dom0 audit[2862]: USER_DEVICE pid=2862 uid=0 auid=4294967295 ses=4294967295 msg='op="removed-device" device="/devices/pci0000:00/0000:00:14.0/usb1" device_rule=616C6C6F7720696420316436623A30303032206E616D6520227848434920486F737420436F6E74726F6C6C657222207669612D706F72742022757362312220776974682D696E746572666163652030393A30303A303020776974682D636F6E6E6563742D74797065202222 exe="/usr/sbin/usbguard-daemon" hostname=? addr=? terminal=? res=success' Apr 20 15:26:54 dom0 kernel: xhci_hcd 0000:00:14.0: USB bus 1 deregistered Apr 20 15:26:54 dom0 kernel: pciback 0000:00:14.0: xen_pciback: seizing device Apr 20 15:26:54 dom0 kernel: xen: registering gsi 16 triggering 0 polarity 1 Apr 20 15:26:54 dom0 kernel: Already setup the GSI :16 Apr 20 15:26:54 dom0 lvm[2499]: No longer monitoring thin pool qubes_dom0-vm--pool-tpool. Apr 20 15:26:54 dom0 lvm[2499]: Monitoring thin pool qubes_dom0-vm--pool-tpool. Apr 20 15:26:54 dom0 qubesd[3175]: vm.sys-audio: Starting sys-audio Apr 20 15:26:54 dom0 systemd[1]: Stopped target sound.target - Sound Card. Apr 20 15:26:54 dom0 lvm[2499]: No longer monitoring thin pool qubes_dom0-vm--pool-tpool. Apr 20 15:26:54 dom0 lvm[2499]: Monitoring thin pool qubes_dom0-vm--pool-tpool. Apr 20 15:26:54 dom0 kernel: pciback 0000:00:1f.3: xen_pciback: seizing device Apr 20 15:26:54 dom0 kernel: xen: registering gsi 17 triggering 0 polarity 1 Apr 20 15:26:54 dom0 kernel: Already setup the GSI :17 Apr 20 15:26:54 dom0 qubesd[3175]: vm.sys-audio: Start failed: usb device sys-usb:2-5.3 not available Apr 20 15:26:54 dom0 qvm-start[3284]: usb device sys-usb:2-5.3 not available Apr 20 15:26:54 dom0 systemd[1]: qubes-vm@sys-audio.service: Main process exited, code=exited, status=1/FAILURE Apr 20 15:26:54 dom0 systemd[1]: qubes-vm@sys-audio.service: Failed with result 'exit-code'. Apr 20 15:26:54 dom0 systemd[1]: Failed to start qubes-vm@sys-audio.service - Start Qubes VM sys-audio. Apr 20 15:26:54 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-vm@sys-audio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 20 15:26:54 dom0 kernel: memmap_init_zone_device initialised 32768 pages in 0ms Apr 20 15:26:54 dom0 kernel: loop0: detected capacity change from 0 to 1045968 Apr 20 15:26:54 dom0 kernel: loop1: detected capacity change from 0 to 1045968 Apr 20 15:26:55 dom0 kernel: pciback 0000:05:00.0: xen_pciback: vpci: assign to virtual slot 0 Apr 20 15:26:55 dom0 kernel: pciback 0000:05:00.0: registering for 2 Apr 20 15:26:55 dom0 kernel: pciback 0000:06:00.0: xen_pciback: vpci: assign to virtual slot 1 Apr 20 15:26:55 dom0 kernel: pciback 0000:06:00.0: registering for 2 Apr 20 15:26:55 dom0 kernel: xen-blkback: backend/vbd/2/51712: using 1 queues, protocol 1 (x86_64-abi) persistent grants Apr 20 15:26:55 dom0 kernel: xen-blkback: backend/vbd/2/51728: using 1 queues, protocol 1 (x86_64-abi) persistent grants Apr 20 15:26:55 dom0 kernel: xen-blkback: backend/vbd/2/51744: using 1 queues, protocol 1 (x86_64-abi) persistent grants Apr 20 15:26:55 dom0 kernel: xen-blkback: backend/vbd/2/51760: using 1 queues, protocol 1 (x86_64-abi) persistent grants Apr 20 15:26:56 dom0 kernel: xen: registering gsi 16 triggering 0 polarity 1 Apr 20 15:26:56 dom0 kernel: Already setup the GSI :16 Apr 20 15:26:56 dom0 kernel: xen: registering gsi 19 triggering 0 polarity 1 Apr 20 15:26:56 dom0 kernel: Already setup the GSI :19 Apr 20 15:26:56 dom0 qubesd[3175]: vm.sys-net: Setting Qubes DB info for the VM Apr 20 15:26:56 dom0 qubesd[3175]: vm.sys-net: Starting Qubes DB Apr 20 15:26:56 dom0 audit[4554]: CRED_ACQ pid=4554 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Apr 20 15:26:56 dom0 kernel: kauditd_printk_skb: 256 callbacks suppressed Apr 20 15:26:56 dom0 kernel: audit: type=1103 audit(1713644816.225:347): pid=4554 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Apr 20 15:26:56 dom0 runuser[4554]: pam_unix(runuser:session): session opened for user shydonnie(uid=1000) by (uid=0) Apr 20 15:26:56 dom0 audit[4554]: USER_START pid=4554 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Apr 20 15:26:56 dom0 kernel: audit: type=1105 audit(1713644816.226:348): pid=4554 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Apr 20 15:26:56 dom0 runuser[4554]: pam_unix(runuser:session): session closed for user shydonnie Apr 20 15:26:56 dom0 audit[4554]: USER_END pid=4554 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Apr 20 15:26:56 dom0 audit[4554]: CRED_DISP pid=4554 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Apr 20 15:26:56 dom0 kernel: audit: type=1106 audit(1713644816.231:349): pid=4554 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Apr 20 15:26:56 dom0 kernel: audit: type=1104 audit(1713644816.231:350): pid=4554 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Apr 20 15:26:56 dom0 qubesd[3175]: vm.sys-net: Activating the sys-net VM Apr 20 15:26:56 dom0 audit[4564]: CRED_ACQ pid=4564 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Apr 20 15:26:56 dom0 runuser[4564]: pam_unix(runuser:session): session opened for user shydonnie(uid=1000) by (uid=0) Apr 20 15:26:56 dom0 kernel: audit: type=1103 audit(1713644816.238:351): pid=4564 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Apr 20 15:26:56 dom0 kernel: audit: type=1105 audit(1713644816.238:352): pid=4564 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Apr 20 15:26:56 dom0 audit[4564]: USER_START pid=4564 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Apr 20 15:26:56 dom0 lvm[2499]: No longer monitoring thin pool qubes_dom0-vm--pool-tpool. Apr 20 15:26:56 dom0 lvm[2499]: Monitoring thin pool qubes_dom0-vm--pool-tpool. Apr 20 15:26:56 dom0 lvm[2499]: No longer monitoring thin pool qubes_dom0-vm--pool-tpool. Apr 20 15:26:56 dom0 lvm[2499]: Monitoring thin pool qubes_dom0-vm--pool-tpool. Apr 20 15:26:56 dom0 libvirtd[2952]: libvirt version: 8.9.0, package: 6.fc37 (Unknown, 2023-08-17-23:38:43, ) Apr 20 15:26:56 dom0 libvirtd[2952]: hostname: dom0 Apr 20 15:26:56 dom0 libvirtd[2952]: internal error: Unable to reset PCI device 0000:00:14.0: no FLR, PM reset or bus reset available Apr 20 15:26:56 dom0 kernel: loop2: detected capacity change from 0 to 1045968 Apr 20 15:26:56 dom0 kernel: loop3: detected capacity change from 0 to 1045968 Apr 20 15:26:56 dom0 kernel: pciback 0000:00:14.0: xen_pciback: vpci: assign to virtual slot 0 Apr 20 15:26:56 dom0 kernel: pciback 0000:00:14.0: registering for 4 Apr 20 15:26:57 dom0 kernel: xen-blkback: backend/vbd/4/51712: using 1 queues, protocol 1 (x86_64-abi) persistent grants Apr 20 15:26:57 dom0 kernel: xen-blkback: backend/vbd/4/51728: using 1 queues, protocol 1 (x86_64-abi) persistent grants Apr 20 15:26:57 dom0 kernel: xen-blkback: backend/vbd/4/51744: using 1 queues, protocol 1 (x86_64-abi) persistent grants Apr 20 15:26:57 dom0 kernel: xen: registering gsi 16 triggering 0 polarity 1 Apr 20 15:26:57 dom0 kernel: Already setup the GSI :16 Apr 20 15:26:57 dom0 kernel: xen: registering gsi 16 triggering 0 polarity 1 Apr 20 15:26:57 dom0 kernel: Already setup the GSI :16 Apr 20 15:26:57 dom0 kernel: xen: registering gsi 16 triggering 0 polarity 1 Apr 20 15:26:57 dom0 kernel: Already setup the GSI :16 Apr 20 15:26:57 dom0 kernel: xen: registering gsi 16 triggering 0 polarity 1 Apr 20 15:26:57 dom0 kernel: Already setup the GSI :16 Apr 20 15:26:57 dom0 kernel: xen: registering gsi 16 triggering 0 polarity 1 Apr 20 15:26:57 dom0 kernel: Already setup the GSI :16 Apr 20 15:26:57 dom0 kernel: xen: registering gsi 16 triggering 0 polarity 1 Apr 20 15:26:57 dom0 kernel: Already setup the GSI :16 Apr 20 15:26:57 dom0 kernel: xen: registering gsi 16 triggering 0 polarity 1 Apr 20 15:26:57 dom0 kernel: Already setup the GSI :16 Apr 20 15:26:57 dom0 kernel: xen-blkback: backend/vbd/4/51760: using 1 queues, protocol 1 (x86_64-abi) persistent grants Apr 20 15:26:57 dom0 qubesd[3175]: vm.sys-usb: Setting Qubes DB info for the VM Apr 20 15:26:57 dom0 qubesd[3175]: vm.sys-usb: Starting Qubes DB Apr 20 15:26:57 dom0 audit[4852]: CRED_ACQ pid=4852 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Apr 20 15:26:57 dom0 runuser[4852]: pam_unix(runuser:session): session opened for user shydonnie(uid=1000) by (uid=0) Apr 20 15:26:57 dom0 kernel: audit: type=1103 audit(1713644817.720:353): pid=4852 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Apr 20 15:26:57 dom0 kernel: audit: type=1105 audit(1713644817.720:354): pid=4852 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Apr 20 15:26:57 dom0 audit[4852]: USER_START pid=4852 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Apr 20 15:26:57 dom0 runuser[4852]: pam_unix(runuser:session): session closed for user shydonnie Apr 20 15:26:57 dom0 audit[4852]: USER_END pid=4852 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Apr 20 15:26:57 dom0 audit[4852]: CRED_DISP pid=4852 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Apr 20 15:26:57 dom0 kernel: audit: type=1106 audit(1713644817.725:355): pid=4852 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Apr 20 15:26:57 dom0 kernel: audit: type=1104 audit(1713644817.725:356): pid=4852 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Apr 20 15:26:57 dom0 qubesd[3175]: vm.sys-usb: Activating the sys-usb VM Apr 20 15:26:57 dom0 audit[4858]: CRED_ACQ pid=4858 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Apr 20 15:26:57 dom0 runuser[4858]: pam_unix(runuser:session): session opened for user shydonnie(uid=1000) by (uid=0) Apr 20 15:26:57 dom0 audit[4858]: USER_START pid=4858 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Apr 20 15:26:58 dom0 kernel: xen-blkback: backend/vbd/1/51712: using 2 queues, protocol 1 (x86_64-abi) persistent grants Apr 20 15:26:58 dom0 kernel: xen-blkback: backend/vbd/1/51728: using 2 queues, protocol 1 (x86_64-abi) persistent grants Apr 20 15:26:58 dom0 kernel: xen-blkback: backend/vbd/1/51744: using 2 queues, protocol 1 (x86_64-abi) persistent grants Apr 20 15:26:58 dom0 kernel: xen-blkback: backend/vbd/1/51760: using 2 queues, protocol 1 (x86_64-abi) persistent grants Apr 20 15:26:59 dom0 kernel: xen-blkback: backend/vbd/3/51712: using 2 queues, protocol 1 (x86_64-abi) persistent grants Apr 20 15:26:59 dom0 kernel: xen-blkback: backend/vbd/3/51728: using 2 queues, protocol 1 (x86_64-abi) persistent grants Apr 20 15:26:59 dom0 kernel: xen-blkback: backend/vbd/3/51744: using 2 queues, protocol 1 (x86_64-abi) persistent grants Apr 20 15:26:59 dom0 kernel: xen-blkback: backend/vbd/3/51760: using 2 queues, protocol 1 (x86_64-abi) persistent grants Apr 20 15:27:01 dom0 runuser[4564]: pam_unix(runuser:session): session closed for user shydonnie Apr 20 15:27:01 dom0 audit[4564]: USER_END pid=4564 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Apr 20 15:27:01 dom0 audit[4564]: CRED_DISP pid=4564 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Apr 20 15:27:01 dom0 systemd[1]: Finished qubes-vm@sys-net.service - Start Qubes VM sys-net. Apr 20 15:27:01 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-vm@sys-net comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:27:01 dom0 lvm[2499]: No longer monitoring thin pool qubes_dom0-vm--pool-tpool. Apr 20 15:27:01 dom0 lvm[2499]: Monitoring thin pool qubes_dom0-vm--pool-tpool. Apr 20 15:27:01 dom0 lvm[2499]: No longer monitoring thin pool qubes_dom0-vm--pool-tpool. Apr 20 15:27:01 dom0 lvm[2499]: Monitoring thin pool qubes_dom0-vm--pool-tpool. Apr 20 15:27:02 dom0 kernel: loop4: detected capacity change from 0 to 1045968 Apr 20 15:27:02 dom0 qubesd[3175]: vm.sys-firewall: Setting Qubes DB info for the VM Apr 20 15:27:02 dom0 qubesd[3175]: vm.sys-firewall: Starting Qubes DB Apr 20 15:27:02 dom0 kernel: kauditd_printk_skb: 5 callbacks suppressed Apr 20 15:27:02 dom0 kernel: audit: type=1103 audit(1713644822.378:362): pid=5163 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Apr 20 15:27:02 dom0 audit[5163]: CRED_ACQ pid=5163 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Apr 20 15:27:02 dom0 runuser[5163]: pam_unix(runuser:session): session opened for user shydonnie(uid=1000) by (uid=0) Apr 20 15:27:02 dom0 audit[5163]: USER_START pid=5163 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Apr 20 15:27:02 dom0 kernel: audit: type=1105 audit(1713644822.379:363): pid=5163 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Apr 20 15:27:02 dom0 runuser[5163]: pam_unix(runuser:session): session closed for user shydonnie Apr 20 15:27:02 dom0 audit[5163]: USER_END pid=5163 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Apr 20 15:27:02 dom0 audit[5163]: CRED_DISP pid=5163 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Apr 20 15:27:02 dom0 kernel: audit: type=1106 audit(1713644822.384:364): pid=5163 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Apr 20 15:27:02 dom0 kernel: audit: type=1104 audit(1713644822.384:365): pid=5163 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Apr 20 15:27:02 dom0 qubesd[3175]: vm.sys-firewall: Activating the sys-firewall VM Apr 20 15:27:02 dom0 audit[5172]: CRED_ACQ pid=5172 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Apr 20 15:27:02 dom0 runuser[5172]: pam_unix(runuser:session): session opened for user shydonnie(uid=1000) by (uid=0) Apr 20 15:27:02 dom0 kernel: audit: type=1103 audit(1713644822.394:366): pid=5172 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Apr 20 15:27:02 dom0 kernel: audit: type=1105 audit(1713644822.394:367): pid=5172 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Apr 20 15:27:02 dom0 audit[5172]: USER_START pid=5172 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Apr 20 15:27:03 dom0 kernel: xen-blkback: backend/vbd/5/51712: using 2 queues, protocol 1 (x86_64-abi) persistent grants Apr 20 15:27:03 dom0 kernel: xen-blkback: backend/vbd/5/51728: using 2 queues, protocol 1 (x86_64-abi) persistent grants Apr 20 15:27:03 dom0 kernel: xen-blkback: backend/vbd/5/51744: using 2 queues, protocol 1 (x86_64-abi) persistent grants Apr 20 15:27:03 dom0 kernel: xen-blkback: backend/vbd/5/51760: using 2 queues, protocol 1 (x86_64-abi) persistent grants Apr 20 15:27:05 dom0 runuser[5172]: pam_unix(runuser:session): session closed for user shydonnie Apr 20 15:27:05 dom0 audit[5172]: USER_END pid=5172 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Apr 20 15:27:05 dom0 audit[5172]: CRED_DISP pid=5172 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Apr 20 15:27:05 dom0 kernel: audit: type=1106 audit(1713644825.722:368): pid=5172 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Apr 20 15:27:05 dom0 kernel: audit: type=1104 audit(1713644825.722:369): pid=5172 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Apr 20 15:27:05 dom0 systemd[1]: Finished qubes-vm@sys-firewall.service - Start Qubes VM sys-firewall. Apr 20 15:27:05 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-vm@sys-firewall comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:27:05 dom0 kernel: audit: type=1130 audit(1713644825.737:370): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-vm@sys-firewall comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:27:05 dom0 lvm[2499]: No longer monitoring thin pool qubes_dom0-vm--pool-tpool. Apr 20 15:27:05 dom0 lvm[2499]: Monitoring thin pool qubes_dom0-vm--pool-tpool. Apr 20 15:27:06 dom0 lvm[2499]: No longer monitoring thin pool qubes_dom0-vm--pool-tpool. Apr 20 15:27:06 dom0 lvm[2499]: Monitoring thin pool qubes_dom0-vm--pool-tpool. Apr 20 15:27:07 dom0 kernel: loop5: detected capacity change from 0 to 1045968 Apr 20 15:27:07 dom0 qubesd[3175]: vm.sys-whonix: Setting Qubes DB info for the VM Apr 20 15:27:07 dom0 qubesd[3175]: vm.sys-whonix: Starting Qubes DB Apr 20 15:27:07 dom0 kernel: audit: type=1103 audit(1713644827.283:371): pid=5389 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Apr 20 15:27:07 dom0 audit[5389]: CRED_ACQ pid=5389 