Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 849469 Details for
Bug 1052317
selinux-policy preventing login through sddm and ssh
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
journald output
journal (text/plain), 81.61 KB, created by
Dan Mossor [danofsatx]
on 2014-01-13 16:00:13 UTC
(
hide
)
Description:
journald output
Filename:
MIME Type:
Creator:
Dan Mossor [danofsatx]
Created:
2014-01-13 16:00:13 UTC
Size:
81.61 KB
patch
obsolete
>Jan 13 09:49:07 g55 dbus-daemon[953]: dbus[953]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Jan 13 09:49:07 g55 dbus[953]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Jan 13 09:49:07 g55 sshd[2605]: ssh_selinux_change_context: setcon system_u:system_r:sshd_net_t:s0 from system_u:system_r:init_t:s0 failed with Permission denied [preauth] >Jan 13 09:49:07 g55 sshd[2605]: Accepted publickey for dan from 172.16.4.15 port 56847 ssh2: RSA 03:09:fd:a4:2b:4e:13:d7:ee:c7:1c:8f:5b:e2:eb:cc >Jan 13 09:49:07 g55 systemd-logind[942]: New session 10 of user dan. >Jan 13 09:49:07 g55 systemd[1]: Starting Session 10 of user dan. >Jan 13 09:49:07 g55 systemd[1]: Started Session 10 of user dan. >Jan 13 09:49:07 g55 sshd[2605]: pam_unix(sshd:session): session opened for user dan by (uid=0) >Jan 13 09:49:07 g55 sshd[2614]: ssh_selinux_copy_context: setcon failed with Permission denied >Jan 13 09:49:07 g55 sshd[2614]: Received disconnect from 172.16.4.15: 11: disconnected by user >Jan 13 09:49:07 g55 sshd[2605]: pam_unix(sshd:session): session closed for user dan >Jan 13 09:49:07 g55 systemd-logind[942]: Removed session 10. >Jan 13 09:49:07 g55 dbus-daemon[953]: dbus[953]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Jan 13 09:49:07 g55 dbus[953]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Jan 13 09:49:07 g55 setroubleshoot[2608]: RunFaultServer(10) >Jan 13 09:49:07 g55 setroubleshoot[2608]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Jan 13 09:49:07 g55 setroubleshoot[2608]: database version 3.0 compatible with current 3.0 version >Jan 13 09:49:09 g55 setroubleshoot[2608]: load_plugins() names=['associate', 'mozplugger_remove', 'dac_override', 'sys_resource', 'mounton', 'allow_ftpd_use_cifs', 'restorecon_source', 'mmap_zero', 'public_content', 'bind_ports', 'samba_share', 'swapfile', 'allow_execheap', 'qemu_file_image', 'device', 'chrome', 'sshd_root', 'allow_execmod', 'file', 'leaks', 'openvpn', 'selinuxpolicy', 'mozplugger', 'qemu_blk_image', 'httpd_write_content', 'sys_module', 'automount_exec_config', 'wine', 'catchall_boolean', 'filesystem_associate', 'xen_image', 'connect_ports', 'catchall_labels', 'sandbox_connect', 'catchall', 'cvs_data', 'restorecon', 'allow_ftpd_use_nfs', 'setenforce', 'kernel_modules', 'rsync_data', 'allow_execstack', 'disable_ipv6', 'allow_anon_write', 'vbetool', 'httpd_can_sendmail'] >Jan 13 09:49:09 g55 setroubleshoot[2608]: Number of Plugins = 46 >Jan 13 09:49:09 g55 setroubleshoot[2608]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Jan 13 09:49:09 g55 setroubleshoot[2608]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Jan 13 09:49:09 g55 setroubleshoot[2608]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Jan 13 09:49:09 g55 setroubleshoot[2608]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Jan 13 09:49:09 g55 setroubleshoot[2608]: dbus avc(node=g55 type=AVC msg=audit(1389628147.252:952): avc: denied { dyntransition } for pid=2606 comm="sshd" scontext=system_u:system_r:init_t:s0 tcontext=system_u:system_r:sshd_net_t:s0 tclass=process > node=g55 type=SYSCALL msg=audit(1389628147.252:952): arch=c000003e syscall=1 success=no exit=-13 a0=6 a1=7f2c8aa2c930 a2=20 a3=7fff232ae9c0 items=0 ppid=2605 pid=2606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=4294967295 tty=(none) comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:init_t:s0 key=(null) > node=g55 type=EOE msg=audit(1389628147.252:952): > ) called: 1 Connections >Jan 13 09:49:09 g55 setroubleshoot[2608]: AuditRecordReceiver.add_record_to_cache(): node=g55 type=AVC msg=audit(1389628147.252:952): avc: denied { dyntransition } for pid=2606 comm="sshd" scontext=system_u:system_r:init_t:s0 tcontext=system_u:system_r:sshd_net_t:s0 tclass=process >Jan 13 09:49:09 g55 setroubleshoot[2608]: AuditRecordReceiver.add_record_to_cache(): node=g55 type=SYSCALL msg=audit(1389628147.252:952): arch=c000003e syscall=1 success=no exit=-13 a0=6 a1=7f2c8aa2c930 a2=20 a3=7fff232ae9c0 items=0 ppid=2605 pid=2606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=4294967295 tty=(none) comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:init_t:s0 key=(null) >Jan 13 09:49:09 g55 setroubleshoot[2608]: AuditRecordReceiver.add_record_to_cache(): node=g55 type=EOE msg=audit(1389628147.252:952): >Jan 13 09:49:10 g55 setroubleshoot[2608]: analyze_avc() avc=scontext=system_u:system_r:init_t:s0 tcontext=system_u:system_r:sshd_net_t:s0 access=['dyntransition'] tclass=process tpath= >Jan 13 09:49:10 g55 setroubleshoot[2608]: dbus avc(node=g55 type=AVC msg=audit(1389628147.486:968): avc: denied { dyntransition } for pid=2614 comm="sshd" scontext=system_u:system_r:init_t:s0 tcontext=unconfined_u:unconfined_r:unconfined_t:s0 tclass=process > node=g55 type=SYSCALL msg=audit(1389628147.486:968): arch=c000003e syscall=1 success=no exit=-13 a0=7 a1=7f2c8aa4b4b0 a2=2a a3=666e6f636e753a72 items=0 ppid=2605 pid=2614 auid=1000 uid=1000 gid=1000 euid=1000 suid=1000 fsuid=1000 egid=1000 sgid=1000 fsgid=1000 ses=10 tty=(none) comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:init_t:s0 key=(null) > node=g55 type=EOE msg=audit(1389628147.486:968): > ) called: 1 Connections >Jan 13 09:49:10 g55 setroubleshoot[2608]: AuditRecordReceiver.add_record_to_cache(): node=g55 type=AVC msg=audit(1389628147.486:968): avc: denied { dyntransition } for pid=2614 comm="sshd" scontext=system_u:system_r:init_t:s0 tcontext=unconfined_u:unconfined_r:unconfined_t:s0 tclass=process >Jan 13 09:49:10 g55 setroubleshoot[2608]: AuditRecordReceiver.add_record_to_cache(): node=g55 type=SYSCALL msg=audit(1389628147.486:968): arch=c000003e syscall=1 success=no exit=-13 a0=7 a1=7f2c8aa4b4b0 a2=2a a3=666e6f636e753a72 items=0 ppid=2605 pid=2614 auid=1000 uid=1000 gid=1000 euid=1000 suid=1000 fsuid=1000 egid=1000 sgid=1000 fsgid=1000 ses=10 tty=(none) comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:init_t:s0 key=(null) >Jan 13 09:49:10 g55 setroubleshoot[2608]: AuditRecordReceiver.add_record_to_cache(): node=g55 type=EOE msg=audit(1389628147.486:968): >Jan 13 09:49:10 g55 setroubleshoot[2608]: dbus avc(node=g55 type=AVC