Without this log, the user would have no way to know that a USB device is rejected because it could not be opened (typically due to insufficient permissions).
Without this log, the user would have no way to know that a USB device is rejected because it could not be opened (typically due to insufficient permissions).