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Apr 20 15:27:07 dom0 runuser[5389]: pam_unix(runuser:session): session opened for user shydonnie(uid=1000) by (uid=0) Apr 20 15:27:07 dom0 audit[5389]: USER_START pid=5389 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Apr 20 15:27:07 dom0 runuser[5389]: pam_unix(runuser:session): session closed for user shydonnie Apr 20 15:27:07 dom0 audit[5389]: USER_END pid=5389 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Apr 20 15:27:07 dom0 audit[5389]: CRED_DISP pid=5389 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Apr 20 15:27:07 dom0 qubesd[3175]: vm.sys-whonix: Activating the sys-whonix VM Apr 20 15:27:07 dom0 audit[5396]: CRED_ACQ pid=5396 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Apr 20 15:27:07 dom0 runuser[5396]: pam_unix(runuser:session): session opened for user shydonnie(uid=1000) by (uid=0) Apr 20 15:27:07 dom0 audit[5396]: USER_START pid=5396 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_unix acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Apr 20 15:27:08 dom0 runuser[4858]: pam_unix(runuser:session): session closed for user shydonnie Apr 20 15:27:08 dom0 audit[4858]: USER_END pid=4858 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Apr 20 15:27:08 dom0 audit[4858]: CRED_DISP pid=4858 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Apr 20 15:27:08 dom0 kernel: kauditd_printk_skb: 5 callbacks suppressed Apr 20 15:27:08 dom0 kernel: audit: type=1106 audit(1713644828.030:377): pid=4858 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Apr 20 15:27:08 dom0 kernel: audit: type=1104 audit(1713644828.030:378): pid=4858 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Apr 20 15:27:08 dom0 systemd[1]: Finished qubes-vm@sys-usb.service - Start Qubes VM sys-usb. Apr 20 15:27:08 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-vm@sys-usb comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:27:08 dom0 kernel: audit: type=1130 audit(1713644828.041:379): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-vm@sys-usb comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:27:08 dom0 systemd[1]: Starting systemd-user-sessions.service - Permit User Sessions... Apr 20 15:27:08 dom0 systemd[1]: Finished systemd-user-sessions.service - Permit User Sessions. Apr 20 15:27:08 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-user-sessions comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:27:08 dom0 kernel: audit: type=1130 audit(1713644828.057:380): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-user-sessions comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:27:08 dom0 systemd[1]: Started crond.service - Command Scheduler. Apr 20 15:27:08 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=crond comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:27:08 dom0 kernel: audit: type=1130 audit(1713644828.058:381): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=crond comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:27:08 dom0 systemd[1]: Starting lightdm.service - Light Display Manager... Apr 20 15:27:08 dom0 systemd[1]: Starting plymouth-quit-wait.service - Hold until boot process finishes up... Apr 20 15:27:08 dom0 crond[5403]: (CRON) STARTUP (1.6.1) Apr 20 15:27:08 dom0 crond[5403]: (CRON) INFO (Syslog will be used instead of sendmail.) Apr 20 15:27:08 dom0 crond[5403]: (CRON) INFO (RANDOM_DELAY will be scaled with factor 50% if used.) Apr 20 15:27:08 dom0 crond[5403]: (CRON) INFO (running with inotify support) Apr 20 15:27:08 dom0 systemd[1]: Received SIGRTMIN+21 from PID 650 (plymouthd). Apr 20 15:27:08 dom0 systemd[1]: Started lightdm.service - Light Display Manager. Apr 20 15:27:08 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=lightdm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:27:08 dom0 kernel: audit: type=1130 audit(1713644828.100:382): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=lightdm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:27:08 dom0 systemd[1]: Reached target nss-user-lookup.target - User and Group Name Lookups. Apr 20 15:27:08 dom0 audit: BPF prog-id=64 op=LOAD Apr 20 15:27:08 dom0 kernel: audit: type=1334 audit(1713644828.103:383): prog-id=64 op=LOAD Apr 20 15:27:08 dom0 systemd[1]: Starting accounts-daemon.service - Accounts Service... Apr 20 15:27:08 dom0 accounts-daemon[5414]: started daemon version 22.39.0 Apr 20 15:27:08 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=accounts-daemon comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:27:08 dom0 systemd[1]: Started accounts-daemon.service - Accounts Service. Apr 20 15:27:08 dom0 kernel: audit: type=1130 audit(1713644828.141:384): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=accounts-daemon comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:27:08 dom0 kernel: xen-blkback: backend/vbd/6/51712: using 2 queues, protocol 1 (x86_64-abi) persistent grants Apr 20 15:27:08 dom0 kernel: xen-blkback: backend/vbd/6/51728: using 2 queues, protocol 1 (x86_64-abi) persistent grants Apr 20 15:27:08 dom0 kernel: xen-blkback: backend/vbd/6/51744: using 2 queues, protocol 1 (x86_64-abi) persistent grants Apr 20 15:27:08 dom0 kernel: xen-blkback: backend/vbd/6/51760: using 2 queues, protocol 1 (x86_64-abi) persistent grants Apr 20 15:27:08 dom0 systemd[1]: Received SIGRTMIN+21 from PID 650 (plymouthd). Apr 20 15:27:08 dom0 systemd[1]: Finished plymouth-quit-wait.service - Hold until boot process finishes up. Apr 20 15:27:08 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=plymouth-quit-wait comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:27:08 dom0 kernel: audit: type=1130 audit(1713644828.633:385): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=plymouth-quit-wait comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:27:08 dom0 systemd[1]: Started serial-getty@hvc0.service - Serial Getty on hvc0. Apr 20 15:27:08 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=serial-getty@hvc0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:27:08 dom0 systemd[1]: Reached target getty.target - Login Prompts. Apr 20 15:27:08 dom0 kernel: audit: type=1130 audit(1713644828.655:386): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=serial-getty@hvc0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:27:08 dom0 audit[5480]: CRED_ACQ pid=5480 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_env,pam_permit acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Apr 20 15:27:08 dom0 lightdm[5480]: pam_unix(lightdm-greeter:session): session opened for user lightdm(uid=993) by (uid=0) Apr 20 15:27:08 dom0 systemd[1]: Created slice user-993.slice - User Slice of UID 993. Apr 20 15:27:08 dom0 systemd[1]: Starting user-runtime-dir@993.service - User Runtime Directory /run/user/993... Apr 20 15:27:08 dom0 systemd-logind[2904]: New session c1 of user lightdm. Apr 20 15:27:08 dom0 systemd[1]: Finished user-runtime-dir@993.service - User Runtime Directory /run/user/993. Apr 20 15:27:08 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@993 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:27:08 dom0 systemd[1]: Starting user@993.service - User Manager for UID 993... Apr 20 15:27:08 dom0 (systemd)[5484]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory Apr 20 15:27:08 dom0 (systemd)[5484]: PAM adding faulty module: /usr/lib64/security/pam_sss.so Apr 20 15:27:08 dom0 dbus-broker-launch[2864]: Activation request for 'org.freedesktop.home1' failed: The systemd unit 'dbus-org.freedesktop.home1.service' could not be found. Apr 20 15:27:08 dom0 (systemd)[5484]: pam_systemd_home(systemd-user:account): systemd-homed is not available: Could not activate remote peer: activation request failed: unknown unit. Apr 20 15:27:08 dom0 audit[5484]: USER_ACCT pid=5484 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_unix acct="lightdm" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:27:08 dom0 audit[5484]: CRED_ACQ pid=5484 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=? acct="lightdm" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 20 15:27:08 dom0 audit[5484]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=8 a1=7fffa447e930 a2=3 a3=7fffa447e645 items=0 ppid=1 pid=5484 auid=993 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=1 comm="(systemd)" exe="/usr/lib/systemd/systemd" key=(null) Apr 20 15:27:08 dom0 audit: PROCTITLE proctitle="(systemd)" Apr 20 15:27:08 dom0 (systemd)[5484]: pam_unix(systemd-user:session): session opened for user lightdm(uid=993) by (uid=0) Apr 20 15:27:08 dom0 audit[5484]: USER_START pid=5484 uid=0 auid=993 ses=1 msg='op=PAM:session_open grantors=pam_selinux,pam_selinux,pam_loginuid,pam_namespace,pam_systemd_home,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="lightdm" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:27:08 dom0 systemd[5484]: Queued start job for default target default.target. Apr 20 15:27:08 dom0 systemd[5484]: Created slice app.slice - User Application Slice. Apr 20 15:27:08 dom0 systemd[5484]: grub-boot-success.timer - Mark boot as successful after the user session has run 2 minutes was skipped because of a failed condition check (ConditionUser=!@system). Apr 20 15:27:08 dom0 systemd[5484]: Started systemd-tmpfiles-clean.timer - Daily Cleanup of User's Temporary Directories. Apr 20 15:27:08 dom0 systemd[5484]: Reached target paths.target - Paths. Apr 20 15:27:08 dom0 systemd[5484]: Reached target timers.target - Timers. Apr 20 15:27:08 dom0 systemd[5484]: Starting dbus.socket - D-Bus User Message Bus Socket... Apr 20 15:27:08 dom0 systemd[5484]: Listening on pulseaudio.socket - Sound System. Apr 20 15:27:08 dom0 systemd[5484]: Starting systemd-tmpfiles-setup.service - Create User's Volatile Files and Directories... Apr 20 15:27:08 dom0 systemd[5484]: Listening on dbus.socket - D-Bus User Message Bus Socket. Apr 20 15:27:08 dom0 systemd[5484]: Reached target sockets.target - Sockets. Apr 20 15:27:08 dom0 systemd[5484]: Finished systemd-tmpfiles-setup.service - Create User's Volatile Files and Directories. Apr 20 15:27:08 dom0 systemd[5484]: Reached target basic.target - Basic System. Apr 20 15:27:08 dom0 systemd[5484]: Reached target default.target - Main User Target. Apr 20 15:27:08 dom0 systemd[1]: Started user@993.service - User Manager for UID 993. Apr 20 15:27:08 dom0 systemd[5484]: Startup finished in 200ms. Apr 20 15:27:08 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user@993 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:27:08 dom0 systemd[1]: Started session-c1.scope - Session c1 of User lightdm. Apr 20 15:27:08 dom0 audit[5480]: USER_START pid=5480 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_unix,pam_systemd acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Apr 20 15:27:09 dom0 systemd[5484]: Created slice session.slice - User Core Session Slice. Apr 20 15:27:09 dom0 systemd[5484]: Starting dbus-broker.service - D-Bus User Message Bus... Apr 20 15:27:09 dom0 dbus-broker-launch[5513]: Service file '/usr/share/dbus-1/services/dbus-qubes-app-menu.service' is not named after the D-Bus name 'org.qubesos.appmenu'. Apr 20 15:27:09 dom0 dbus-broker-launch[5513]: Service file '/usr/share/dbus-1/services/org.xfce.Thunar.FileManager1.service' is not named after the D-Bus name 'org.freedesktop.FileManager1'. Apr 20 15:27:09 dom0 dbus-broker-launch[5513]: Policy to allow eavesdropping in /usr/share/dbus-1/session.conf +31: Eavesdropping is deprecated and ignored Apr 20 15:27:09 dom0 dbus-broker-launch[5513]: Policy to allow eavesdropping in /usr/share/dbus-1/session.conf +33: Eavesdropping is deprecated and ignored Apr 20 15:27:09 dom0 systemd[5484]: Started dbus-broker.service - D-Bus User Message Bus. Apr 20 15:27:09 dom0 dbus-broker-launch[5513]: Ready Apr 20 15:27:09 dom0 systemd[5484]: Starting at-spi-dbus-bus.service - Accessibility services bus... Apr 20 15:27:09 dom0 systemd[5484]: Started at-spi-dbus-bus.service - Accessibility services bus. Apr 20 15:27:09 dom0 at-spi-bus-launcher[5520]: Policy to allow eavesdropping in /usr/share/defaults/at-spi2/accessibility.conf +15: Eavesdropping is deprecated and ignored Apr 20 15:27:09 dom0 at-spi-bus-launcher[5520]: Policy to allow eavesdropping in /usr/share/defaults/at-spi2/accessibility.conf +17: Eavesdropping is deprecated and ignored Apr 20 15:27:09 dom0 dbus-broker-launch[5520]: Ready Apr 20 15:27:09 dom0 systemd[5484]: Starting gvfs-daemon.service - Virtual filesystem service... Apr 20 15:27:09 dom0 systemd[5484]: Started gvfs-daemon.service - Virtual filesystem service. Apr 20 15:27:09 dom0 systemd[5484]: Created slice app-dbus\x2d:1.4\x2dorg.a11y.atspi.Registry.slice - Slice /app/dbus-:1.4-org.a11y.atspi.Registry. Apr 20 15:27:09 dom0 lightdm[5550]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory Apr 20 15:27:09 dom0 lightdm[5550]: PAM adding faulty module: /usr/lib64/security/pam_sss.so Apr 20 15:27:09 dom0 systemd[5484]: Started dbus-:1.4-org.a11y.atspi.Registry@0.service. Apr 20 15:27:09 dom0 at-spi2-registryd[5551]: SpiRegistry daemon is running with well-known name - org.a11y.atspi.Registry Apr 20 15:27:09 dom0 qrexec-policy-daemon[3179]: qrexec: qubes.GetDate+nanoseconds: sys-usb -> @default: allowed to dom0 Apr 20 15:27:09 dom0 audit: BPF prog-id=65 op=LOAD Apr 20 15:27:09 dom0 audit: BPF prog-id=66 op=LOAD Apr 20 15:27:09 dom0 audit: BPF prog-id=67 op=LOAD Apr 20 15:27:09 dom0 qrexec-policy-daemon[3179]: qrexec: qubes.InputKeyboard+: sys-usb -> @adminvm: allowed to dom0 Apr 20 15:27:09 dom0 qrexec-policy-daemon[3179]: qrexec: qubes.InputMouse+: sys-usb -> @adminvm: allowed to dom0 Apr 20 15:27:09 dom0 systemd[1]: Starting systemd-hostnamed.service - Hostname Service... Apr 20 15:27:10 dom0 qrexec-policy-daemon[3179]: qrexec: qubes.InputKeyboard+: sys-usb -> @adminvm: allowed to dom0 Apr 20 15:27:10 dom0 systemd[1]: Started systemd-hostnamed.service - Hostname Service. Apr 20 15:27:10 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:27:10 dom0 kernel: input: sys-usb: Logitech USB Receiver Keyboard as /devices/virtual/input/input24 Apr 20 15:27:10 dom0 kernel: input: sys-usb: Logitech USB Receiver as /devices/virtual/input/input25 Apr 20 15:27:10 dom0 kernel: input: sys-usb: Logitech G903 as /devices/virtual/input/input26 Apr 20 15:27:10 dom0 systemd-logind[2904]: Watching system buttons on /dev/input/event4 (sys-usb: Logitech USB Receiver Keyboard) Apr 20 15:27:10 dom0 systemd-logind[2904]: Watching system buttons on /dev/input/event6 (sys-usb: Logitech G903) Apr 20 15:27:10 dom0 qubesd[3175]: vm.sys-audio: Starting sys-audio Apr 20 15:27:10 dom0 qubesd[3175]: vm.sys-audio: Start failed: usb device sys-usb:2-5.3 not available Apr 20 15:27:12 dom0 qrexec-policy-daemon[3179]: qrexec: qubes.InputKeyboard+: sys-usb -> @adminvm: allowed to dom0 Apr 20 15:27:12 dom0 qrexec-policy-daemon[3179]: qrexec: qubes.InputKeyboard+: sys-usb -> @adminvm: allowed to dom0 Apr 20 15:27:12 dom0 kernel: input: sys-usb: Logitech Candy as /devices/virtual/input/input27 Apr 20 15:27:12 dom0 kernel: input: sys-usb: Logitech G502 X PLUS as /devices/virtual/input/input28 Apr 20 15:27:12 dom0 runuser[5396]: pam_unix(runuser:session): session closed for user shydonnie Apr 20 15:27:12 dom0 audit[5396]: USER_END pid=5396 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_unix acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Apr 20 15:27:12 dom0 audit[5396]: CRED_DISP pid=5396 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_rootok acct="shydonnie" exe="/usr/sbin/runuser" hostname=? addr=? terminal=? res=success' Apr 20 15:27:12 dom0 systemd[1]: Finished qubes-vm@sys-whonix.service - Start Qubes VM sys-whonix. Apr 20 15:27:12 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-vm@sys-whonix comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:27:12 