msg=audit(1389628147.489:971): avc: denied { transition } for pid=2615 comm="sshd" path="/usr/bin/bash" dev="dm-0" ino=2493160 scontext=system_u:system_r:init_t:s0 tcontext=unconfined_u:unconfined_r:unconfined_t:s0 tclass=process > node=g55 type=SYSCALL msg=audit(1389628147.489:971): arch=c000003e syscall=59 success=no exit=-13 a0=7f2c8aa37040 a1=7fff232ae4e0 a2=7f2c8aa2a340 a3=8 items=0 ppid=2614 pid=2615 auid=1000 uid=1000 gid=1000 euid=1000 suid=1000 fsuid=1000 egid=1000 sgid=1000 fsgid=1000 ses=10 tty=pts0 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:init_t:s0 key=(null) > node=g55 type=EOE msg=audit(1389628147.489:971): > ) called: 1 Connections >Jan 13 09:49:10 g55 setroubleshoot[2608]: AuditRecordReceiver.add_record_to_cache(): node=g55 type=AVC msg=audit(1389628147.489:971): avc: denied { transition } for pid=2615 comm="sshd" path="/usr/bin/bash" dev="dm-0" ino=2493160 scontext=system_u:system_r:init_t:s0 tcontext=unconfined_u:unconfined_r:unconfined_t:s0 tclass=process >Jan 13 09:49:10 g55 setroubleshoot[2608]: AuditRecordReceiver.add_record_to_cache(): node=g55 type=SYSCALL msg=audit(1389628147.489:971): arch=c000003e syscall=59 success=no exit=-13 a0=7f2c8aa37040 a1=7fff232ae4e0 a2=7f2c8aa2a340 a3=8 items=0 ppid=2614 pid=2615 auid=1000 uid=1000 gid=1000 euid=1000 suid=1000 fsuid=1000 egid=1000 sgid=1000 fsgid=1000 ses=10 tty=pts0 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:init_t:s0 key=(null) >Jan 13 09:49:10 g55 setroubleshoot[2608]: AuditRecordReceiver.add_record_to_cache(): node=g55 type=EOE msg=audit(1389628147.489:971): >Jan 13 09:49:11 g55 setroubleshoot[2608]: Plugin Exception restorecon_source >Jan 13 09:49:11 g55 setroubleshoot[2608]: lookup_signature: found 1 matches with scores 1.00 >Jan 13 09:49:11 g55 setroubleshoot[2608]: signature found in database >Jan 13 09:49:11 g55 setroubleshoot[2608]: sending alert to all clients >Jan 13 09:49:11 g55 setroubleshoot[2608]: SELinux is preventing /usr/sbin/sshd from using the dyntransition access on a process. For complete SELinux messages. run sealert -l 2fbfb356-00cc-4839-8890-a18d7b3697d0 >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() names=['associate', 'mozplugger_remove', 'dac_override', 'sys_resource', 'mounton', 'allow_ftpd_use_cifs', 'restorecon_source', 'mmap_zero', 'public_content', 'bind_ports', 'samba_share', 'swapfile', 'allow_execheap', 'qemu_file_image', 'device', 'chrome', 'sshd_root', 'allow_execmod', 'file', 'leaks', 'openvpn', 'selinuxpolicy', 'mozplugger', 'qemu_blk_image', 'httpd_write_content', 'sys_module', 'automount_exec_config', 'wine', 'catchall_boolean', 'filesystem_associate', 'xen_image', 'connect_ports', 'catchall_labels', 'sandbox_connect', 'catchall', 'cvs_data', 'restorecon', 'allow_ftpd_use_nfs', 'setenforce', 'kernel_modules', 'rsync_data', 'allow_execstack', 'disable_ipv6', 'allow_anon_write', 'vbetool', 'httpd_can_sendmail'] >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.associate previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.mozplugger_remove previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.dac_override previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.sys_resource previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.mounton previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.restorecon_source previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.mmap_zero previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.public_content previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.bind_ports previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.samba_share previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.swapfile previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.allow_execheap previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.qemu_file_image previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.device previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.chrome previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.sshd_root previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.allow_execmod previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.file previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.leaks previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.openvpn previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.selinuxpolicy previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.mozplugger previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.qemu_blk_image previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.httpd_write_content previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.sys_module previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.automount_exec_config previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.wine previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.catchall_boolean previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.filesystem_associate previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.xen_image previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.connect_ports previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.catchall_labels previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.sandbox_connect previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.catchall previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.cvs_data previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.restorecon previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.setenforce previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.kernel_modules previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.rsync_data previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.allow_execstack previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.disable_ipv6 previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.allow_anon_write previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.vbetool previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.httpd_can_sendmail previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: find_filter_by_username dan >Jan 13 09:49:11 g55 setroubleshoot[2608]: evaluate_filter_for_user: found dan user's filter = <?xml version="1.0" encoding="utf-8"?> > <SEFilter> > <count>9</count> > <filter_type>0</filter_type> > </SEFilter> >Jan 13 09:49:11 g55 setroubleshoot[2608]: evaluate_filter_for_user: found filter for dan: display > <?xml version="1.0" encoding="utf-8"?