dom0 systemd[1]: Reached target multi-user.target - Multi-User System. Apr 20 15:27:12 dom0 systemd[1]: Reached target graphical.target - Graphical Interface. Apr 20 15:27:12 dom0 systemd[1]: Starting systemd-update-utmp-runlevel.service - Record Runlevel Change in UTMP... Apr 20 15:27:12 dom0 audit[5745]: SYSTEM_RUNLEVEL pid=5745 uid=0 auid=4294967295 ses=4294967295 msg='old-level=N new-level=5 comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Apr 20 15:27:12 dom0 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Apr 20 15:27:12 dom0 systemd[1]: Finished systemd-update-utmp-runlevel.service - Record Runlevel Change in UTMP. Apr 20 15:27:12 dom0 systemd[1]: Startup finished in 17.484s (firmware) + 2.122s (loader) + 1.736s (kernel) + 36.295s (initrd) + 21.425s (userspace) = 1min 19.065s. Apr 20 15:27:12 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-update-utmp-runlevel comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:27:12 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-update-utmp-runlevel comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:27:12 dom0 systemd-logind[2904]: Watching system buttons on /dev/input/event7 (sys-usb: Logitech Candy) Apr 20 15:27:12 dom0 systemd-logind[2904]: Watching system buttons on /dev/input/event8 (sys-usb: Logitech G502 X PLUS) Apr 20 15:27:15 dom0 audit[5550]: USER_AUTH pid=5550 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:authentication grantors=pam_usertype,pam_localuser,pam_unix acct="shydonnie" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Apr 20 15:27:15 dom0 audit[5550]: USER_ACCT pid=5550 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="shydonnie" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Apr 20 15:27:15 dom0 kernel: kauditd_printk_skb: 20 callbacks suppressed Apr 20 15:27:15 dom0 kernel: audit: type=1100 audit(1713644835.580:405): pid=5550 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:authentication grantors=pam_usertype,pam_localuser,pam_unix acct="shydonnie" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Apr 20 15:27:15 dom0 kernel: audit: type=1101 audit(1713644835.580:406): pid=5550 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="shydonnie" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Apr 20 15:27:15 dom0 systemd[1]: Stopping session-c1.scope - Session c1 of User lightdm... Apr 20 15:27:15 dom0 lightdm[5480]: pam_unix(lightdm-greeter:session): session closed for user lightdm Apr 20 15:27:15 dom0 audit[5480]: USER_END pid=5480 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_unix,pam_systemd acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Apr 20 15:27:15 dom0 audit[5480]: CRED_DISP pid=5480 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_env,pam_permit acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Apr 20 15:27:15 dom0 kernel: audit: type=1106 audit(1713644835.668:407): pid=5480 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_unix,pam_systemd acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Apr 20 15:27:15 dom0 kernel: audit: type=1104 audit(1713644835.668:408): pid=5480 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_env,pam_permit acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Apr 20 15:27:15 dom0 systemd[1]: session-c1.scope: Deactivated successfully. Apr 20 15:27:15 dom0 systemd[1]: Stopped session-c1.scope - Session c1 of User lightdm. Apr 20 15:27:15 dom0 systemd[1]: session-c1.scope: Consumed 1.353s CPU time. Apr 20 15:27:15 dom0 systemd-logind[2904]: Removed session c1. Apr 20 15:27:15 dom0 audit[5550]: CRED_ACQ pid=5550 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_localuser,pam_unix acct="shydonnie" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Apr 20 15:27:15 dom0 audit[5550]: SYSCALL arch=c000003e syscall=1 success=yes exit=4 a0=8 a1=7ffef133d990 a2=4 a3=7ffef133d6a4 items=0 ppid=5404 pid=5550 auid=1000 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=2 comm="lightdm" exe="/usr/sbin/lightdm" key=(null) Apr 20 15:27:15 dom0 audit: PROCTITLE proctitle=6C69676874646D002D2D73657373696F6E2D6368696C64003133003230 Apr 20 15:27:15 dom0 kernel: audit: type=1103 audit(1713644835.672:409): pid=5550 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_localuser,pam_unix acct="shydonnie" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Apr 20 15:27:15 dom0 kernel: audit: type=1006 audit(1713644835.672:410): pid=5550 uid=0 old-auid=4294967295 auid=1000 tty=(none) old-ses=4294967295 ses=2 res=1 Apr 20 15:27:15 dom0 kernel: audit: type=1300 audit(1713644835.672:410): arch=c000003e syscall=1 success=yes exit=4 a0=8 a1=7ffef133d990 a2=4 a3=7ffef133d6a4 items=0 ppid=5404 pid=5550 auid=1000 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=2 comm="lightdm" exe="/usr/sbin/lightdm" key=(null) Apr 20 15:27:15 dom0 kernel: audit: type=1327 audit(1713644835.672:410): proctitle=6C69676874646D002D2D73657373696F6E2D6368696C64003133003230 Apr 20 15:27:15 dom0 systemd[1]: Created slice user-1000.slice - User Slice of UID 1000. Apr 20 15:27:15 dom0 systemd[1]: Starting user-runtime-dir@1000.service - User Runtime Directory /run/user/1000... Apr 20 15:27:15 dom0 systemd-logind[2904]: New session 2 of user shydonnie. Apr 20 15:27:15 dom0 systemd[1]: Finished user-runtime-dir@1000.service - User Runtime Directory /run/user/1000. Apr 20 15:27:15 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@1000 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:27:15 dom0 kernel: audit: type=1130 audit(1713644835.714:411): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@1000 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:27:15 dom0 systemd[1]: Starting user@1000.service - User Manager for UID 1000... Apr 20 15:27:15 dom0 (systemd)[5754]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory Apr 20 15:27:15 dom0 (systemd)[5754]: PAM adding faulty module: /usr/lib64/security/pam_sss.so Apr 20 15:27:15 dom0 (systemd)[5754]: pam_systemd_home(systemd-user:account): systemd-homed is not available: Could not activate remote peer: activation request failed: unknown unit. Apr 20 15:27:15 dom0 audit[5754]: USER_ACCT pid=5754 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_unix acct="shydonnie" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:27:15 dom0 audit[5754]: CRED_ACQ pid=5754 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=? acct="shydonnie" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 20 15:27:15 dom0 kernel: audit: type=1101 audit(1713644835.724:412): pid=5754 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_unix acct="shydonnie" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:27:15 dom0 audit[5754]: SYSCALL arch=c000003e syscall=1 success=yes exit=4 a0=8 a1=7fffa447e930 a2=4 a3=7fffa447e644 items=0 ppid=1 pid=5754 auid=1000 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=3 comm="(systemd)" exe="/usr/lib/systemd/systemd" key=(null) Apr 20 15:27:15 dom0 audit: PROCTITLE proctitle="(systemd)" Apr 20 15:27:15 dom0 (systemd)[5754]: pam_unix(systemd-user:session): session opened for user shydonnie(uid=1000) by (uid=0) Apr 20 15:27:15 dom0 audit[5754]: USER_START pid=5754 uid=0 auid=1000 ses=3 msg='op=PAM:session_open grantors=pam_selinux,pam_selinux,pam_loginuid,pam_namespace,pam_systemd_home,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="shydonnie" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:27:15 dom0 systemd[5754]: Queued start job for default target default.target. Apr 20 15:27:15 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user@1000 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:27:15 dom0 audit[5550]: USER_START pid=5550 uid=0 auid=1000 ses=2 msg='op=PAM:session_open grantors=pam_selinux,pam_loginuid,pam_selinux,pam_keyinit,pam_namespace,pam_keyinit,pam_limits,pam_systemd,pam_unix,pam_lastlog,pam_umask,pam_lastlog acct="shydonnie" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Apr 20 15:27:15 dom0 audit[5550]: USER_LOGIN pid=5550 uid=0 auid=1000 ses=2 msg='op=login id=1000 exe="/usr/sbin/lightdm" hostname=dom0 addr=? terminal=/dev/tty1 res=success' Apr 20 15:27:15 dom0 lightdm[5550]: pam_unix(lightdm:session): session opened for user shydonnie(uid=1000) by (uid=0) Apr 20 15:27:15 dom0 systemd[5754]: Created slice app.slice - User Application Slice. Apr 20 15:27:15 dom0 systemd[5754]: Started grub-boot-success.timer - Mark boot as successful after the user session has run 2 minutes. Apr 20 15:27:15 dom0 systemd[5754]: Started systemd-tmpfiles-clean.timer - Daily Cleanup of User's Temporary Directories. Apr 20 15:27:15 dom0 systemd[5754]: Reached target paths.target - Paths. Apr 20 15:27:15 dom0 systemd[5754]: Reached target timers.target - Timers. Apr 20 15:27:15 dom0 systemd[5754]: Starting dbus.socket - D-Bus User Message Bus Socket... Apr 20 15:27:15 dom0 systemd[5754]: Listening on pulseaudio.socket - Sound System. Apr 20 15:27:15 dom0 systemd[5754]: Starting systemd-tmpfiles-setup.service - Create User's Volatile Files and Directories... Apr 20 15:27:15 dom0 systemd[5754]: Finished systemd-tmpfiles-setup.service - Create User's Volatile Files and Directories. Apr 20 15:27:15 dom0 systemd[5754]: Listening on dbus.socket - D-Bus User Message Bus Socket. Apr 20 15:27:15 dom0 systemd[5754]: Reached target sockets.target - Sockets. Apr 20 15:27:15 dom0 systemd[5754]: Reached target basic.target - Basic System. Apr 20 15:27:15 dom0 systemd[5754]: Reached target default.target - Main User Target. Apr 20 15:27:15 dom0 systemd[5754]: Startup finished in 148ms. Apr 20 15:27:15 dom0 systemd[1]: Started user@1000.service - User Manager for UID 1000. Apr 20 15:27:15 dom0 systemd[1]: Started session-2.scope - Session 2 of User shydonnie. Apr 20 15:27:16 dom0 systemd[5754]: Created slice session.slice - User Core Session Slice. Apr 20 15:27:16 dom0 systemd[5754]: Starting dbus-broker.service - D-Bus User Message Bus... Apr 20 15:27:16 dom0 dbus-broker-launch[5800]: Service file '/usr/share/dbus-1/services/dbus-qubes-app-menu.service' is not named after the D-Bus name 'org.qubesos.appmenu'. Apr 20 15:27:16 dom0 dbus-broker-launch[5800]: Service file '/usr/share/dbus-1/services/org.xfce.Thunar.FileManager1.service' is not named after the D-Bus name 'org.freedesktop.FileManager1'. Apr 20 15:27:16 dom0 dbus-broker-launch[5800]: Policy to allow eavesdropping in /usr/share/dbus-1/session.conf +31: Eavesdropping is deprecated and ignored Apr 20 15:27:16 dom0 dbus-broker-launch[5800]: Policy to allow eavesdropping in /usr/share/dbus-1/session.conf +33: Eavesdropping is deprecated and ignored Apr 20 15:27:16 dom0 systemd[5754]: Started dbus-broker.service - D-Bus User Message Bus. Apr 20 15:27:16 dom0 dbus-broker-launch[5800]: Ready Apr 20 15:27:16 dom0 systemd[5754]: Starting at-spi-dbus-bus.service - Accessibility services bus... Apr 20 15:27:16 dom0 systemd[5754]: Started at-spi-dbus-bus.service - Accessibility services bus. Apr 20 15:27:16 dom0 at-spi-bus-launcher[5838]: Policy to allow eavesdropping in /usr/share/defaults/at-spi2/accessibility.conf +15: Eavesdropping is deprecated and ignored Apr 20 15:27:16 dom0 at-spi-bus-launcher[5838]: Policy to allow eavesdropping in /usr/share/defaults/at-spi2/accessibility.conf +17: Eavesdropping is deprecated and ignored Apr 20 15:27:16 dom0 dbus-broker-launch[5838]: Ready Apr 20 15:27:16 dom0 systemd[5754]: Created slice app-dbus\x2d:1.2\x2dorg.xfce.Xfconf.slice - Slice /app/dbus-:1.2-org.xfce.Xfconf. Apr 20 15:27:16 dom0 systemd[5754]: Started dbus-:1.2-org.xfce.Xfconf@0.service. Apr 20 15:27:16 dom0 systemd[5754]: Created slice app-dbus\x2d:1.6\x2dorg.a11y.atspi.Registry.slice - Slice /app/dbus-:1.6-org.a11y.atspi.Registry. Apr 20 15:27:16 dom0 systemd[5754]: Started dbus-:1.6-org.a11y.atspi.Registry@0.service. Apr 20 15:27:16 dom0 at-spi2-registryd[5847]: SpiRegistry daemon is running with well-known name - org.a11y.atspi.Registry Apr 20 15:27:16 dom0 systemd[5754]: Starting gvfs-daemon.service - Virtual filesystem service... Apr 20 15:27:16 dom0 systemd[5754]: Started gvfs-daemon.service - Virtual filesystem service. Apr 20 15:27:17 dom0 systemd[5754]: Starting gvfs-udisks2-volume-monitor.service - Virtual filesystem service - disk device monitor... Apr 20 15:27:17 dom0 systemd[5754]: Started gvfs-udisks2-volume-monitor.service - Virtual filesystem service - disk device monitor. Apr 20 15:27:17 dom0 systemd[5754]: Starting gvfs-metadata.service - Virtual filesystem metadata service... Apr 20 15:27:17 dom0 systemd[5754]: Started gvfs-metadata.service - Virtual filesystem metadata service. Apr 20 15:27:17 dom0 systemd[1]: /usr/lib/systemd/system/qubes-suspend.service:9: Standard output type syslog is obsolete, automatically updating to journal. Please update your unit file, and consider removing the setting altogether. Apr 20 15:27:17 dom0 systemd[5754]: Starting thunar.service - Thunar file manager... Apr 20 15:27:17 dom0 systemd[5754]: Started thunar.service - Thunar file manager. Apr 20 15:27:17 dom0 systemd[5754]: Starting pulseaudio.service - Sound Service... Apr 20 15:27:17 dom0 systemd[1]: Starting rtkit-daemon.service - RealtimeKit Scheduling Policy Service... Apr 20 15:27:17 dom0 systemd[1]: Started rtkit-daemon.service - RealtimeKit Scheduling Policy Service. Apr 20 15:27:17 dom0 rtkit-daemon[5972]: Successfully called chroot. Apr 20 15:27:17 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=rtkit-daemon comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:27:17 dom0 rtkit-daemon[5972]: Successfully dropped privileges. Apr 20 15:27:17 dom0 rtkit-daemon[5972]: Successfully limited resources. Apr 20 15:27:17 dom0 rtkit-daemon[5972]: Canary thread running. Apr 20 15:27:17 dom0 rtkit-daemon[5972]: Running. Apr 20 15:27:17 dom0 rtkit-daemon[5972]: Watchdog thread running. Apr 20 15:27:17 dom0 rtkit-daemon[5972]: Successfully made thread 5971 of process 5971 (/usr/bin/pulseaudio) owned by '1000' high priority at nice level -11. Apr 20 15:27:17 dom0 rtkit-daemon[5972]: Successfully made thread 5989 of process 5971 (/usr/bin/pulseaudio) owned by '1000' RT at priority 5. Apr 20 15:27:17 dom0 pulseaudio[5971]: stat('/etc/pulse/default.pa.d'): No such file or directory Apr 20 15:27:17 dom0 systemd[5754]: Started pulseaudio.service - Sound Service. Apr 20 15:27:17 dom0 systemd[5754]: Created slice app-qubes\x2dwidget.slice - Slice /app/qubes-widget. Apr 20 15:27:17 dom0 sudo[6049]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory Apr 20 15:27:17 dom0 audit[6049]: USER_ACCT pid=6049 uid=1000 auid=1000 ses=2 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="shydonnie" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 20 15:27:17 dom0 audit[6049]: USER_CMD pid=6049 uid=1000 auid=1000 ses=2 msg='cwd="/home/shydonnie" cmd=2F62696E2F73797374656D63746C202D2D6E6F2D626C6F636B2073746172742071756265732D696E7075742D73656E6465722D6B6579626F617264406576656E74332E73657276696365 exe="/usr/bin/sudo" terminal=? res=success' Apr 20 15:27:17 dom0 audit[6049]: CRED_REFR pid=6049 uid=1000 auid=1000 ses=2 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 20 15:27:17 dom0 audit[6049]: USER_START pid=6049 uid=1000 auid=1000 ses=2 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 20 15:27:17 dom0 sudo[6049]: PAM adding faulty module: /usr/lib64/security/pam_sss.so Apr 20 15:27:17 dom0 systemd[5754]: Started qubes-widget@qui-clipboard.service - Qubes Widget service. Apr 20 15:27:17 dom0 sudo[6049]: shydonnie : PWD=/home/shydonnie ; USER=root ; COMMAND=/bin/systemctl --no-block start qubes-input-sender-keyboard@event3.service Apr 20 15:27:17 dom0 sudo[6049]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Apr 20 15:27:17 dom0 systemd[1]: Started qubes-input-sender-keyboard@event3.service - Qubes input proxy sender (keyboard). Apr 20 15:27:17 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event3 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:27:17 dom0 systemd[5754]: Started qubes-widget@qui-devices.service - Qubes Widget service. Apr 20 15:27:17 dom0 sudo[6049]: pam_unix(sudo:session): session closed for user root Apr 20 15:27:17 dom0 audit[6049]: USER_END pid=6049 uid=1000 auid=1000 ses=2 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 20 15:27:17 dom0 audit[6049]: CRED_DISP pid=6049 uid=1000 auid=1000 ses=2 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 20 15:27:17 dom0 qubes-input-sender[6053]: Device /dev/input/event3 is already in dom0 Apr 20 15:27:17 dom0 systemd[1]: qubes-input-sender-keyboard@event3.service: Deactivated successfully. Apr 20 15:27:17 dom0 systemd[5754]: Started qubes-widget@qui-disk-space.service - Qubes Widget service. Apr 20 15:27:17 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event3 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:27:17 dom0 systemd[5754]: Started qubes-widget@qui-domains.service - Qubes Widget service. Apr 20 15:27:17 dom0 systemd[5754]: Started qubes-widget@qui-updates.service - Qubes Widget service. Apr 20 15:27:17 dom0 systemd[5754]: Starting qubes-app-menu.service - Qubes Application Menu... Apr 20 15:27:17 dom0 sudo[6065]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory Apr 20 15:27:17 dom0 sudo[6065]: PAM adding faulty module: /usr/lib64/security/pam_sss.so Apr 20 15:27:17 dom0 audit[6065]: USER_ACCT pid=6065 uid=1000 auid=1000 ses=2 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="shydonnie" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 20 15:27:17 dom0 audit[6065]: USER_CMD pid=6065 uid=1000 auid=1000 ses=2 msg='cwd="/home/shydonnie" cmd=2F62696E2F73797374656D63746C202D2D6E6F2D626C6F636B2073746172742071756265732D696E7075742D73656E6465722D6B6579626F617264406576656E74322E73657276696365 exe="/usr/bin/sudo" terminal=? res=success' Apr 20 15:27:17 dom0 sudo[6065]: shydonnie : PWD=/home/shydonnie ; USER=root ; COMMAND=/bin/systemctl --no-block start qubes-input-sender-keyboard@event2.service Apr 20 15:27:17 dom0 audit[6065]: CRED_REFR pid=6065 uid=1000 auid=1000 ses=2 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 20 15:27:17 dom0 sudo[6065]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Apr 20 15:27:17 dom0 audit[6065]: USER_START pid=6065 uid=1000 auid=1000 ses=2 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 20 15:27:17 dom0 systemd[1]: Started qubes-input-sender-keyboard@event2.service - Qubes input proxy sender (keyboard). Apr 20 15:27:17 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event2 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:27:17 dom0 qubes-input-sender[6067]: Device /dev/input/event2 is already in dom0 Apr 20 15:27:17 dom0 audit[6065]: USER_END pid=6065 uid=1000 auid=1000 ses=2 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 20 15:27:17 dom0 audit[6065]: CRED_DISP pid=6065 uid=1000 auid=1000 ses=2 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 20 15:27:17 dom0 sudo[6065]: pam_unix(sudo:session): session closed for user root Apr 20 15:27:17 dom0 systemd[1]: qubes-input-sender-keyboard@event2.service: Deactivated successfully. Apr 20 15:27:17 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event2 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:27:17 dom0 sudo[6074]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory Apr 20 15:27:17 dom0 sudo[6074]: PAM adding faulty module: /usr/lib64/security/pam_sss.so Apr 20 15:27:17 dom0 audit[6074]: USER_ACCT pid=6074 uid=1000 auid=1000 ses=2 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="shydonnie" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 20 15:27:17 dom0 audit[6074]: USER_CMD pid=6074 uid=1000 auid=1000 ses=2 msg='cwd="/home/shydonnie" cmd=2F62696E2F73797374656D63746C202D2D6E6F2D626C6F636B2073746172742071756265732D696E7075742D73656E6465722D6B6579626F617264406576656E74312E73657276696365 exe="/usr/bin/sudo" terminal=? res=success' Apr 20 15:27:17 dom0 sudo[6074]: shydonnie : PWD=/home/shydonnie ; USER=root ; COMMAND=/bin/systemctl --no-block start qubes-input-sender-keyboard@event1.service Apr 20 15:27:17 dom0 audit[6074]: CRED_REFR pid=6074 uid=1000 auid=1000 ses=2 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 20 15:27:17 dom0 sudo[6074]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Apr 20 15:27:17 dom0 audit[6074]: USER_START pid=6074 uid=1000 auid=1000 ses=2 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 20 15:27:17 dom0 systemd[1]: Started qubes-input-sender-keyboard@event1.service - Qubes input proxy sender (keyboard). Apr 20 15:27:17 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event1 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:27:17 dom0 sudo[6074]: pam_unix(sudo:session): session closed for user root Apr 20 15:27:17 dom0 audit[6074]: USER_END pid=6074 uid=1000 auid=1000 ses=2 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 20 15:27:17 dom0 audit[6074]: CRED_DISP pid=6074 uid=1000 auid=1000 ses=2 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 20 15:27:17 dom0 qubes-input-sender[6076]: Device /dev/input/event1 is already in dom0 Apr 20 15:27:17 dom0 systemd[1]: qubes-input-sender-keyboard@event1.service: Deactivated successfully. Apr 20 15:27:17 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event1 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:27:17 dom0 sudo[6083]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory Apr 20 15:27:17 dom0 sudo[6083]: PAM adding faulty module: /usr/lib64/security/pam_sss.so Apr 20 15:27:17 dom0 audit[6083]: USER_ACCT pid=6083 uid=1000 auid=1000 ses=2 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="shydonnie" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 20 15:27:17 dom0 audit[6083]: USER_CMD pid=6083 uid=1000 auid=1000 ses=2 msg='cwd="/home/shydonnie" cmd=2F62696E2F73797374656D63746C202D2D6E6F2D626C6F636B2073746172742071756265732D696E7075742D73656E6465722D6B6579626F617264406576656E74302E73657276696365 exe="/usr/bin/sudo" terminal=? res=success' Apr 20 15:27:17 dom0 sudo[6083]: shydonnie : PWD=/home/shydonnie ; USER=root ; COMMAND=/bin/systemctl --no-block start qubes-input-sender-keyboard@event0.service Apr 20 15:27:17 dom0 audit[6083]: CRED_REFR pid=6083 uid=1000 auid=1000 ses=2 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 20 15:27:17 dom0 sudo[6083]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=1000) Apr 20 15:27:17 dom0 audit[6083]: USER_START pid=6083 uid=1000 auid=1000 ses=2 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 20 15:27:17 dom0 polkitd[2947]: Registered Authentication Agent for unix-session:2 (system bus name :1.64 [/usr/libexec/xfce-polkit], object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale en_US.utf8) Apr 20 15:27:17 dom0 systemd[1]: Started qubes-input-sender-keyboard@event0.service - Qubes input proxy sender (keyboard). Apr 20 15:27:17 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:27:17 dom0 sudo[6083]: pam_unix(sudo:session): session closed for user root Apr 20 15:27:17 dom0 audit[6083]: USER_END pid=6083 uid=1000 auid=1000 ses=2 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 20 15:27:17 dom0 audit[6083]: CRED_DISP pid=6083 uid=1000 auid=1000 ses=2 msg='op=PAM:setcred grantors=pam_env,pam_localuser,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 20 15:27:17 dom0 qubes-input-sender[6101]: Device /dev/input/event0 is already in dom0 Apr 20 15:27:17 dom0 systemd[1]: qubes-input-sender-keyboard@event0.service: Deactivated successfully. Apr 20 15:27:17 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-input-sender-keyboard@event0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:27:17 dom0 qrexec-policy-daemon[3179]: qrexec: qubes.GetDate+nanoseconds: sys-firewall -> @default: allowed to dom0 Apr 20 15:27:17 dom0 systemd[5754]: Started qubes-app-menu.service - Qubes Application Menu. Apr 20 15:27:18 dom0 qrexec-policy-daemon[3179]: qrexec: qubes.WindowIconUpdater+: sys-whonix -> @adminvm: allowed to dom0 Apr 20 15:27:18 dom0 qrexec-policy-daemon[3179]: qrexec: qubes.WindowIconUpdater+: sys-firewall -> @adminvm: allowed to dom0 Apr 20 15:27:18 dom0 qrexec-policy-daemon[3179]: qrexec: qubes.WindowIconUpdater+: sys-net -> @adminvm: allowed to dom0 Apr 20 15:27:19 dom0 qrexec-policy-daemon[3179]: qrexec: qubes.WindowIconUpdater+: sys-usb -> @adminvm: allowed to dom0 Apr 20 15:27:25 dom0 systemd[1]: Stopping user@993.service - User Manager for UID 993... Apr 20 15:27:25 dom0 systemd[5484]: Activating special unit exit.target... Apr 20 15:27:25 dom0 systemd[5484]: Stopped target default.target - Main User Target. Apr 20 15:27:25 dom0 systemd[5484]: Stopping at-spi-dbus-bus.service - Accessibility services bus... Apr 20 15:27:25 dom0 systemd[5484]: Stopping dbus-:1.4-org.a11y.atspi.Registry@0.service... Apr 20 15:27:25 dom0 dbus-broker[5521]: Dispatched 22 messages @ 4(±4)μs / message. Apr 20 15:27:25 dom0 systemd[5484]: Stopping gvfs-daemon.service - Virtual filesystem service... Apr 20 15:27:25 dom0 systemd[5484]: Stopped at-spi-dbus-bus.service - Accessibility services bus. Apr 20 15:27:25 dom0 systemd[5484]: Stopped gvfs-daemon.service - Virtual filesystem service. Apr 20 15:27:25 dom0 systemd[5484]: Stopped dbus-:1.4-org.a11y.atspi.Registry@0.service. Apr 20 15:27:25 dom0 systemd[5484]: Removed slice app-dbus\x2d:1.4\x2dorg.a11y.atspi.Registry.slice - Slice /app/dbus-:1.4-org.a11y.atspi.Registry. Apr 20 15:27:25 dom0 systemd[5484]: Stopped target basic.target - Basic System. Apr 20 15:27:25 dom0 systemd[5484]: Stopped target paths.target - Paths. Apr 20 15:27:25 dom0 systemd[5484]: Stopped target sockets.target - Sockets. Apr 20 15:27:25 dom0 systemd[5484]: Stopped target timers.target - Timers. Apr 20 15:27:25 dom0 systemd[5484]: Stopped systemd-tmpfiles-clean.timer - Daily Cleanup of User's Temporary Directories. Apr 20 15:27:25 dom0 systemd[5484]: Closed pulseaudio.socket - Sound System. Apr 20 15:27:25 dom0 dbus-broker[5514]: Dispatched 259 messages @ 4(±4)μs / message. Apr 20 15:27:25 dom0 systemd[5484]: Stopping dbus-broker.service - D-Bus User Message Bus... Apr 20 15:27:25 dom0 systemd[5484]: Stopped systemd-tmpfiles-setup.service - Create User's Volatile Files and Directories. Apr 20 15:27:25 dom0 systemd[5484]: Stopped dbus-broker.service - D-Bus User Message Bus. Apr 20 15:27:25 dom0 systemd[5484]: Removed slice session.slice - User Core Session Slice. Apr 20 15:27:25 dom0 systemd[5484]: Closed dbus.socket - D-Bus User Message Bus Socket. Apr 20 15:27:25 dom0 systemd[5484]: Removed slice app.slice - User Application Slice. Apr 20 15:27:25 dom0 systemd[5484]: Reached target shutdown.target - Shutdown. Apr 20 15:27:25 dom0 systemd[5484]: Finished systemd-exit.service - Exit the Session. Apr 20 15:27:25 dom0 systemd[5484]: Reached target exit.target - Exit the Session. Apr 20 15:27:25 dom0 systemd[1]: user@993.service: Deactivated successfully. Apr 20 15:27:25 dom0 systemd[1]: Stopped user@993.service - User Manager for UID 993. Apr 20 15:27:25 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user@993 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:27:25 dom0 kernel: kauditd_printk_skb: 41 callbacks suppressed Apr 20 15:27:25 dom0 kernel: audit: type=1131 audit(1713644845.853:452): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user@993 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:27:25 dom0 systemd[1]: Stopping user-runtime-dir@993.service - User Runtime Directory /run/user/993... Apr 20 15:27:25 dom0 systemd[1]: run-user-993.mount: Deactivated successfully. Apr 20 15:27:25 dom0 systemd[1]: user-runtime-dir@993.service: Deactivated successfully. Apr 20 15:27:25 dom0 systemd[1]: Stopped user-runtime-dir@993.service - User Runtime Directory /run/user/993. Apr 20 15:27:25 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@993 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:27:25 dom0 kernel: audit: type=1131 audit(1713644845.889:453): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@993 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:27:25 dom0 systemd[1]: Removed slice user-993.slice - User Slice of UID 993. Apr 20 15:27:25 dom0 systemd[1]: user-993.slice: Consumed 1.674s CPU time. Apr 20 15:27:47 dom0 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Apr 20 15:27:47 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:27:47 dom0 kernel: audit: type=1131 audit(1713644867.731:454): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:27:47 dom0 audit: BPF prog-id=67 op=UNLOAD Apr 20 15:27:47 dom0 audit: BPF prog-id=66 op=UNLOAD Apr 20 15:27:47 dom0 audit: BPF prog-id=65 op=UNLOAD Apr 20 15:27:47 dom0 kernel: audit: type=1334 audit(1713644867.761:455): prog-id=67 op=UNLOAD Apr 20 15:27:47 dom0 kernel: audit: type=1334 audit(1713644867.761:456): prog-id=66 op=UNLOAD Apr 20 15:27:47 dom0 kernel: audit: type=1334 audit(1713644867.761:457): prog-id=65 op=UNLOAD Apr 20 15:29:30 dom0 qubesd[3175]: vm.sys-audio: Starting sys-audio Apr 20 15:29:30 dom0 lvm[2499]: No longer monitoring thin pool qubes_dom0-vm--pool-tpool. Apr 20 15:29:30 dom0 lvm[2499]: Monitoring thin pool qubes_dom0-vm--pool-tpool. Apr 20 15:29:30 dom0 systemd[5754]: Starting grub-boot-success.service - Mark boot as successful... Apr 20 15:29:30 dom0 systemd[5754]: Finished grub-boot-success.service - Mark boot as successful. Apr 20 15:29:30 dom0 lvm[2499]: No longer monitoring thin pool qubes_dom0-vm--pool-tpool. Apr 20 15:29:30 dom0 lvm[2499]: Monitoring thin pool qubes_dom0-vm--pool-tpool. Apr 20 15:29:30 dom0 libvirtd[2952]: internal error: Unable to reset PCI device 0000:00:1f.3: no FLR, PM reset or bus reset available Apr 20 15:29:30 dom0 libvirtd[2952]: Failed to reset PCI device: internal error: Unable to reset PCI device 0000:00:1f.3: no FLR, PM reset or bus reset available Apr 20 15:29:30 dom0 qubesd[3175]: vm.sys-audio: Start failed: internal error: Unable to reset PCI device 0000:00:1f.3: no FLR, PM reset or bus reset available Apr 20 15:29:55 dom0 systemd[1]: /usr/lib/systemd/system/qubes-suspend.service:9: Standard output type syslog is obsolete, automatically updating to journal. Please update your unit file, and consider removing the setting altogether. Apr 20 15:29:57 dom0 audit[5550]: USER_LOGOUT pid=5550 uid=0 auid=1000 ses=2 msg='op=logout id=1000 exe="/usr/sbin/lightdm" hostname=dom0 addr=? terminal=/dev/tty1 res=success' Apr 20 15:29:57 dom0 kernel: audit: type=1113 audit(1713644997.285:458): pid=5550 uid=0 auid=1000 ses=2 msg='op=logout id=1000 exe="/usr/sbin/lightdm" hostname=dom0 addr=? terminal=/dev/tty1 res=success' Apr 20 15:29:57 dom0 lightdm[5550]: pam_unix(lightdm:session): session closed for user shydonnie Apr 20 15:29:57 dom0 audit[5550]: USER_END pid=5550 uid=0 auid=1000 ses=2 msg='op=PAM:session_close grantors=pam_selinux,pam_loginuid,pam_selinux,pam_keyinit,pam_namespace,pam_keyinit,pam_limits,pam_systemd,pam_unix,pam_lastlog,pam_umask,pam_lastlog acct="shydonnie" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Apr 20 15:29:57 dom0 audit[5550]: CRED_DISP pid=5550 uid=0 auid=1000 ses=2 msg='op=PAM:setcred grantors=pam_localuser,pam_unix acct="shydonnie" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Apr 20 15:29:57 dom0 kernel: audit: type=1106 audit(1713644997.286:459): pid=5550 uid=0 auid=1000 ses=2 msg='op=PAM:session_close grantors=pam_selinux,pam_loginuid,pam_selinux,pam_keyinit,pam_namespace,pam_keyinit,pam_limits,pam_systemd,pam_unix,pam_lastlog,pam_umask,pam_lastlog acct="shydonnie" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Apr 20 15:29:57 dom0 kernel: audit: type=1104 audit(1713644997.286:460): pid=5550 uid=0 auid=1000 ses=2 msg='op=PAM:setcred grantors=pam_localuser,pam_unix acct="shydonnie" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Apr 