> > <SEFilter> > <count>10</count> > <filter_type>0</filter_type> > </SEFilter> >Jan 13 09:49:11 g55 setroubleshoot[2608]: analyze_avc() avc=scontext=system_u:system_r:init_t:s0 tcontext=unconfined_u:unconfined_r:unconfined_t:s0 access=['dyntransition'] tclass=process tpath= >Jan 13 09:49:11 g55 python[2608]: SELinux is preventing /usr/sbin/sshd from using the dyntransition access on a process. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that sshd should be allowed dyntransition access on processes labeled sshd_net_t by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # grep sshd /var/log/audit/audit.log | audit2allow -M mypol > # semodule -i mypol.pp > >Jan 13 09:49:11 g55 setroubleshoot[2608]: lookup_signature: found 1 matches with scores 1.00 >Jan 13 09:49:11 g55 setroubleshoot[2608]: signature found in database >Jan 13 09:49:11 g55 setroubleshoot[2608]: sending alert to all clients >Jan 13 09:49:11 g55 setroubleshoot[2608]: SELinux is preventing /usr/sbin/sshd from using the dyntransition access on a process. For complete SELinux messages. run sealert -l 07068423-655b-4735-8c57-7dff36215da5 >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() names=['associate', 'mozplugger_remove', 'dac_override', 'sys_resource', 'mounton', 'allow_ftpd_use_cifs', 'restorecon_source', 'mmap_zero', 'public_content', 'bind_ports', 'samba_share', 'swapfile', 'allow_execheap', 'qemu_file_image', 'device', 'chrome', 'sshd_root', 'allow_execmod', 'file', 'leaks', 'openvpn', 'selinuxpolicy', 'mozplugger', 'qemu_blk_image', 'httpd_write_content', 'sys_module', 'automount_exec_config', 'wine', 'catchall_boolean', 'filesystem_associate', 'xen_image', 'connect_ports', 'catchall_labels', 'sandbox_connect', 'catchall', 'cvs_data', 'restorecon', 'allow_ftpd_use_nfs', 'setenforce', 'kernel_modules', 'rsync_data', 'allow_execstack', 'disable_ipv6', 'allow_anon_write', 'vbetool', 'httpd_can_sendmail'] >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.associate previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.mozplugger_remove previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.dac_override previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.sys_resource previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.mounton previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.restorecon_source previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.mmap_zero previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.public_content previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.bind_ports previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.samba_share previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.swapfile previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.allow_execheap previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.qemu_file_image previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.device previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.chrome previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.sshd_root previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.allow_execmod previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.file previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.leaks previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.openvpn previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.selinuxpolicy previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.mozplugger previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.qemu_blk_image previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.httpd_write_content previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.sys_module previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.automount_exec_config previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.wine previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.catchall_boolean previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.filesystem_associate previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.xen_image previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.connect_ports previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.catchall_labels previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.sandbox_connect previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.catchall previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.cvs_data previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.restorecon previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.setenforce previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.kernel_modules previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.rsync_data previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.allow_execstack previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.disable_ipv6 previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.allow_anon_write previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.vbetool previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.httpd_can_sendmail previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: find_filter_by_username dan >Jan 13 09:49:11 g55 setroubleshoot[2608]: evaluate_filter_for_user: found dan user's filter = <?xml version="1.0" encoding="utf-8"?> > <SEFilter> > <count>8</count> > <filter_type>0</filter_type> > </SEFilter> >Jan 13 09:49:11 g55 setroubleshoot[2608]: evaluate_filter_for_user: found filter for dan: display > <?xml version="1.0" encoding="utf-8"?> > <SEFilter> > <count>9</count> > <filter_type>0</filter_type> > </SEFilter> >Jan 13 09:49:11 g55 setroubleshoot[2608]: analyze_avc() avc=scontext=system_u:system_r:init_t:s0 tcontext=unconfined_u:unconfined_r:unconfined_t:s0 access=['transition'] tclass=process tpath= >Jan 13 09:49:11 g55 python[2608]: SELinux is preventing /usr/sbin/sshd from using the dyntransition access on a process. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that sshd should be allowed dyntransition access on processes labeled unconfined_t by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # grep sshd /var/log/audit/audit.log | audit2allow -M mypol > # semodule -i mypol.pp > >Jan 13 09:49:11 g55 setroubleshoot[2608]: lookup_signature: found 1 matches with scores 1.00 >Jan 13 09:49:11 g55 setroubleshoot[2608]: signature found in database >Jan 13 09:49:11 g55 setroubleshoot[2608]: sending alert to all clients >Jan 13 09:49:11 g55 setroubleshoot[2608]: SELinux is preventing /usr/bin/sddm from using the transition access on a process. For complete SELinux messages. run sealert -l 740c23a9-6d07-4fc0-a10f-0577a695c2e5 >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() names=['associate', 'mozplugger_remove', 'dac_override', 'sys_resource', 'mounton', 'allow_ftpd_use_cifs', 'restorecon_source', 'mmap_zero', 'public_content', 'bind_ports', 'samba_share', 'swapfile', 'allow_execheap', 'qemu_file_image', 'device', 'chrome', 'sshd_root', 'allow_execmod', 'file', 'leaks', 'openvpn', 'selinuxpolicy', 'mozplugger', 'qemu_blk_image', 'httpd_write_content', 'sys_module', 'automount_exec_config', 'wine', 'catchall_boolean', 'filesystem_associate', 'xen_image', 'connect_ports', 'catchall_labels', 'sandbox_connect', 'catchall', 'cvs_data', 'restorecon', 'allow_ftpd_use_nfs', 'setenforce', 'kernel_modules', 'rsync_data', 'allow_execstack', 'disable_ipv6', 'allow_anon_write', 'vbetool', 'httpd_can_sendmail'] >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.associate previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.mozplugger_remove previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.dac_override previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.sys_resource previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.mounton previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.restorecon_source previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.mmap_zero previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.public_content previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.bind_ports previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.samba_share previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.swapfile previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.allow_execheap previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.qemu_file_image previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.device previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.chrome previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.sshd_root previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.allow_execmod previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.file previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.leaks previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.openvpn previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.selinuxpolicy previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.mozplugger previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.qemu_blk_image previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.httpd_write_content previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.sys_module previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.automount_exec_config previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.wine previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.catchall_boolean previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.filesystem_associate previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.xen_image previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.connect_ports previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.catchall_labels previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.sandbox_connect previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.catchall previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.cvs_data previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.restorecon previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.setenforce previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.kernel_modules previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.rsync_data previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.allow_execstack previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.disable_ipv6 previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.allow_anon_write previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.vbetool previously imported >Jan 13 09:49:11 g55 setroubleshoot[2608]: load_plugins() plugins.httpd_can_sendmail previously imported >Jan 13 09:49:11 g55 python[2608]: SELinux is preventing /usr/bin/sddm from using the transition access on a process. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that sddm should be allowed transition access on processes labeled unconfined_t by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # grep sddm /var/log/audit/audit.log | audit2allow -M mypol > # semodule -i mypol.pp > >Jan 13 09:49:18 g55 sddm[989]: DAEMON: Message received from greeter: Login >Jan 13 09:49:18 g55 setroubleshoot[2608]: dbus avc(node=g55 type=AVC msg=audit(1389628158.233:979): avc: denied { transition } for pid=2639 comm="sddm" path="/usr/sbin/unix_chkpwd" dev="dm-0" ino=2495219 scontext=system_u:system_r:init_t:s0 tcontext=unconfined_u:unconfined_r:unconfined_t:s0 tclass=process > node=g55 type=SYSCALL msg=audit(1389628158.233:979): arch=c000003e syscall=59 success=no exit=-13 a0=7f0addf9738d a1=7fff0772a7a0 a2=7f0ade19e3c0 a3=7f0aec873330 items=0 ppid=989 pid=2639 auid=1000 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=1 tty=(none) comm="sddm" exe="/usr/bin/sddm" subj=system_u:system_r:init_t:s0 key=(null) > node=g55 type=EOE msg=audit(1389628158.233:979): > ) called: 1 Connections >Jan 13 09:49:18 g55 setroubleshoot[2608]: AuditRecordReceiver.add_record_to_cache(): node=g55 type=AVC msg=audit(1389628158.233:979): avc: denied { transition } for pid=2639 comm="sddm" path="/usr/sbin/unix_chkpwd" dev="dm-0" ino=2495219 scontext=system_u:system_r:init_t:s0 tcontext=unconfined_u:unconfined_r:unconfined_t:s0 tclass=process >Jan 13 09:49:18 g55 setroubleshoot[2608]: AuditRecordReceiver.add_record_to_cache(): node=g55 type=SYSCALL msg=audit(1389628158.233:979): arch=c000003e syscall=59 success=no exit=-13 a0=7f0addf9738d a1=7fff0772a7a0 a2=7f0ade19e3c0 a3=7f0aec873330 items=0 ppid=989 pid=2639 auid=1000 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=1 tty=(none) comm="sddm" exe="/usr/bin/sddm" subj=system_u:system_r:init_t:s0 key=(null) >Jan 13 09:49:18 g55 setroubleshoot[2608]: AuditRecordReceiver.add_record_to_cache(): node=g55 type=EOE msg=audit(1389628158.233:979): >Jan 13 09:49:18 g55 sddm[989]: pam_unix(sddm:auth): authentication failure; logname= uid=0 euid=0 tty= ruser= rhost= user=dan >Jan 13 09:49:18 g55 setroubleshoot[2608]: analyze_avc() avc=scontext=system_u:system_r:init_t:s0 tcontext=unconfined_u:unconfined_r:unconfined_t:s0 access=['transition'] tclass=process tpath= >Jan 13 09:49:18 g55 setroubleshoot[2608]: dbus avc(node=g55 type=AVC msg=audit(1389628158.235:980): avc: denied { transition } for pid=2640 