20 15:29:57 dom0 systemd-logind[2904]: Session 2 logged out. Waiting for processes to exit. Apr 20 15:29:57 dom0 at-spi2-registryd[5847]: X connection to :0 broken (explicit kill or server shutdown). Apr 20 15:29:57 dom0 audit[6031]: ANOM_ABEND auid=1000 uid=1000 gid=1000 ses=2 pid=6031 comm="xss-lock" exe="/usr/bin/xss-lock" sig=5 res=1 Apr 20 15:29:57 dom0 kernel: traps: xss-lock[6031] trap int3 ip:709cd35f0e71 sp:7ffc56b76c30 error:0 in libglib-2.0.so.0.7400.7[709cd35b0000+93000] Apr 20 15:29:57 dom0 kernel: audit: type=1701 audit(1713644997.293:461): auid=1000 uid=1000 gid=1000 ses=2 pid=6031 comm="xss-lock" exe="/usr/bin/xss-lock" sig=5 res=1 Apr 20 15:29:57 dom0 systemd[5754]: dbus-:1.6-org.a11y.atspi.Registry@0.service: Main process exited, code=exited, status=1/FAILURE Apr 20 15:29:57 dom0 systemd[5754]: dbus-:1.6-org.a11y.atspi.Registry@0.service: Failed with result 'exit-code'. Apr 20 15:29:57 dom0 polkitd[2947]: Unregistered Authentication Agent for unix-session:2 (system bus name :1.64, object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale en_US.utf8) (disconnected from bus) Apr 20 15:29:57 dom0 python3[6307]: The X11 connection broke (error 1). Did the X11 server die? Apr 20 15:29:57 dom0 systemd[1]: Created slice system-systemd\x2dcoredump.slice - Slice /system/systemd-coredump. Apr 20 15:29:57 dom0 audit: BPF prog-id=68 op=LOAD Apr 20 15:29:57 dom0 audit: BPF prog-id=69 op=LOAD Apr 20 15:29:57 dom0 kernel: audit: type=1334 audit(1713644997.305:462): prog-id=68 op=LOAD Apr 20 15:29:57 dom0 kernel: audit: type=1334 audit(1713644997.305:463): prog-id=69 op=LOAD Apr 20 15:29:57 dom0 kernel: audit: type=1334 audit(1713644997.306:464): prog-id=70 op=LOAD Apr 20 15:29:57 dom0 audit: BPF prog-id=70 op=LOAD Apr 20 15:29:57 dom0 systemd[5754]: qubes-app-menu.service: Main process exited, code=exited, status=1/FAILURE Apr 20 15:29:57 dom0 systemd[5754]: qubes-app-menu.service: Failed with result 'exit-code'. Apr 20 15:29:57 dom0 systemd[1]: Started systemd-coredump@0-6719-0.service - Process Core Dump (PID 6719/UID 0). Apr 20 15:29:57 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-coredump@0-6719-0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:29:57 dom0 kernel: audit: type=1130 audit(1713644997.315:465): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-coredump@0-6719-0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:29:57 dom0 qrexec-policy-daemon[3179]: qrexec: qubes.WindowIconUpdater+: sys-usb -> @adminvm: allowed to dom0 Apr 20 15:29:57 dom0 qrexec-policy-daemon[3179]: qrexec: qubes.WindowIconUpdater+: sys-firewall -> @adminvm: allowed to dom0 Apr 20 15:29:57 dom0 qrexec-policy-daemon[3179]: qrexec: qubes.WindowIconUpdater+: sys-whonix -> @adminvm: allowed to dom0 Apr 20 15:29:57 dom0 qrexec-policy-daemon[3179]: qrexec: qubes.WindowIconUpdater+: sys-net -> @adminvm: allowed to dom0 Apr 20 15:29:57 dom0 systemd-coredump[6725]: Process 6031 (xss-lock) of user 1000 dumped core. Module linux-vdso.so.1 with build-id fc30f0b09d2949bc7417dd15adae701fced24144 Module libblkid.so.1 with build-id aeba6db218817bd52da2ff14e8c369d370ba25cf Metadata for module libblkid.so.1 owned by FDO found: { "type" : "rpm", "name" : "util-linux", "version" : "2.38.1-1.fc37", "architecture" : "x86_64", "osCpe" : "cpe:/o:fedoraproject:fedora:37" } Module ld-linux-x86-64.so.2 with build-id 2a137f1a591c7631a2013d7ee69e30d1e098bdf1 Module libXau.so.6 with build-id 5f69b36d838d0ec4967f94dd1ea95fd830262997 Metadata for module libXau.so.6 owned by FDO found: { "type" : "rpm", "name" : "libXau", "version" : "1.0.10-1.fc37", "architecture" : "x86_64", "osCpe" : "cpe:/o:fedoraproject:fedora:37" } Module libpcre2-8.so.0 with build-id 51cf2b0dc0884111cd6107b8b84bc1dc9e896de6 Metadata for module libpcre2-8.so.0 owned by FDO found: { "type" : "rpm", "name" : "pcre2", "version" : "10.40-1.fc37.1", "architecture" : "x86_64", "osCpe" : "cpe:/o:fedoraproject:fedora:37" } Module libffi.so.8 with build-id 56594b436dfdeaf3559f3dd0748c0e476cca46de Metadata for module libffi.so.8 owned by FDO found: { "type" : "rpm", "name" : "libffi", "version" : "3.4.4-1.fc37", "architecture" : "x86_64", "osCpe" : "cpe:/o:fedoraproject:fedora:37" } Module libselinux.so.1 with build-id 642d96d223006627bffcc8d8b48cc93e64e25333 Metadata for module libselinux.so.1 owned by FDO found: { "type" : "rpm", "name" : "libselinux", "version" : "3.5-1.fc37", "architecture" : "x86_64", "osCpe" : "cpe:/o:fedoraproject:fedora:37" } Module libmount.so.1 with build-id cbe744c886c143f7a882cd8f69499753c6f024d6 Metadata for module libmount.so.1 owned by FDO found: { "type" : "rpm", "name" : "util-linux", "version" : "2.38.1-1.fc37", "architecture" : "x86_64", "osCpe" : "cpe:/o:fedoraproject:fedora:37" } Module libz.so.1 with build-id d94299d7572e23295ceaf7674110eb6f2689cd91 Metadata for module libz.so.1 owned by FDO found: { "type" : "rpm", "name" : "zlib", "version" : "1.2.12-5.fc37", "architecture" : "x86_64", "osCpe" : "cpe:/o:fedoraproject:fedora:37" } Module libgmodule-2.0.so.0 with build-id 61ff2329a99e3a88f280bda3f8b660f720069adf Metadata for module libgmodule-2.0.so.0 owned by FDO found: { "type" : "rpm", "name" : "glib2", "version" : "2.74.7-2.fc37", "architecture" : "x86_64", "osCpe" : "cpe:/o:fedoraproject:fedora:37" } Module libc.so.6 with build-id 0dc6d3e329f8bf5e8c1de63c4c9d560fb9953ade Module libxcb-screensaver.so.0 with build-id b1c93afcd2f987310b2295498c558bd237c9e522 Metadata for module libxcb-screensaver.so.0 owned by FDO found: { "type" : "rpm", "name" : "libxcb", "version" : "1.13.1-10.fc37", "architecture" : "x86_64", "osCpe" : "cpe:/o:fedoraproject:fedora:37" } Module libxcb.so.1 with build-id ebd859356a894dd26575ee80f1b1037b50f292a2 Metadata for module libxcb.so.1 owned by FDO found: { "type" : "rpm", "name" : "libxcb", "version" : "1.13.1-10.fc37", "architecture" : "x86_64", "osCpe" : "cpe:/o:fedoraproject:fedora:37" } Module libxcb-util.so.1 with build-id 7d9252ff4ac6cbb6f4237b8722e466b9a47522b4 Metadata for module libxcb-util.so.1 owned by FDO found: { "type" : "rpm", "name" : "xcb-util", "version" : "0.4.0-20.fc37", "architecture" : "x86_64", "osCpe" : "cpe:/o:fedoraproject:fedora:37" } Module libglib-2.0.so.0 with build-id 3f164d599522e5fd8c45f0e9a5198d004cb5d80e Metadata for module libglib-2.0.so.0 owned by FDO found: { "type" : "rpm", "name" : "glib2", "version" : "2.74.7-2.fc37", "architecture" : "x86_64", "osCpe" : "cpe:/o:fedoraproject:fedora:37" } Module libgobject-2.0.so.0 with build-id 4b5daa307a6ee96e34839565dc9091f52d92bb39 Metadata for module libgobject-2.0.so.0 owned by FDO found: { "type" : "rpm", "name" : "glib2", "version" : "2.74.7-2.fc37", "architecture" : "x86_64", "osCpe" : "cpe:/o:fedoraproject:fedora:37" } Module libgio-2.0.so.0 with build-id 94831de1a174bfbc5b685d58df5ac0eb30474068 Metadata for module libgio-2.0.so.0 owned by FDO found: { "type" : "rpm", "name" : "glib2", "version" : "2.74.7-2.fc37", "architecture" : "x86_64", "osCpe" : "cpe:/o:fedoraproject:fedora:37" } Module xss-lock with build-id 7652fad39372ac7602468f608220aabd8847150f Metadata for module xss-lock owned by FDO found: { "type" : "rpm", "name" : "xss-lock", "version" : "0.3.0-18.20140302git.fc37", "architecture" : "x86_64", "osCpe" : "cpe:/o:fedoraproject:fedora:37" } Stack trace of thread 6031: #0 0x0000709cd35f0e71 g_logv (libglib-2.0.so.0 + 0x5ee71) #1 0x0000709cd35f10f3 g_log (libglib-2.0.so.0 + 0x5f0f3) #2 0x000061d5040c84f5 screensaver_event_cb (xss-lock + 0x44f5) #3 0x000061d5040c8d4d xcb_event_dispatch (xss-lock + 0x4d4d) #4 0x0000709cd35e8c7f g_main_context_dispatch (libglib-2.0.so.0 + 0x56c7f) #5 0x0000709cd363f178 g_main_context_iterate.constprop.0 (libglib-2.0.so.0 + 0xad178) #6 0x0000709cd35e824f g_main_loop_run (libglib-2.0.so.0 + 0x5624f) #7 0x000061d5040c7e68 main (xss-lock + 0x3e68) #8 0x0000709cd33a0550 __libc_start_call_main (libc.so.6 + 0x27550) #9 0x0000709cd33a0609 __libc_start_main@@GLIBC_2.34 (libc.so.6 + 0x27609) #10 0x000061d5040c8025 _start (xss-lock + 0x4025) Stack trace of thread 6068: #0 0x0000709cd34782bf __poll (libc.so.6 + 0xff2bf) #1 0x0000709cd363f0ed g_main_context_iterate.constprop.0 (libglib-2.0.so.0 + 0xad0ed) #2 0x0000709cd35e5f00 g_main_context_iteration (libglib-2.0.so.0 + 0x53f00) #3 0x0000709cd35e7b91 glib_worker_main (libglib-2.0.so.0 + 0x55b91) #4 0x0000709cd3617f22 g_thread_proxy (libglib-2.0.so.0 + 0x85f22) #5 0x0000709cd340419d start_thread (libc.so.6 + 0x8b19d) #6 0x0000709cd3485c60 __clone3 (libc.so.6 + 0x10cc60) Stack trace of thread 6070: #0 0x0000709cd34782bf __poll (libc.so.6 + 0xff2bf) #1 0x0000709cd363f0ed g_main_context_iterate.constprop.0 (libglib-2.0.so.0 + 0xad0ed) #2 0x0000709cd35e824f g_main_loop_run (libglib-2.0.so.0 + 0x5624f) #3 0x0000709cd38447da gdbus_shared_thread_func.lto_priv.0 (libgio-2.0.so.0 + 0x1117da) #4 0x0000709cd3617f22 g_thread_proxy (libglib-2.0.so.0 + 0x85f22) #5 0x0000709cd340419d start_thread (libc.so.6 + 0x8b19d) #6 0x0000709cd3485c60 __clone3 (libc.so.6 + 0x10cc60) ELF object binary architecture: AMD x86-64 Apr 20 15:29:57 dom0 systemd[1]: session-2.scope: Deactivated successfully. Apr 20 15:29:57 dom0 kernel: audit: type=1131 audit(1713644997.430:466): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-coredump@0-6719-0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:29:57 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-coredump@0-6719-0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:29:57 dom0 systemd[1]: session-2.scope: Consumed 17.433s CPU time. Apr 20 15:29:57 dom0 systemd-logind[2904]: Removed session 2. Apr 20 15:29:57 dom0 systemd[1]: systemd-coredump@0-6719-0.service: Deactivated successfully. Apr 20 15:29:57 dom0 audit: BPF prog-id=70 op=UNLOAD Apr 20 15:29:57 dom0 audit: BPF prog-id=69 op=UNLOAD Apr 20 15:29:57 dom0 audit: BPF prog-id=68 op=UNLOAD Apr 20 15:29:57 dom0 widget-wrapper[6720]: xhost: unable to open display ":0" Apr 20 15:29:57 dom0 widget-wrapper[6721]: xhost: unable to open display ":0" Apr 20 15:29:57 dom0 systemd[5754]: qubes-widget@qui-domains.service: Consumed 5.323s CPU time. Apr 20 15:29:57 dom0 widget-wrapper[6056]: exiting with 0 Apr 20 15:29:57 dom0 widget-wrapper[6723]: xhost: unable to open display ":0" Apr 20 15:29:57 dom0 widget-wrapper[6724]: xhost: unable to open display ":0" Apr 20 15:29:57 dom0 widget-wrapper[6722]: xhost: unable to open display ":0" Apr 20 15:29:57 dom0 widget-wrapper[6060]: exiting with 0 Apr 20 15:29:57 dom0 widget-wrapper[6054]: exiting with 0 Apr 20 15:29:57 dom0 widget-wrapper[6057]: exiting with 0 Apr 20 15:29:57 dom0 widget-wrapper[6003]: exiting with 0 Apr 20 15:29:58 dom0 audit[6798]: CRED_ACQ pid=6798 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_env,pam_permit acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Apr 20 15:29:58 dom0 lightdm[6798]: pam_unix(lightdm-greeter:session): session opened for user lightdm(uid=993) by (uid=0) Apr 20 15:29:58 dom0 systemd[1]: Created slice user-993.slice - User Slice of UID 993. Apr 20 15:29:58 dom0 systemd[1]: Starting user-runtime-dir@993.service - User Runtime Directory /run/user/993... Apr 20 15:29:58 dom0 systemd-logind[2904]: New session c2 of user lightdm. Apr 20 15:29:58 dom0 systemd[1]: Finished user-runtime-dir@993.service - User Runtime Directory /run/user/993. Apr 20 15:29:58 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@993 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:29:58 dom0 systemd[1]: Starting user@993.service - User Manager for UID 993... Apr 20 15:29:58 dom0 (systemd)[6802]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory Apr 20 15:29:58 dom0 (systemd)[6802]: PAM adding faulty module: /usr/lib64/security/pam_sss.so Apr 20 15:29:58 dom0 (systemd)[6802]: pam_systemd_home(systemd-user:account): systemd-homed is not available: Could not activate remote peer: activation request failed: unknown unit. Apr 20 15:29:58 dom0 audit[6802]: USER_ACCT pid=6802 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_unix acct="lightdm" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:29:58 dom0 audit[6802]: CRED_ACQ pid=6802 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=? acct="lightdm" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 20 15:29:58 dom0 audit[6802]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=8 a1=7fffa447e930 a2=3 a3=7fffa447e645 items=0 ppid=1 pid=6802 auid=993 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4 comm="(systemd)" exe="/usr/lib/systemd/systemd" key=(null) Apr 20 15:29:58 dom0 audit: PROCTITLE proctitle="(systemd)" Apr 20 15:29:58 dom0 (systemd)[6802]: pam_unix(systemd-user:session): session opened for user lightdm(uid=993) by (uid=0) Apr 20 15:29:58 dom0 audit[6802]: USER_START pid=6802 uid=0 auid=993 ses=4 msg='op=PAM:session_open grantors=pam_selinux,pam_selinux,pam_loginuid,pam_namespace,pam_systemd_home,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="lightdm" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:29:58 dom0 systemd[6802]: Queued start job for default target default.target. Apr 20 15:29:58 dom0 systemd[6802]: Created slice app.slice - User Application Slice. Apr 20 15:29:58 dom0 systemd[6802]: grub-boot-success.timer - Mark boot as successful after the user session has run 2 minutes was skipped because of a failed condition check (ConditionUser=!@system). Apr 20 15:29:58 dom0 systemd[6802]: Started systemd-tmpfiles-clean.timer - Daily Cleanup of User's Temporary Directories. Apr 20 15:29:58 dom0 systemd[6802]: Reached target paths.target - Paths. Apr 20 15:29:58 dom0 systemd[6802]: Reached target timers.target - Timers. Apr 20 15:29:58 dom0 systemd[6802]: Starting dbus.socket - D-Bus User Message Bus Socket... Apr 20 15:29:58 dom0 systemd[6802]: Listening on pulseaudio.socket - Sound System. Apr 20 15:29:58 dom0 systemd[6802]: Starting systemd-tmpfiles-setup.service - Create User's Volatile Files and Directories... Apr 20 15:29:58 dom0 systemd[6802]: Finished systemd-tmpfiles-setup.service - Create User's Volatile Files and Directories. Apr 20 15:29:58 dom0 systemd[6802]: Listening on dbus.socket - D-Bus User Message Bus Socket. Apr 20 15:29:58 dom0 systemd[6802]: Reached target sockets.target - Sockets. Apr 20 15:29:58 dom0 systemd[6802]: Reached target basic.target - Basic System. Apr 20 15:29:58 dom0 systemd[6802]: Reached target default.target - Main User Target. Apr 20 15:29:58 dom0 systemd[1]: Started user@993.service - User Manager for UID 993. Apr 20 15:29:58 dom0 systemd[6802]: Startup finished in 102ms. Apr 20 15:29:58 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user@993 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:29:58 dom0 systemd[1]: Started session-c2.scope - Session c2 of User lightdm. Apr 20 15:29:58 dom0 audit[6798]: USER_START pid=6798 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_open grantors=pam_unix,pam_systemd acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Apr 20 15:29:58 dom0 systemd[6802]: Created slice session.slice - User Core Session Slice. Apr 20 15:29:58 dom0 systemd[6802]: Starting dbus-broker.service - D-Bus User Message Bus... Apr 20 15:29:58 dom0 dbus-broker-launch[6831]: Service file '/usr/share/dbus-1/services/dbus-qubes-app-menu.service' is not named after the D-Bus name 'org.qubesos.appmenu'. Apr 20 15:29:58 dom0 dbus-broker-launch[6831]: Service file '/usr/share/dbus-1/services/org.xfce.Thunar.FileManager1.service' is not named after the D-Bus name 'org.freedesktop.FileManager1'. Apr 20 15:29:58 dom0 dbus-broker-launch[6831]: Policy to allow eavesdropping in /usr/share/dbus-1/session.conf +31: Eavesdropping is deprecated and ignored Apr 20 15:29:58 dom0 dbus-broker-launch[6831]: Policy to allow eavesdropping in /usr/share/dbus-1/session.conf +33: Eavesdropping is deprecated and ignored Apr 20 15:29:58 dom0 systemd[6802]: Started dbus-broker.service - D-Bus User Message Bus. Apr 20 15:29:58 dom0 dbus-broker-launch[6831]: Ready Apr 20 15:29:58 dom0 systemd[6802]: Starting at-spi-dbus-bus.service - Accessibility services bus... Apr 20 15:29:58 dom0 systemd[6802]: Started at-spi-dbus-bus.service - Accessibility services bus. Apr 20 15:29:58 dom0 at-spi-bus-launcher[6838]: Policy to allow eavesdropping in /usr/share/defaults/at-spi2/accessibility.conf +15: Eavesdropping is deprecated and ignored Apr 20 15:29:58 dom0 at-spi-bus-launcher[6838]: Policy to allow eavesdropping in /usr/share/defaults/at-spi2/accessibility.conf +17: Eavesdropping is deprecated and ignored Apr 20 15:29:58 dom0 dbus-broker-launch[6838]: Ready Apr 20 15:29:58 dom0 systemd[5754]: qubes-app-menu.service: Scheduled restart job, restart counter is at 1. Apr 20 15:29:58 dom0 systemd[5754]: Stopped qubes-app-menu.service - Qubes Application Menu. Apr 20 15:29:58 dom0 systemd[6802]: Starting gvfs-daemon.service - Virtual filesystem service... Apr 20 15:29:58 dom0 systemd[5754]: Starting qubes-app-menu.service - Qubes Application Menu... Apr 20 15:29:58 dom0 systemd[6802]: Started gvfs-daemon.service - Virtual filesystem service. Apr 20 15:29:58 dom0 systemd[6802]: Created slice app-dbus\x2d:1.4\x2dorg.a11y.atspi.Registry.slice - Slice /app/dbus-:1.4-org.a11y.atspi.Registry. Apr 20 15:29:58 dom0 systemd[6802]: Started dbus-:1.4-org.a11y.atspi.Registry@0.service. Apr 20 15:29:58 dom0 lightdm[6873]: PAM unable to dlopen(/usr/lib64/security/pam_sss.so): /usr/lib64/security/pam_sss.so: cannot open shared object file: No such file or directory Apr 20 15:29:58 dom0 lightdm[6873]: PAM adding faulty module: /usr/lib64/security/pam_sss.so Apr 20 15:29:58 dom0 at-spi2-registryd[6874]: SpiRegistry daemon is running with well-known name - org.a11y.atspi.Registry Apr 20 15:29:58 dom0 qubes-app-menu[6842]: No protocol specified Apr 20 15:29:58 dom0 qubes-app-menu[6842]: No protocol specified Apr 20 15:29:58 dom0 qubes-app-menu[6842]: No protocol specified Apr 20 15:29:58 dom0 systemd[5754]: qubes-app-menu.service: Main process exited, code=exited, status=6/NOTCONFIGURED Apr 20 15:29:58 dom0 systemd[5754]: qubes-app-menu.service: Failed with result 'exit-code'. Apr 20 15:29:58 dom0 systemd[5754]: Failed to start qubes-app-menu.service - Qubes Application Menu. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception. Apr 20 15:30:00 dom0 qubesd[3175]: socket.send() raised exception. Apr 20 15:30:02 dom0 systemd-logind[2904]: Delay lock is active (UID 0/root, PID 2952/libvirtd) but inhibitor timeout is reached. Apr 20 15:30:02 dom0 systemd-logind[2904]: System is rebooting. Apr 20 15:30:02 dom0 systemd[1]: Stopping session-c2.scope - Session c2 of User lightdm... Apr 20 15:30:02 dom0 systemd[1]: Removed slice system-getty.slice - Slice /system/getty. Apr 20 15:30:02 dom0 systemd[1]: Removed slice system-modprobe.slice - Slice /system/modprobe. Apr 20 15:30:02 dom0 systemd[1]: Removed slice system-qubes\x2dinput\x2dsender\x2dkeyboard.slice - Slice /system/qubes-input-sender-keyboard. Apr 20 15:30:02 dom0 systemd[1]: Removed slice system-qubes\x2dinput\x2dsender\x2dkeyboard\x2dmouse.slice - Slice /system/qubes-input-sender-keyboard-mouse. Apr 20 15:30:02 dom0 systemd[1]: Removed slice system-qubes\x2dinput\x2dsender\x2dmouse.slice - Slice /system/qubes-input-sender-mouse. Apr 20 15:30:02 dom0 systemd[1]: Removed slice system-systemd\x2dcoredump.slice - Slice /system/systemd-coredump. Apr 20 15:30:02 dom0 systemd[1]: Stopped target blockdev@dev-mapper-luks\x2d5241442a\x2d6636\x2d45da\x2d8731\x2d66d029364f3d.target - Block Device Preparation for /dev/mapper/luks-5241442a-6636-45da-8731-66d029364f3d. Apr 20 15:30:02 dom0 systemd[1]: Stopped target graphical.target - Graphical Interface. Apr 20 15:30:02 dom0 systemd[1]: Stopped target multi-user.target - Multi-User System. Apr 20 15:30:02 dom0 systemd[1]: Stopped target getty.target - Login Prompts. Apr 20 15:30:02 dom0 systemd[1]: Stopped target network-pre.target - Preparation for Network. Apr 20 15:30:02 dom0 systemd[1]: Stopped target remote-cryptsetup.target - Remote Encrypted Volumes. Apr 20 15:30:02 dom0 systemd[1]: Stopped target timers.target - Timer Units. Apr 20 15:30:02 dom0 systemd[1]: fstrim.timer: Deactivated successfully. Apr 20 15:30:02 dom0 systemd[1]: Stopped fstrim.timer - Discard unused blocks once a week. Apr 20 15:30:02 dom0 systemd[1]: logrotate.timer: Deactivated successfully. Apr 20 15:30:02 dom0 systemd[1]: Stopped logrotate.timer - Daily rotation of log files. Apr 20 15:30:02 dom0 systemd[1]: systemd-tmpfiles-clean.timer: Deactivated successfully. Apr 20 15:30:02 dom0 systemd[1]: Stopped systemd-tmpfiles-clean.timer - Daily Cleanup of Temporary Directories. Apr 20 15:30:02 dom0 systemd[1]: systemd-rfkill.socket: Deactivated successfully. Apr 20 15:30:02 dom0 systemd[1]: Closed systemd-rfkill.socket - Load/Save RF Kill Switch Status /dev/rfkill Watch. Apr 20 15:30:02 dom0 systemd[1]: Stopping accounts-daemon.service - Accounts Service... Apr 20 15:30:02 dom0 lightdm[6798]: pam_unix(lightdm-greeter:session): session closed for user lightdm Apr 20 15:30:02 dom0 systemd[1]: Stopping alsa-state.service - Manage Sound Card State (restore and store)... Apr 20 15:30:02 dom0 audit[6798]: USER_END pid=6798 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_unix,pam_systemd acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Apr 20 15:30:02 dom0 audit[6798]: CRED_DISP pid=6798 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_env,pam_permit acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Apr 20 15:30:02 dom0 systemd[1]: Stopping crond.service - Command Scheduler... Apr 20 15:30:02 dom0 kernel: kauditd_printk_skb: 13 callbacks suppressed Apr 20 15:30:02 dom0 kernel: audit: type=1106 audit(1713645002.391:478): pid=6798 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:session_close grantors=pam_unix,pam_systemd acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Apr 20 15:30:02 dom0 kernel: audit: type=1104 audit(1713645002.392:479): pid=6798 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_env,pam_permit acct="lightdm" exe="/usr/sbin/lightdm" hostname=? addr=? terminal=:0 res=success' Apr 20 15:30:02 dom0 crond[5403]: (CRON) INFO (Shutting down) Apr 20 15:30:02 dom0 systemd[1]: Stopping dracut-shutdown.service - Restore /run/initramfs on shutdown... Apr 20 15:30:02 dom0 systemd[1]: grub2-systemd-integration.service - Grub2 systemctl reboot --boot-loader-menu=... support was skipped because of a failed condition check (ConditionPathExists=/run/systemd/reboot-to-boot-loader-menu). Apr 20 15:30:02 dom0 systemd[1]: Stopping lightdm.service - Light Display Manager... Apr 20 15:30:02 dom0 systemd[1]: Stopping polkit.service - Authorization Manager... Apr 20 15:30:02 dom0 systemd[1]: Stopping qubes-qrexec-policy-daemon.service - Qubes remote exec policy daemon... Apr 20 15:30:02 dom0 systemd[1]: qubes-vm@sys-firewall.service: Deactivated successfully. Apr 20 15:30:02 dom0 audit[2920]: ANOM_ABEND auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2920 comm="alsactl" exe="/usr/sbin/alsactl" sig=11 res=1 Apr 20 15:30:02 dom0 systemd[1]: Stopped qubes-vm@sys-firewall.service - Start Qubes VM sys-firewall. Apr 20 15:30:02 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-vm@sys-firewall comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:30:02 dom0 systemd[1]: qubes-vm@sys-net.service: Deactivated successfully. Apr 20 15:30:02 dom0 systemd[1]: Stopped qubes-vm@sys-net.service - Start Qubes VM sys-net. Apr 20 15:30:02 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-vm@sys-net comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:30:02 dom0 systemd[1]: qubes-vm@sys-whonix.service: Deactivated successfully. Apr 20 15:30:02 dom0 systemd[1]: Stopped qubes-vm@sys-whonix.service - Start Qubes VM sys-whonix. Apr 20 15:30:02 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-vm@sys-whonix comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:30:02 dom0 systemd[1]: Stopping rtkit-daemon.service - RealtimeKit Scheduling Policy Service... Apr 20 15:30:02 dom0 kernel: alsactl[2920]: segfault at 28 ip 00005a8564b3f42a sp 00007fff96bc13d0 error 4 in alsactl[5a8564b3b000+13000] likely on CPU 1 (core 0, socket 0) Apr 20 15:30:02 dom0 kernel: Code: 64 48 2b 04 25 28 00 00 00 75 0e 48 81 c4 18 04 00 00 5b 5d 41 5c 41 5d c3 e8 b2 db ff ff 66 90 41 54 49 89 fc 55 53 48 8b 1f <8b> 53 28 85 d2 7e 1d 31 ed 0f 1f 44 00 00 48 8b 43 20 48 8b 3c e8 Apr 20 15:30:02 dom0 kernel: audit: type=1701 audit(1713645002.396:480): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2920 comm="alsactl" exe="/usr/sbin/alsactl" sig=11 res=1 Apr 20 15:30:02 dom0 kernel: audit: type=1131 audit(1713645002.396:481): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-vm@sys-firewall comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:30:02 dom0 kernel: audit: type=1131 audit(1713645002.396:482): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-vm@sys-net comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:30:02 dom0 kernel: audit: type=1131 audit(1713645002.396:483): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-vm@sys-whonix comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:30:02 dom0 systemd[1]: Stopping serial-getty@hvc0.service - Serial Getty on hvc0... Apr 20 15:30:02 dom0 systemd[1]: systemd-network-generator.service: Deactivated successfully. Apr 20 15:30:02 dom0 systemd[1]: Stopped systemd-network-generator.service - Generate network units from Kernel command line. Apr 20 15:30:02 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:30:02 dom0 kernel: audit: type=1131 audit(1713645002.397:484): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:30:02 dom0 systemd[1]: Stopping systemd-random-seed.service - Load/Save Random Seed... Apr 20 15:30:02 dom0 systemd[1]: Stopping udisks2.service - Disk Manager... Apr 20 15:30:02 dom0 systemd[1]: Stopping upower.service - Daemon for power management... Apr 20 15:30:02 dom0 systemd[1]: Stopping user@1000.service - User Manager for UID 1000... Apr 20 15:30:02 dom0 systemd[1]: xen-init-dom0.service: Deactivated successfully. Apr 20 15:30:02 dom0 systemd[1]: Stopped xen-init-dom0.service - xen-init-dom0, initialise Dom0 configuration (xenstore nodes, JSON configuration stub). Apr 20 15:30:02 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=xen-init-dom0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:30:02 dom0 kernel: audit: type=1131 audit(1713645002.399:485): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=xen-init-dom0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:30:02 dom0 systemd[5754]: Activating special unit exit.target... Apr 20 15:30:02 dom0 systemd[5754]: Removed slice app-dbus\x2d:1.6\x2dorg.a11y.atspi.Registry.slice - Slice /app/dbus-:1.6-org.a11y.atspi.Registry. Apr 20 15:30:02 dom0 systemd[5754]: Removed slice app-qubes\x2dwidget.slice - Slice /app/qubes-widget. Apr 20 15:30:02 dom0 systemd[5754]: app-qubes\x2dwidget.slice: Consumed 6.321s CPU time. Apr 20 15:30:02 dom0 systemd[5754]: Stopped target default.target - Main User Target. Apr 20 15:30:02 dom0 dbus-broker[5839]: Dispatched 1295 messages @ 6(±5)μs / message. Apr 20 15:30:02 dom0 systemd[5754]: Stopping at-spi-dbus-bus.service - Accessibility services bus... Apr 20 15:30:02 dom0 systemd[5754]: Stopping dbus-:1.2-org.xfce.Xfconf@0.service... Apr 20 15:30:02 dom0 systemd[5754]: Stopping gvfs-daemon.service - Virtual filesystem service... Apr 20 15:30:02 dom0 systemd[5754]: Stopping gvfs-metadata.service - Virtual filesystem metadata service... Apr 20 15:30:02 dom0 systemd[5754]: Stopping gvfs-udisks2-volume-monitor.service - Virtual filesystem service - disk device monitor... Apr 20 15:30:02 dom0 udisksd[2906]: udisks daemon version 2.9.4 exiting Apr 20 15:30:02 dom0 systemd[5754]: Stopped dbus-:1.2-org.xfce.Xfconf@0.service. Apr 20 15:30:02 dom0 udisksd[2906]: ** Apr 20 15:30:02 dom0 udisksd[2906]: GLib-GIO:ERROR:../gio/gresource.c:1451:g_static_resource_fini: assertion failed: (g_atomic_int_get (&resource->ref_count) >= 2) Apr 20 15:30:02 dom0 udisksd[2906]: Bail out! GLib-GIO:ERROR:../gio/gresource.c:1451:g_static_resource_fini: assertion failed: (g_atomic_int_get (&resource->ref_count) >= 2) Apr 20 15:30:02 dom0 audit[2906]: ANOM_ABEND auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2906 comm="udisksd" exe="/usr/libexec/udisks2/udisksd" sig=6 res=1 Apr 20 15:30:02 dom0 kernel: audit: type=1701 audit(1713645002.401:486): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=2906 comm="udisksd" exe="/usr/libexec/udisks2/udisksd" sig=6 res=1 Apr 20 15:30:02 dom0 systemd[5754]: gvfs-daemon.service: Killing process 5932 (gdbus) with signal SIGKILL. Apr 20 15:30:02 dom0 systemd[5754]: Stopped gvfs-metadata.service - Virtual filesystem metadata service. Apr 20 15:30:02 dom0 systemd[1]: qubes-qrexec-policy-daemon.service: Deactivated successfully. Apr 20 15:30:02 dom0 systemd[1]: Stopped qubes-qrexec-policy-daemon.service - Qubes remote exec policy daemon. Apr 20 15:30:02 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-qrexec-policy-daemon comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:30:02 dom0 kernel: nvme0n1p2: Can't mount, would change RO state Apr 20 15:30:02 dom0 systemd[1]: polkit.service: Deactivated successfully. Apr 20 15:30:02 dom0 systemd[5754]: Removed slice app-dbus\x2d:1.2\x2dorg.xfce.Xfconf.slice - Slice /app/dbus-:1.2-org.xfce.Xfconf. Apr 20 15:30:02 dom0 systemd[1]: Stopped polkit.service - Authorization Manager. Apr 20 15:30:02 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=polkit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:30:02 dom0 systemd[1]: crond.service: Deactivated successfully. Apr 20 15:30:02 dom0 systemd[1]: Stopped crond.service - Command Scheduler. Apr 20 15:30:02 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=crond comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:30:02 dom0 systemd[1]: accounts-daemon.service: Deactivated successfully. Apr 20 15:30:02 dom0 systemd[1]: Stopped accounts-daemon.service - Accounts Service. Apr 20 15:30:02 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=accounts-daemon comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:30:02 dom0 systemd[1]: serial-getty@hvc0.service: Deactivated successfully. Apr 20 15:30:02 dom0 systemd[1]: Stopped serial-getty@hvc0.service - Serial Getty on hvc0. Apr 20 15:30:02 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=serial-getty@hvc0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:30:02 dom0 systemd[5754]: Stopped gvfs-udisks2-volume-monitor.service - Virtual filesystem service - disk device monitor. Apr 20 15:30:02 dom0 systemd[1]: rtkit-daemon.service: Deactivated successfully. Apr 20 15:30:02 dom0 systemd[1]: Stopped rtkit-daemon.service - RealtimeKit Scheduling Policy Service. Apr 20 15:30:02 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=rtkit-daemon comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:30:02 dom0 systemd[5754]: Stopped gvfs-daemon.service - Virtual filesystem service. Apr 20 15:30:02 dom0 systemd[1]: session-c2.scope: Deactivated successfully. Apr 20 15:30:02 dom0 systemd[1]: Stopped session-c2.scope - Session c2 of User lightdm. Apr 20 15:30:02 dom0 systemd-logind[2904]: Session c2 logged out. Waiting for processes to exit. Apr 20 15:30:02 dom0 systemd[1]: alsa-state.service: Deactivated successfully. Apr 20 15:30:02 dom0 systemd[1]: Stopped alsa-state.service - Manage Sound Card State (restore and store). Apr 20 15:30:02 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=alsa-state comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:30:02 dom0 systemd[1]: Removed slice system-serial\x2dgetty.slice - Slice /system/serial-getty. Apr 20 15:30:02 dom0 systemd[1]: plymouth-quit-wait.service: Deactivated successfully. Apr 20 15:30:02 dom0 systemd[1]: Stopped plymouth-quit-wait.service - Hold until boot process finishes up. Apr 20 15:30:02 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=plymouth-quit-wait comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:30:02 dom0 systemd[1]: Stopping user@993.service - User Manager for UID 993... Apr 20 15:30:02 dom0 systemd-logind[2904]: Removed session c2. Apr 20 15:30:02 dom0 systemd[6802]: Activating special unit exit.target... Apr 20 15:30:02 dom0 systemd[6802]: Stopped target default.target - Main User Target. Apr 20 15:30:02 dom0 dbus-broker[6839]: Dispatched 22 messages @ 9(±12)μs / message. Apr 20 15:30:02 dom0 systemd[6802]: Stopping at-spi-dbus-bus.service - Accessibility services bus... Apr 20 15:30:02 dom0 systemd[6802]: Stopping dbus-:1.4-org.a11y.atspi.Registry@0.service... Apr 20 15:30:02 dom0 systemd[6802]: Stopping gvfs-daemon.service - Virtual filesystem service... Apr 20 15:30:02 dom0 systemd[6802]: Stopped dbus-:1.4-org.a11y.atspi.Registry@0.service. Apr 20 15:30:02 dom0 systemd[6802]: Stopped gvfs-daemon.service - Virtual filesystem service. Apr 20 15:30:02 dom0 systemd[6802]: Removed slice app-dbus\x2d:1.4\x2dorg.a11y.atspi.Registry.slice - Slice /app/dbus-:1.4-org.a11y.atspi.Registry. Apr 20 15:30:02 dom0 systemd[1]: udisks2.service: Main process exited, code=dumped, status=6/ABRT Apr 20 15:30:02 dom0 systemd[1]: udisks2.service: Failed with result 'core-dump'. Apr 20 15:30:02 dom0 systemd[1]: Stopped udisks2.service - Disk Manager. Apr 20 15:30:02 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=udisks2 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 20 15:30:02 dom0 systemd[6802]: Stopped at-spi-dbus-bus.service - Accessibility services bus. Apr 20 15:30:02 dom0 systemd[6802]: Stopped target basic.target - Basic System. Apr 20 15:30:02 dom0 systemd[6802]: Stopped target paths.target - Paths. Apr 20 15:30:02 dom0 systemd[6802]: Stopped target sockets.target - Sockets. Apr 20 15:30:02 dom0 systemd[6802]: Stopped target timers.target - Timers. Apr 20 15:30:02 dom0 systemd[6802]: Stopped systemd-tmpfiles-clean.timer - Daily Cleanup of User's Temporary Directories. Apr 20 15:30:02 dom0 systemd[6802]: Closed pulseaudio.socket - Sound System. Apr 20 15:30:02 dom0 dbus-broker[6832]: Dispatched 258 messages @ 3(±4)μs / message. Apr 20 15:30:02 dom0 systemd[6802]: Stopping dbus-broker.service - D-Bus User Message Bus... Apr 20 15:30:02 dom0 systemd[6802]: Stopped systemd-tmpfiles-setup.service - Create User's Volatile Files and Directories. Apr 20 15:30:02 dom0 systemd[6802]: Stopped dbus-broker.service - D-Bus User Message Bus. Apr 20 15:30:02 dom0 systemd[6802]: Removed slice session.slice - User Core Session Slice. Apr 20 15:30:02 dom0 systemd[1]: systemd-random-seed.service: Deactivated successfully. Apr 20 15:30:02 dom0 systemd[6802]: Closed dbus.socket - D-Bus User Message Bus Socket. Apr 20 15:30:02 dom0 systemd[1]: Stopped systemd-random-seed.service - Load/Save Random Seed. Apr 20 15:30:02 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:30:02 dom0 systemd[6802]: Removed slice app.slice - User Application Slice. Apr 20 15:30:02 dom0 systemd[6802]: Reached target shutdown.target - Shutdown. Apr 20 15:30:02 dom0 systemd[6802]: Finished systemd-exit.service - Exit the Session. Apr 20 15:30:02 dom0 systemd[6802]: Reached target exit.target - Exit the Session. Apr 20 15:30:02 dom0 systemd[1]: user@993.service: Deactivated successfully. Apr 20 15:30:02 dom0 systemd[1]: Stopped user@993.service - User Manager for UID 993. Apr 20 15:30:02 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user@993 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:30:02 dom0 systemd[1]: Stopping user-runtime-dir@993.service - User Runtime Directory /run/user/993... Apr 20 15:30:02 dom0 systemd[1]: upower.service: Deactivated successfully. Apr 20 15:30:02 dom0 systemd[1]: Stopped upower.service - Daemon for power management. Apr 20 15:30:02 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=upower comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:30:02 dom0 systemd[1]: run-user-993.mount: Deactivated successfully. Apr 20 15:30:02 dom0 systemd[1]: Unmounted run-user-993.mount - /run/user/993. Apr 20 15:30:02 dom0 audit: BPF prog-id=64 op=UNLOAD Apr 20 15:30:02 dom0 systemd[1]: user-runtime-dir@993.service: Deactivated successfully. Apr 20 15:30:02 dom0 systemd[1]: Stopped user-runtime-dir@993.service - User Runtime Directory /run/user/993. Apr 20 15:30:02 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@993 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:30:02 dom0 systemd[1]: Removed slice user-993.slice - User Slice of UID 993. Apr 20 15:30:02 dom0 systemd[1]: user-993.slice: Consumed 1.083s CPU time. Apr 20 15:30:02 dom0 systemd[5754]: Stopped at-spi-dbus-bus.service - Accessibility services bus. Apr 20 15:30:02 dom0 systemd[5754]: Stopped target basic.target - Basic System. Apr 20 15:30:02 dom0 systemd[5754]: Stopped target paths.target - Paths. Apr 20 15:30:02 dom0 systemd[5754]: Stopped target sockets.target - Sockets. Apr 20 15:30:02 dom0 systemd[5754]: Stopped target timers.target - Timers. Apr 20 15:30:02 dom0 systemd[5754]: Stopped grub-boot-success.timer - Mark boot as successful after the user session has run 2 minutes. Apr 20 15:30:02 dom0 systemd[5754]: Stopped systemd-tmpfiles-clean.timer - Daily Cleanup of User's Temporary Directories. Apr 20 15:30:02 dom0 systemd[5754]: Closed pulseaudio.socket - Sound System. Apr 20 15:30:02 dom0 dbus-broker[5801]: Dispatched 2349 messages @ 7(±13)μs / message. Apr 20 15:30:02 dom0 systemd[5754]: Stopping dbus-broker.service - D-Bus User Message Bus... Apr 20 15:30:02 dom0 systemd[5754]: Stopped systemd-tmpfiles-setup.service - Create User's Volatile Files and Directories. Apr 20 15:30:02 dom0 systemd[5754]: Stopped dbus-broker.service - D-Bus User Message Bus. Apr 20 15:30:02 dom0 systemd[5754]: Removed slice session.slice - User Core Session Slice. Apr 20 15:30:02 dom0 systemd[5754]: Closed dbus.socket - D-Bus User Message Bus Socket. Apr 20 15:30:02 dom0 systemd[5754]: Removed slice app.slice - User Application Slice. Apr 20 15:30:02 dom0 systemd[5754]: app.slice: Consumed 8.054s CPU time. Apr 20 15:30:02 dom0 systemd[5754]: Reached target shutdown.target - Shutdown. Apr 20 15:30:02 dom0 systemd[5754]: Finished systemd-exit.service - Exit the Session. Apr 20 15:30:02 dom0 systemd[5754]: Reached target exit.target - Exit the Session. Apr 20 15:30:02 dom0 systemd[1]: user@1000.service: Deactivated successfully. Apr 20 15:30:02 dom0 systemd[1]: Stopped user@1000.service - User Manager for UID 1000. Apr 20 15:30:02 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user@1000 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:30:02 dom0 systemd[1]: user@1000.service: Consumed 8.600s CPU time. Apr 20 15:30:02 dom0 systemd[1]: Stopping user-runtime-dir@1000.service - User Runtime Directory /run/user/1000... Apr 20 15:30:02 dom0 systemd[1]: lightdm.service: Deactivated successfully. Apr 20 15:30:02 dom0 systemd[1]: Stopped lightdm.service - Light Display Manager. Apr 20 15:30:02 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=lightdm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:30:02 dom0 systemd[1]: lightdm.service: Consumed 15.025s CPU time. Apr 20 15:30:02 dom0 systemd[1]: Starting plymouth-reboot.service - Show Plymouth Reboot Screen... Apr 20 15:30:02 dom0 systemd[1]: run-user-1000.mount: Deactivated successfully. Apr 20 15:30:02 dom0 systemd[1]: Unmounted run-user-1000.mount - /run/user/1000. Apr 20 15:30:02 dom0 systemd[1]: Received SIGRTMIN+20 from PID 6937 (plymouthd). Apr 20 15:30:02 dom0 systemd[1]: user-runtime-dir@1000.service: Deactivated successfully. Apr 20 15:30:02 dom0 systemd[1]: Stopped user-runtime-dir@1000.service - User Runtime Directory /run/user/1000. Apr 20 15:30:02 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@1000 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:30:02 dom0 systemd[1]: Removed slice user-1000.slice - User Slice of UID 1000. Apr 20 15:30:02 dom0 systemd[1]: user-1000.slice: Consumed 26.051s CPU time. Apr 20 15:30:02 dom0 systemd[1]: Stopping systemd-user-sessions.service - Permit User Sessions... Apr 20 15:30:02 dom0 systemd[1]: systemd-user-sessions.service: Deactivated successfully. Apr 20 15:30:02 dom0 systemd[1]: Stopped systemd-user-sessions.service - Permit User Sessions. Apr 20 15:30:02 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-user-sessions comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:30:02 dom0 systemd[1]: qubes-vm@sys-usb.service: Deactivated successfully. Apr 20 15:30:02 dom0 systemd[1]: Stopped qubes-vm@sys-usb.service - Start Qubes VM sys-usb. Apr 20 15:30:02 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-vm@sys-usb comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:30:02 dom0 systemd[1]: Removed slice system-qubes\x2dvm.slice - Slice /system/qubes-vm. Apr 20 15:30:02 dom0 systemd[1]: Stopping qubes-meminfo-writer-dom0.service - Qubes memory information reporter... Apr 20 15:30:02 dom0 systemd[1]: qubes-meminfo-writer-dom0.service: Deactivated successfully. Apr 20 15:30:02 dom0 systemd[1]: Stopped qubes-meminfo-writer-dom0.service - Qubes memory information reporter. Apr 20 15:30:02 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-meminfo-writer-dom0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:30:02 dom0 systemd[1]: Stopping qubes-core.service - Qubes Dom0 startup setup... Apr 20 15:30:02 dom0 systemd[1]: Started plymouth-reboot.service - Show Plymouth Reboot Screen. Apr 20 15:30:02 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=plymouth-reboot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:30:02 dom0 qubesd[3175]: socket.send() raised exception. Apr 20 15:30:02 dom0 qubesd[3175]: socket.send() raised exception. Apr 20 15:30:02 dom0 qubesd[3175]: socket.send() raised exception. Apr 20 15:30:02 dom0 qubesd[3175]: socket.send() raised exception. Apr 20 15:30:02 dom0 qubesd[3175]: socket.send() raised exception. Apr 20 15:30:02 dom0 qubesd[3175]: socket.send() raised exception. Apr 20 15:30:02 dom0 qubesd[3175]: socket.send() raised exception. Apr 20 15:30:03 dom0 systemd[1]: dracut-shutdown.service: Deactivated successfully. Apr 20 15:30:03 dom0 systemd[1]: Stopped dracut-shutdown.service - Restore /run/initramfs on shutdown. Apr 20 15:30:03 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dracut-shutdown comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:30:03 dom0 systemd[1]: dracut-shutdown.service: Consumed 1.087s CPU time. Apr 20 15:30:03 dom0 systemd[1]: Starting plymouth-switch-root-initramfs.service - Tell Plymouth To Jump To initramfs... Apr 20 15:30:03 dom0 systemd[1]: Finished plymouth-switch-root-initramfs.service - Tell Plymouth To Jump To initramfs. Apr 20 15:30:03 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=plymouth-switch-root-initramfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:30:06 dom0 libvirtd[2952]: internal error: Unable to reset PCI device 0000:00:14.0: no FLR, PM reset or bus reset available Apr 20 15:30:06 dom0 lvm[2499]: No longer monitoring thin pool qubes_dom0-vm--pool-tpool. Apr 20 15:30:06 dom0 lvm[2499]: Monitoring thin pool qubes_dom0-vm--pool-tpool. Apr 20 15:30:07 dom0 lvm[2499]: No longer monitoring thin pool qubes_dom0-vm--pool-tpool. Apr 20 15:30:07 dom0 lvm[2499]: Monitoring thin pool qubes_dom0-vm--pool-tpool. Apr 20 15:30:07 dom0 lvm[2499]: No longer monitoring thin pool qubes_dom0-vm--pool-tpool. Apr 20 15:30:07 dom0 lvm[2499]: Monitoring thin pool qubes_dom0-vm--pool-tpool. Apr 20 15:30:07 dom0 lvm[2499]: No longer monitoring thin pool qubes_dom0-vm--pool-tpool. Apr 20 15:30:07 dom0 lvm[2499]: Monitoring thin pool qubes_dom0-vm--pool-tpool. Apr 20 15:30:08 dom0 qubesdb-daemon[2889]: terminating Apr 20 15:30:08 dom0 systemd[1]: qubes-db-dom0.service: Deactivated successfully. Apr 20 15:30:08 dom0 systemd[1]: Stopped qubes-db-dom0.service - Qubes DB agent. Apr 20 15:30:08 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-db-dom0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:30:08 dom0 kernel: kauditd_printk_skb: 23 callbacks suppressed Apr 20 15:30:08 dom0 kernel: audit: type=1131 audit(1713645008.357:510): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-db-dom0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:30:08 dom0 systemd[1]: qubes-core.service: Deactivated successfully. Apr 20 15:30:08 dom0 systemd[1]: Stopped qubes-core.service - Qubes Dom0 startup setup. Apr 20 15:30:08 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-core comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:30:08 dom0 systemd[1]: Stopping libvirtd.service - Virtualization daemon... Apr 20 15:30:08 dom0 systemd[1]: Stopping qubes-qmemman.service - Qubes memory management daemon... Apr 20 15:30:08 dom0 kernel: audit: type=1131 audit(1713645008.359:511): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-core comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:30:08 dom0 systemd[1]: Stopping qubesd.service - Qubes OS daemon... Apr 20 15:30:08 dom0 systemd[1]: Stopping xenconsoled.service - Xenconsoled - handles logging from guest consoles and hypervisor... Apr 20 15:30:08 dom0 qubesd[3175]: caught SIGTERM, exiting Apr 20 15:30:08 dom0 systemd[1]: xenconsoled.service: Deactivated successfully. Apr 20 15:30:08 dom0 systemd[1]: Stopped xenconsoled.service - Xenconsoled - handles logging from guest consoles and hypervisor. Apr 20 15:30:08 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=xenconsoled comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:30:08 dom0 kernel: audit: type=1131 audit(1713645008.361:512): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=xenconsoled comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:30:08 dom0 systemd[1]: qubes-qmemman.service: Deactivated successfully. Apr 20 15:30:08 dom0 systemd[1]: Stopped qubes-qmemman.service - Qubes memory management daemon. Apr 20 15:30:08 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-qmemman comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:30:08 dom0 kernel: audit: type=1131 audit(1713645008.365:513): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubes-qmemman comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:30:08 dom0 systemd[1]: libvirtd.service: Deactivated successfully. Apr 20 15:30:08 dom0 systemd[1]: Stopped libvirtd.service - Virtualization daemon. Apr 20 15:30:08 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=libvirtd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:30:08 dom0 systemd[1]: libvirtd.service: Consumed 5.690s CPU time. Apr 20 15:30:08 dom0 systemd[1]: Stopped target remote-fs.target - Remote File Systems. Apr 20 15:30:08 dom0 systemd[1]: Stopping systemd-logind.service - User Login Management... Apr 20 15:30:08 dom0 systemd[1]: Stopping xenstored.service - The Xen xenstore... Apr 20 15:30:08 dom0 kernel: audit: type=1131 audit(1713645008.368:514): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=libvirtd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:30:08 dom0 systemd[1]: xenstored.service: Deactivated successfully. Apr 20 15:30:08 dom0 systemd[1]: Stopped xenstored.service - The Xen xenstore. Apr 20 15:30:08 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=xenstored comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:30:08 dom0 kernel: audit: type=1131 audit(1713645008.369:515): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=xenstored comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:30:08 dom0 systemd[1]: qubesd.service: Deactivated successfully. Apr 20 15:30:08 dom0 systemd[1]: Stopped qubesd.service - Qubes OS daemon. Apr 20 15:30:08 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubesd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:30:08 dom0 systemd[1]: qubesd.service: Consumed 11.721s CPU time. Apr 20 15:30:08 dom0 kernel: audit: type=1131 audit(1713645008.394:516): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=qubesd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:30:08 dom0 systemd[1]: Stopping lvm2-pvscan@253:0.service - LVM event activation on device 253:0... Apr 20 15:30:08 dom0 lvm[7729]: pvscan[7729] PV /dev/mapper/luks-5241442a-6636-45da-8731-66d029364f3d online. Apr 20 15:30:08 dom0 systemd[1]: systemd-logind.service: Deactivated successfully. Apr 20 15:30:08 dom0 systemd[1]: Stopped systemd-logind.service - User Login Management. Apr 20 15:30:08 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-logind comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:30:08 dom0 systemd[1]: Stopped target basic.target - Basic System. Apr 20 15:30:08 dom0 systemd[1]: systemd-ask-password-plymouth.path: Deactivated successfully. Apr 20 15:30:08 dom0 kernel: audit: type=1131 audit(1713645008.457:517): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-logind comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:30:08 dom0 systemd[1]: Stopped systemd-ask-password-plymouth.path - Forward Password Requests to Plymouth Directory Watch. Apr 20 15:30:08 dom0 systemd[1]: Stopped target nss-user-lookup.target - User and Group Name Lookups. Apr 20 15:30:08 dom0 systemd[1]: Stopped target paths.target - Path Units. Apr 20 15:30:08 dom0 systemd[1]: Stopped target slices.target - Slice Units. Apr 20 15:30:08 dom0 systemd[1]: Removed slice user.slice - User and Session Slice. Apr 20 15:30:08 dom0 systemd[1]: user.slice: Consumed 28.808s CPU time. Apr 20 15:30:08 dom0 systemd[1]: Stopped target sockets.target - Socket Units. Apr 20 15:30:08 dom0 systemd[1]: libvirtd-admin.socket: Deactivated successfully. Apr 20 15:30:08 dom0 systemd[1]: Closed libvirtd-admin.socket - Libvirt admin socket. Apr 20 15:30:08 dom0 systemd[1]: libvirtd-ro.socket: Deactivated successfully. Apr 20 15:30:08 dom0 systemd[1]: Closed libvirtd-ro.socket - Libvirt local read-only socket. Apr 20 15:30:08 dom0 systemd[1]: libvirtd.socket: Deactivated successfully. Apr 20 15:30:08 dom0 systemd[1]: Closed libvirtd.socket - Libvirt local socket. Apr 20 15:30:08 dom0 systemd[1]: virtlockd.socket: Deactivated successfully. Apr 20 15:30:08 dom0 systemd[1]: Closed virtlockd.socket - Virtual machine lock manager socket. Apr 20 15:30:08 dom0 systemd[1]: virtlogd.socket: Deactivated successfully. Apr 20 15:30:08 dom0 systemd[1]: Closed virtlogd.socket - Virtual machine log manager socket. Apr 20 15:30:08 dom0 dbus-broker[2880]: Dispatched 7097 messages @ 3(±4)μs / message. Apr 20 15:30:08 dom0 systemd[1]: Stopping dbus-broker.service - D-Bus System Message Bus... Apr 20 15:30:08 dom0 audit: BPF prog-id=59 op=UNLOAD Apr 20 15:30:08 dom0 kernel: audit: type=1334 audit(1713645008.466:518): prog-id=59 op=UNLOAD Apr 20 15:30:08 dom0 systemd[1]: dbus-broker.service: Deactivated successfully. Apr 20 15:30:08 dom0 systemd[1]: Stopped dbus-broker.service - D-Bus System Message Bus. Apr 20 15:30:08 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dbus-broker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:30:08 dom0 kernel: audit: type=1131 audit(1713645008.471:519): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dbus-broker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:30:08 dom0 systemd[1]: dbus.socket: Deactivated successfully. Apr 20 15:30:08 dom0 systemd[1]: Closed dbus.socket - D-Bus System Message Bus Socket. Apr 20 15:30:08 dom0 systemd[1]: Stopped target sysinit.target - System Initialization. Apr 20 15:30:08 dom0 systemd[1]: proc-sys-fs-binfmt_misc.automount: Deactivated successfully. Apr 20 15:30:08 dom0 systemd[1]: Unset automount proc-sys-fs-binfmt_misc.automount - Arbitrary Executable File Formats File System Automount Point. Apr 20 15:30:08 dom0 systemd[1]: Stopped target cryptsetup.target - Local Encrypted Volumes. Apr 20 15:30:08 dom0 systemd[1]: systemd-ask-password-wall.path: Deactivated successfully. Apr 20 15:30:08 dom0 systemd[1]: Stopped systemd-ask-password-wall.path - Forward Password Requests to Wall Directory Watch. Apr 20 15:30:08 dom0 systemd[1]: Stopped target integritysetup.target - Local Integrity Protected Volumes. Apr 20 15:30:08 dom0 systemd[1]: Stopped target veritysetup.target - Local Verity Protected Volumes. Apr 20 15:30:08 dom0 audit: BPF prog-id=55 op=UNLOAD Apr 20 15:30:08 dom0 systemd[1]: Stopping systemd-cryptsetup@luks\x2d5241442a\x2d6636\x2d45da\x2d8731\x2d66d029364f3d.service - Cryptography Setup for luks-5241442a-6636-45da-8731-66d029364f3d... Apr 20 15:30:08 dom0 systemd[1]: systemd-sysctl.service: Deactivated successfully. Apr 20 15:30:08 dom0 systemd[1]: Stopped systemd-sysctl.service - Apply Kernel Variables. Apr 20 15:30:08 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:30:08 dom0 systemd[1]: systemd-coredump.socket: Deactivated successfully. Apr 20 15:30:08 dom0 systemd[1]: Closed systemd-coredump.socket - Process Core Dump Socket. Apr 20 15:30:08 dom0 systemd[1]: systemd-modules-load.service: Deactivated successfully. Apr 20 15:30:08 dom0 systemd[1]: Stopped systemd-modules-load.service - Load Kernel Modules. Apr 20 15:30:08 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:30:08 dom0 systemd[1]: Stopping systemd-update-utmp.service - Record System Boot/Shutdown in UTMP... Apr 20 15:30:08 dom0 systemd[1]: lvm2-pvscan@253:0.service: Deactivated successfully. Apr 20 15:30:08 dom0 systemd[1]: Stopped lvm2-pvscan@253:0.service - LVM event activation on device 253:0. Apr 20 15:30:08 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=lvm2-pvscan@253:0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:30:08 dom0 systemd[1]: Removed slice system-lvm2\x2dpvscan.slice - Slice /system/lvm2-pvscan. Apr 20 15:30:08 dom0 audit[7739]: SYSTEM_SHUTDOWN pid=7739 uid=0 auid=4294967295 ses=4294967295 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Apr 20 15:30:08 dom0 systemd-cryptsetup[7736]: Device luks-5241442a-6636-45da-8731-66d029364f3d is still in use. Apr 20 15:30:08 dom0 systemd-cryptsetup[7736]: Failed to deactivate: Device or resource busy Apr 20 15:30:08 dom0 systemd[1]: systemd-update-utmp.service: Deactivated successfully. Apr 20 15:30:08 dom0 systemd[1]: Stopped systemd-update-utmp.service - Record System Boot/Shutdown in UTMP. Apr 20 15:30:08 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:30:08 dom0 systemd[1]: systemd-cryptsetup@luks\x2d5241442a\x2d6636\x2d45da\x2d8731\x2d66d029364f3d.service: Control process exited, code=exited, status=1/FAILURE Apr 20 15:30:08 dom0 systemd[1]: systemd-cryptsetup@luks\x2d5241442a\x2d6636\x2d45da\x2d8731\x2d66d029364f3d.service: Failed with result 'exit-code'. Apr 20 15:30:08 dom0 systemd[1]: Stopped systemd-cryptsetup@luks\x2d5241442a\x2d6636\x2d45da\x2d8731\x2d66d029364f3d.service - Cryptography Setup for luks-5241442a-6636-45da-8731-66d029364f3d. Apr 20 15:30:08 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-cryptsetup@luks\x2d5241442a\x2d6636\x2d45da\x2d8731\x2d66d029364f3d comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 20 15:30:08 dom0 systemd[1]: systemd-tmpfiles-setup.service: Deactivated successfully. Apr 20 15:30:08 dom0 systemd[1]: Stopped systemd-tmpfiles-setup.service - Create Volatile Files and Directories. Apr 20 15:30:08 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:30:08 dom0 systemd[1]: Stopped target local-fs.target - Local File Systems. Apr 20 15:30:08 dom0 systemd[1]: Unmounting boot-efi.mount - /boot/efi... Apr 20 15:30:08 dom0 systemd[1]: Unmounting tmp.mount - Temporary Directory /tmp... Apr 20 15:30:08 dom0 systemd[1]: boot-efi.mount: Deactivated successfully. Apr 20 15:30:08 dom0 systemd[1]: Unmounted boot-efi.mount - /boot/efi. Apr 20 15:30:08 dom0 systemd[1]: tmp.mount: Deactivated successfully. Apr 20 15:30:08 dom0 systemd[1]: Unmounted tmp.mount - Temporary Directory /tmp. Apr 20 15:30:08 dom0 systemd[1]: Stopped target swap.target - Swaps. Apr 20 15:30:08 dom0 systemd[1]: Deactivating swap dev-disk-by\x2did-dm\x2dname\x2dqubes_dom0\x2dswap.swap - /dev/disk/by-id/dm-name-qubes_dom0-swap... Apr 20 15:30:08 dom0 systemd[1]: Unmounting boot.mount - /boot... Apr 20 15:30:08 dom0 systemd[1]: systemd-fsck@dev-disk-by\x2duuid-66AB\x2d8D71.service: Deactivated successfully. Apr 20 15:30:08 dom0 systemd[1]: Stopped systemd-fsck@dev-disk-by\x2duuid-66AB\x2d8D71.service - File System Check on /dev/disk/by-uuid/66AB-8D71. Apr 20 15:30:08 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-fsck@dev-disk-by\x2duuid-66AB\x2d8D71 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:30:08 dom0 kernel: EXT4-fs (nvme0n1p2): unmounting filesystem. Apr 20 15:30:08 dom0 systemd[1]: dev-disk-by\x2did-dm\x2dname\x2dqubes_dom0\x2dswap.swap: Deactivated successfully. Apr 20 15:30:08 dom0 systemd[1]: Deactivated swap dev-disk-by\x2did-dm\x2dname\x2dqubes_dom0\x2dswap.swap - /dev/disk/by-id/dm-name-qubes_dom0-swap. Apr 20 15:30:08 dom0 systemd[1]: dev-qubes_dom0-swap.swap: Deactivated successfully. Apr 20 15:30:08 dom0 systemd[1]: Deactivated swap dev-qubes_dom0-swap.swap - /dev/qubes_dom0/swap. Apr 20 15:30:08 dom0 systemd[1]: dev-disk-by\x2did-dm\x2duuid\x2dLVM\x2dcpu9iL97JGkCCuABawzxZRJ3Lz141uXqemkpozTcRawb1d7G2getTUSGk4FPCLOL.swap: Deactivated successfully. Apr 20 15:30:08 dom0 systemd[1]: Deactivated swap dev-disk-by\x2did-dm\x2duuid\x2dLVM\x2dcpu9iL97JGkCCuABawzxZRJ3Lz141uXqemkpozTcRawb1d7G2getTUSGk4FPCLOL.swap - /dev/disk/by-id/dm-uuid-LVM-cpu9iL97JGkCCuABawzxZRJ3Lz141uXqemkpozTcRawb1d7G2getTUSGk4FPCLOL. Apr 20 15:30:08 dom0 systemd[1]: dev-disk-by\x2duuid-36798814\x2d87d1\x2d4852\x2d9728\x2df4876e1aa677.swap: Deactivated successfully. Apr 20 15:30:08 dom0 systemd[1]: Deactivated swap dev-disk-by\x2duuid-36798814\x2d87d1\x2d4852\x2d9728\x2df4876e1aa677.swap - /dev/disk/by-uuid/36798814-87d1-4852-9728-f4876e1aa677. Apr 20 15:30:08 dom0 systemd[1]: dev-dm\x2d5.swap: Deactivated successfully. Apr 20 15:30:08 dom0 systemd[1]: Deactivated swap dev-dm\x2d5.swap - /dev/dm-5. Apr 20 15:30:08 dom0 systemd[1]: dev-mapper-qubes_dom0\x2dswap.swap: Deactivated successfully. Apr 20 15:30:08 dom0 systemd[1]: Deactivated swap dev-mapper-qubes_dom0\x2dswap.swap - /dev/mapper/qubes_dom0-swap. Apr 20 15:30:08 dom0 systemd[1]: boot.mount: Deactivated successfully. Apr 20 15:30:08 dom0 systemd[1]: Unmounted boot.mount - /boot. Apr 20 15:30:08 dom0 systemd[1]: Reached target umount.target - Unmount All Filesystems. Apr 20 15:30:08 dom0 systemd[1]: systemd-fsck@dev-disk-by\x2duuid-a8d2f5a4\x2dd25d\x2d45fb\x2da847\x2dc2a89a3d2037.service: Deactivated successfully. Apr 20 15:30:08 dom0 systemd[1]: Stopped systemd-fsck@dev-disk-by\x2duuid-a8d2f5a4\x2dd25d\x2d45fb\x2da847\x2dc2a89a3d2037.service - File System Check on /dev/disk/by-uuid/a8d2f5a4-d25d-45fb-a847-c2a89a3d2037. Apr 20 15:30:08 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-fsck@dev-disk-by\x2duuid-a8d2f5a4\x2dd25d\x2d45fb\x2da847\x2dc2a89a3d2037 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:30:08 dom0 systemd[1]: Removed slice system-systemd\x2dfsck.slice - Slice /system/systemd-fsck. Apr 20 15:30:08 dom0 systemd[1]: Stopped target local-fs-pre.target - Preparation for Local File Systems. Apr 20 15:30:08 dom0 systemd[1]: Stopping lvm2-monitor.service - Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling... Apr 20 15:30:08 dom0 systemd[1]: systemd-remount-fs.service: Deactivated successfully. Apr 20 15:30:08 dom0 systemd[1]: Stopped systemd-remount-fs.service - Remount Root and Kernel File Systems. Apr 20 15:30:08 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:30:08 dom0 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Apr 20 15:30:08 dom0 systemd[1]: Stopped systemd-fsck-root.service - File System Check on Root Device. Apr 20 15:30:08 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:30:08 dom0 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Apr 20 15:30:08 dom0 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev. Apr 20 15:30:08 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:30:08 dom0 lvm[2499]: No longer monitoring thin pool qubes_dom0-root--pool-tpool. Apr 20 15:30:08 dom0 dmeventd[2499]: No longer monitoring thin pool qubes_dom0-vm--pool-tpool. Apr 20 15:30:08 dom0 lvm[7746]: 53 logical volume(s) in volume group "qubes_dom0" unmonitored Apr 20 15:30:08 dom0 systemd[1]: lvm2-monitor.service: Deactivated successfully. Apr 20 15:30:08 dom0 systemd[1]: Stopped lvm2-monitor.service - Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling. Apr 20 15:30:08 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=lvm2-monitor comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:30:08 dom0 dmeventd[2499]: dmeventd detected break while being idle for 0 second(s), exiting. Apr 20 15:30:08 dom0 dmeventd[2499]: dmeventd shutting down. Apr 20 15:30:08 dom0 systemd[1]: Stopping dm-event.service - Device-mapper event daemon... Apr 20 15:30:08 dom0 systemd[1]: dm-event.service: Deactivated successfully. Apr 20 15:30:08 dom0 systemd[1]: Stopped dm-event.service - Device-mapper event daemon. Apr 20 15:30:08 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=dm-event comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:30:08 dom0 systemd[1]: Reached target shutdown.target - System Shutdown. Apr 20 15:30:08 dom0 systemd[1]: Reached target final.target - Late Shutdown Services. Apr 20 15:30:08 dom0 systemd[1]: systemd-reboot.service: Deactivated successfully. Apr 20 15:30:08 dom0 systemd[1]: Finished systemd-reboot.service - System Reboot. Apr 20 15:30:08 dom0 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-reboot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:30:08 dom0 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-reboot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 20 15:30:08 dom0 systemd[1]: Reached target reboot.target - System Reboot. Apr 20 15:30:08 dom0 systemd[1]: Shutting down. Apr 20 15:30:08 dom0 audit: BPF prog-id=54 op=UNLOAD Apr 20 15:30:08 dom0 audit: BPF prog-id=53 op=UNLOAD Apr 20 15:30:08 dom0 audit: BPF prog-id=52 op=UNLOAD Apr 20 15:30:08 dom0 audit: BPF prog-id=51 op=UNLOAD Apr 20 15:30:08 dom0 audit: BPF prog-id=50 op=UNLOAD Apr 20 15:30:08 dom0 audit: BPF prog-id=61 op=UNLOAD Apr 20 15:30:08 dom0 audit: BPF prog-id=60 op=UNLOAD Apr 20 15:30:08 dom0 audit: BPF prog-id=49 op=UNLOAD Apr 20 15:30:08 dom0 audit: BPF prog-id=48 op=UNLOAD Apr 20 15:30:08 dom0 audit: BPF prog-id=47 op=UNLOAD Apr 20 15:30:08 dom0 audit: BPF prog-id=58 op=UNLOAD Apr 20 15:30:08 dom0 audit: BPF prog-id=57 op=UNLOAD Apr 20 15:30:08 dom0 audit: BPF prog-id=56 op=UNLOAD Apr 20 15:30:08 dom0 audit: BPF prog-id=63 op=UNLOAD Apr 20 15:30:08 dom0 audit: BPF prog-id=62 op=UNLOAD Apr 20 15:30:08 dom0 systemd[1]: Using hardware watchdog 'iTCO_wdt', version 0, device /dev/watchdog0 Apr 20 15:30:08 dom0 systemd[1]: Watchdog running with a timeout of 10min. Apr 20 15:30:08 dom0 kernel: watchdog: watchdog0: watchdog did not stop! Apr 20 15:30:08 dom0 systemd-shutdown[1]: Using hardware watchdog 'iTCO_wdt', version 0, device /dev/watchdog0 Apr 20 15:30:08 dom0 systemd-shutdown[1]: Watchdog running with a timeout of 10min. Apr 20 15:30:08 dom0 systemd-shutdown[1]: Syncing filesystems and block devices. Apr 20 15:30:08 dom0 systemd-shutdown[1]: Sending SIGTERM to remaining processes... Apr 20 15:30:08 dom0 systemd-journald[1380]: Received SIGTERM from PID 1 (systemd-shutdow). Apr 20 15:30:08 dom0 systemd-journald[1380]: Journal stopped