comm="sddm" path="/usr/sbin/unix_chkpwd" dev="dm-0" ino=2495219 scontext=system_u:system_r:init_t:s0 tcontext=unconfined_u:unconfined_r:unconfined_t:s0 tclass=process > node=g55 type=SYSCALL msg=audit(1389628158.235:980): arch=c000003e syscall=59 success=no exit=-13 a0=7f0addf9738d a1=7fff0772a740 a2=7f0ade19e3c0 a3=7f0aec873330 items=0 ppid=989 pid=2640 auid=1000 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=1 tty=(none) comm="sddm" exe="/usr/bin/sddm" subj=system_u:system_r:init_t:s0 key=(null) > node=g55 type=EOE msg=audit(1389628158.235:980): > ) called: 1 Connections >Jan 13 09:49:18 g55 setroubleshoot[2608]: AuditRecordReceiver.add_record_to_cache(): node=g55 type=AVC msg=audit(1389628158.235:980): avc: denied { transition } for pid=2640 comm="sddm" path="/usr/sbin/unix_chkpwd" dev="dm-0" ino=2495219 scontext=system_u:system_r:init_t:s0 tcontext=unconfined_u:unconfined_r:unconfined_t:s0 tclass=process >Jan 13 09:49:18 g55 setroubleshoot[2608]: AuditRecordReceiver.add_record_to_cache(): node=g55 type=SYSCALL msg=audit(1389628158.235:980): arch=c000003e syscall=59 success=no exit=-13 a0=7f0addf9738d a1=7fff0772a740 a2=7f0ade19e3c0 a3=7f0aec873330 items=0 ppid=989 pid=2640 auid=1000 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=1 tty=(none) comm="sddm" exe="/usr/bin/sddm" subj=system_u:system_r:init_t:s0 key=(null) >Jan 13 09:49:18 g55 setroubleshoot[2608]: AuditRecordReceiver.add_record_to_cache(): node=g55 type=EOE msg=audit(1389628158.235:980): >Jan 13 09:49:19 g55 setroubleshoot[2608]: lookup_signature: found 1 matches with scores 1.00 >Jan 13 09:49:19 g55 setroubleshoot[2608]: signature found in database >Jan 13 09:49:19 g55 setroubleshoot[2608]: sending alert to all clients >Jan 13 09:49:19 g55 setroubleshoot[2608]: SELinux is preventing /usr/bin/sddm from using the transition access on a process. For complete SELinux messages. run sealert -l 740c23a9-6d07-4fc0-a10f-0577a695c2e5 >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() names=['associate', 'mozplugger_remove', 'dac_override', 'sys_resource', 'mounton', 'allow_ftpd_use_cifs', 'restorecon_source', 'mmap_zero', 'public_content', 'bind_ports', 'samba_share', 'swapfile', 'allow_execheap', 'qemu_file_image', 'device', 'chrome', 'sshd_root', 'allow_execmod', 'file', 'leaks', 'openvpn', 'selinuxpolicy', 'mozplugger', 'qemu_blk_image', 'httpd_write_content', 'sys_module', 'automount_exec_config', 'wine', 'catchall_boolean', 'filesystem_associate', 'xen_image', 'connect_ports', 'catchall_labels', 'sandbox_connect', 'catchall', 'cvs_data', 'restorecon', 'allow_ftpd_use_nfs', 'setenforce', 'kernel_modules', 'rsync_data', 'allow_execstack', 'disable_ipv6', 'allow_anon_write', 'vbetool', 'httpd_can_sendmail'] >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.associate previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.mozplugger_remove previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.dac_override previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.sys_resource previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.mounton previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.restorecon_source previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.mmap_zero previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.public_content previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.bind_ports previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.samba_share previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.swapfile previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.allow_execheap previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.qemu_file_image previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.device previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.chrome previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.sshd_root previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.allow_execmod previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.file previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.leaks previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.openvpn previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.selinuxpolicy previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.mozplugger previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.qemu_blk_image previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.httpd_write_content previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.sys_module previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.automount_exec_config previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.wine previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.catchall_boolean previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.filesystem_associate previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.xen_image previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.connect_ports previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.catchall_labels previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.sandbox_connect previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.catchall previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.cvs_data previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.restorecon previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.setenforce previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.kernel_modules previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.rsync_data previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.allow_execstack previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.disable_ipv6 previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.allow_anon_write previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.vbetool previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.httpd_can_sendmail previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: analyze_avc() avc=scontext=system_u:system_r:init_t:s0 tcontext=unconfined_u:unconfined_r:unconfined_t:s0 access=['transition'] tclass=process tpath= >Jan 13 09:49:19 g55 python[2608]: SELinux is preventing /usr/bin/sddm from using the transition access on a process. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that sddm should be allowed transition access on processes labeled unconfined_t by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # grep sddm /var/log/audit/audit.log | audit2allow -M mypol > # semodule -i mypol.pp > >Jan 13 09:49:19 g55 setroubleshoot[2608]: lookup_signature: found 1 matches with scores 1.00 >Jan 13 09:49:19 g55 setroubleshoot[2608]: signature found in database >Jan 13 09:49:19 g55 setroubleshoot[2608]: sending alert to all clients >Jan 13 09:49:19 g55 setroubleshoot[2608]: SELinux is preventing /usr/bin/sddm from using the transition access on a process. For complete SELinux messages. run sealert -l 740c23a9-6d07-4fc0-a10f-0577a695c2e5 >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() names=['associate', 'mozplugger_remove', 'dac_override', 'sys_resource', 'mounton', 'allow_ftpd_use_cifs', 'restorecon_source', 'mmap_zero', 'public_content', 'bind_ports', 'samba_share', 'swapfile', 'allow_execheap', 'qemu_file_image', 'device', 'chrome', 'sshd_root', 'allow_execmod', 'file', 'leaks', 'openvpn', 'selinuxpolicy', 'mozplugger', 'qemu_blk_image', 'httpd_write_content', 'sys_module', 'automount_exec_config', 'wine', 'catchall_boolean', 'filesystem_associate', 'xen_image', 'connect_ports', 'catchall_labels', 'sandbox_connect', 'catchall', 'cvs_data', 'restorecon', 'allow_ftpd_use_nfs', 'setenforce', 'kernel_modules', 'rsync_data', 'allow_execstack', 'disable_ipv6', 'allow_anon_write', 'vbetool', 'httpd_can_sendmail'] >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.associate previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.mozplugger_remove previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.dac_override previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.sys_resource previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.mounton previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.restorecon_source previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.mmap_zero previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.public_content previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.bind_ports previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.samba_share previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.swapfile previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.allow_execheap previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.qemu_file_image previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.device previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.chrome previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.sshd_root previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.allow_execmod previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.file previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.leaks previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.openvpn previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.selinuxpolicy previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.mozplugger previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.qemu_blk_image previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.httpd_write_content previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.sys_module previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.automount_exec_config previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.wine previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.catchall_boolean previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.filesystem_associate previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.xen_image previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.connect_ports previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.catchall_labels previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.sandbox_connect previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.catchall previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.cvs_data previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.restorecon previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.setenforce previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.kernel_modules previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.rsync_data previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.allow_execstack previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.disable_ipv6 previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.allow_anon_write previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.vbetool previously imported >Jan 13 09:49:19 g55 setroubleshoot[2608]: load_plugins() plugins.httpd_can_sendmail previously imported >Jan 13 09:49:19 g55 python[2608]: SELinux is preventing /usr/bin/sddm from using the transition access on a process. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that sddm should be allowed transition access on processes labeled unconfined_t by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # grep sddm /var/log/audit/audit.log | audit2allow -M mypol > # semodule -i mypol.pp > >Jan 13 09:49:20 g55 sddm[989]: DAEMON: Message received from greeter: Login >Jan 13 09:49:20 g55 setroubleshoot[2608]: dbus avc(node=g55 type=AVC msg=audit(1389628160.643:982): avc: denied { transition } for pid=2653 comm="sddm" path="/usr/sbin/unix_chkpwd" dev="dm-0" ino=2495219 scontext=system_u:system_r:init_t:s0 tcontext=unconfined_u:unconfined_r:unconfined_t:s0 tclass=process > node=g55 type=SYSCALL msg=audit(1389628160.643:982): arch=c000003e syscall=59 success=no exit=-13 a0=7f0addf9738d a1=7fff0772a7a0 a2=7f0ade19e3c0 a3=7f0aec873330 items=0 ppid=989 pid=2653 auid=1000 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=1 tty=(none) comm="sddm" exe="/usr/bin/sddm" subj=system_u:system_r:init_t:s0 key=(null) > node=g55 type=EOE msg=audit(1389628160.643:982): > ) called: 1 Connections >Jan 13 09:49:20 g55 setroubleshoot[2608]: AuditRecordReceiver.add_record_to_cache(): node=g55 type=AVC msg=audit(1389628160.643:982): avc: denied { transition } for pid=2653 comm="sddm" path="/usr/sbin/unix_chkpwd" dev="dm-0" ino=2495219 scontext=system_u:system_r:init_t:s0 tcontext=unconfined_u:unconfined_r:unconfined_t:s0 tclass=process >Jan 13 09:49:20 g55 setroubleshoot[2608]: AuditRecordReceiver.add_record_to_cache(): node=g55 type=SYSCALL msg=audit(1389628160.643:982): arch=c000003e syscall=59 success=no exit=-13 a0=7f0addf9738d a1=7fff0772a7a0 a2=7f0ade19e3c0 a3=7f0aec873330 items=0 ppid=989 pid=2653 auid=1000 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=1 tty=(none) comm="sddm" exe="/usr/bin/sddm" subj=system_u:system_r:init_t:s0 key=(null) >Jan 13 09:49:20 g55 setroubleshoot[2608]: AuditRecordReceiver.add_record_to_cache(): node=g55 type=EOE msg=audit(1389628160.643:982): >Jan 13 09:49:20 g55 sddm[989]: pam_unix(sddm:auth): authentication failure; logname= uid=0 euid=0 tty= ruser= rhost= user=dan >Jan 13 09:49:21 g55 setroubleshoot[2608]: analyze_avc() avc=scontext=system_u:system_r:init_t:s0 tcontext=unconfined_u:unconfined_r:unconfined_t:s0 access=['transition'] tclass=process tpath= >Jan 13 09:49:21 g55 setroubleshoot[2608]: dbus avc(node=g55 type=AVC msg=audit(1389628160.644:983): avc: denied { transition } for pid=2654 comm="sddm" path="/usr/sbin/unix_chkpwd" dev="dm-0" ino=2495219 scontext=system_u:system_r:init_t:s0 tcontext=unconfined_u:unconfined_r:unconfined_t:s0 tclass=process > node=g55 type=SYSCALL msg=audit(1389628160.644:983): arch=c000003e syscall=59 success=no exit=-13 a0=7f0addf9738d a1=7fff0772a740 a2=7f0ade19e3c0 a3=7f0aec873330 items=0 ppid=989 pid=2654 auid=1000 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=1 tty=(none) comm="sddm" exe="/usr/bin/sddm" subj=system_u:system_r:init_t:s0 key=(null) > node=g55 type=EOE msg=audit(1389628160.644:983): > ) called: 1 Connections >Jan 13 09:49:21 g55 setroubleshoot[2608]: AuditRecordReceiver.add_record_to_cache(): node=g55 type=AVC msg=audit(1389628160.644:983): avc: denied { transition } for pid=2654 comm="sddm" path="/usr/sbin/unix_chkpwd" dev="dm-0" ino=2495219 scontext=system_u:system_r:init_t:s0 tcontext=unconfined_u:unconfined_r:unconfined_t:s0 tclass=process >Jan 13 09:49:21 g55 setroubleshoot[2608]: AuditRecordReceiver.add_record_to_cache(): node=g55 type=SYSCALL msg=audit(1389628160.644:983): arch=c000003e syscall=59 success=no exit=-13 a0=7f0addf9738d a1=7fff0772a740 a2=7f0ade19e3c0 a3=7f0aec873330 items=0 ppid=989 pid=2654 auid=1000 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=1 tty=(none) comm="sddm" exe="/usr/bin/sddm" subj=system_u:system_r:init_t:s0 key=(null) >Jan 13 09:49:21 g55 setroubleshoot[2608]: AuditRecordReceiver.add_record_to_cache(): node=g55 type=EOE msg=audit(1389628160.644:983): >Jan 13 09:49:21 g55 setroubleshoot[2608]: lookup_signature: found 1 matches with scores 1.00 >Jan 13 09:49:21 g55 setroubleshoot[2608]: signature found in database >Jan 13 09:49:21 g55 setroubleshoot[2608]: sending alert to all clients >Jan 13 09:49:21 g55 setroubleshoot[2608]: SELinux is preventing /usr/bin/sddm from using the transition access on a process. For complete SELinux messages. run sealert -l 740c23a9-6d07-4fc0-a10f-0577a695c2e5 >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() names=['associate', 'mozplugger_remove', 'dac_override', 'sys_resource', 'mounton', 'allow_ftpd_use_cifs', 'restorecon_source', 'mmap_zero', 'public_content', 'bind_ports', 'samba_share', 'swapfile', 'allow_execheap', 'qemu_file_image', 'device', 'chrome', 'sshd_root', 'allow_execmod', 'file', 'leaks', 'openvpn', 'selinuxpolicy', 'mozplugger', 'qemu_blk_image', 'httpd_write_content', 'sys_module', 'automount_exec_config', 'wine', 'catchall_boolean', 'filesystem_associate', 'xen_image', 'connect_ports', 'catchall_labels', 'sandbox_connect', 'catchall', 'cvs_data', 'restorecon', 'allow_ftpd_use_nfs', 'setenforce', 'kernel_modules', 'rsync_data', 'allow_execstack', 'disable_ipv6', 'allow_anon_write', 'vbetool', 'httpd_can_sendmail'] >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.associate previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.mozplugger_remove previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.dac_override previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.sys_resource previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.mounton previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.restorecon_source previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.mmap_zero previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.public_content previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.bind_ports previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.samba_share previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.swapfile previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.allow_execheap previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.qemu_file_image previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.device previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.chrome previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.sshd_root previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.allow_execmod previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.file previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.leaks previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.openvpn previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.selinuxpolicy previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.mozplugger previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.qemu_blk_image previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.httpd_write_content previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.sys_module previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.automount_exec_config previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.wine previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.catchall_boolean previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.filesystem_associate previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.xen_image previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.connect_ports previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.catchall_labels previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.sandbox_connect previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.catchall previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.cvs_data previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.restorecon previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.setenforce previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.kernel_modules previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.rsync_data previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.allow_execstack previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.disable_ipv6 previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.allow_anon_write previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.vbetool previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.httpd_can_sendmail previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: analyze_avc() avc=scontext=system_u:system_r:init_t:s0 tcontext=unconfined_u:unconfined_r:unconfined_t:s0 access=['transition'] tclass=process tpath= >Jan 13 09:49:21 g55 python[2608]: SELinux is preventing /usr/bin/sddm from using the transition access on a process. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that sddm should be allowed transition access on processes labeled unconfined_t by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # grep sddm /var/log/audit/audit.log | audit2allow -M mypol > # semodule -i mypol.pp > >Jan 13 09:49:21 g55 setroubleshoot[2608]: lookup_signature: found 1 matches with scores 1.00 >Jan 13 09:49:21 g55 setroubleshoot[2608]: signature found in database >Jan 13 09:49:21 g55 setroubleshoot[2608]: sending alert to all clients >Jan 13 09:49:21 g55 setroubleshoot[2608]: SELinux is preventing /usr/bin/sddm from using the transition access on a process. For complete SELinux messages. run sealert -l 740c23a9-6d07-4fc0-a10f-0577a695c2e5 >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() names=['associate', 'mozplugger_remove', 'dac_override', 'sys_resource', 'mounton', 'allow_ftpd_use_cifs', 'restorecon_source', 'mmap_zero', 'public_content', 'bind_ports', 'samba_share', 'swapfile', 'allow_execheap', 'qemu_file_image', 'device', 'chrome', 'sshd_root', 'allow_execmod', 'file', 'leaks', 'openvpn', 'selinuxpolicy', 'mozplugger', 'qemu_blk_image', 'httpd_write_content', 'sys_module', 'automount_exec_config', 'wine', 'catchall_boolean', 'filesystem_associate', 'xen_image', 'connect_ports', 'catchall_labels', 'sandbox_connect', 'catchall', 'cvs_data', 'restorecon', 'allow_ftpd_use_nfs', 'setenforce', 'kernel_modules', 'rsync_data', 'allow_execstack', 'disable_ipv6', 'allow_anon_write', 'vbetool', 'httpd_can_sendmail'] >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.associate previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.mozplugger_remove previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.dac_override previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.sys_resource previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.mounton previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.restorecon_source previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.mmap_zero previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.public_content previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.bind_ports previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.samba_share previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.swapfile previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.allow_execheap previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.qemu_file_image previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.device previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.chrome previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.sshd_root previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.allow_execmod previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.file previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.leaks previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.openvpn previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.selinuxpolicy previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.mozplugger previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.qemu_blk_image previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.httpd_write_content previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.sys_module previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.automount_exec_config previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.wine previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.catchall_boolean previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.filesystem_associate previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.xen_image previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.connect_ports previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.catchall_labels previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.sandbox_connect previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.catchall previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.cvs_data previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.restorecon previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.setenforce previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.kernel_modules previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.rsync_data previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.allow_execstack previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.disable_ipv6 previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.allow_anon_write previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.vbetool previously imported >Jan 13 09:49:21 g55 setroubleshoot[2608]: load_plugins() plugins.httpd_can_sendmail previously imported >Jan 13 09:49:21 g55 python[2608]: SELinux is preventing /usr/bin/sddm from using the transition access on a process. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that sddm should be allowed transition access on processes labeled unconfined_t by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # grep sddm /var/log/audit/audit.log | audit2allow -M mypol > # semodule -i mypol.pp > >Jan 13 09:49:30 g55 sddm[989]: DAEMON: Message received from greeter: Login >Jan 13 09:49:30 g55 setroubleshoot[2608]: dbus avc(node=g55 type=AVC msg=audit(1389628170.770:985): avc: denied { transition } for pid=2667 comm="sddm" path="/usr/sbin/unix_chkpwd" dev="dm-0" ino=2495219 scontext=system_u:system_r:init_t:s0 tcontext=unconfined_u:unconfined_r:unconfined_t:s0 tclass=process > node=g55 type=SYSCALL msg=audit(1389628170.770:985): arch=c000003e syscall=59 success=no exit=-13 a0=7f0addf9738d a1=7fff0772a7a0 a2=7f0ade19e3c0 a3=7f0aec873330 items=0 ppid=989 pid=2667 auid=1000 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=1 tty=(none) comm="sddm" exe="/usr/bin/sddm" subj=system_u:system_r:init_t:s0 key=(null) > node=g55 type=EOE msg=audit(1389628170.770:985): > ) called: 1 Connections >Jan 13 09:49:30 g55 setroubleshoot[2608]: AuditRecordReceiver.add_record_to_cache(): node=g55 type=AVC msg=audit(1389628170.770:985): avc: denied { transition } for pid=2667 comm="sddm" path="/usr/sbin/unix_chkpwd" dev="dm-0" ino=2495219 scontext=system_u:system_r:init_t:s0 tcontext=unconfined_u:unconfined_r:unconfined_t:s0 tclass=process >Jan 13 09:49:30 g55 sddm[989]: pam_unix(sddm:auth): authentication failure; logname= uid=0 euid=0 tty= ruser= rhost= user=dan >Jan 13 09:49:30 g55 setroubleshoot[2608]: AuditRecordReceiver.add_record_to_cache(): node=g55 type=SYSCALL msg=audit(1389628170.770:985): arch=c000003e syscall=59 success=no exit=-13 a0=7f0addf9738d a1=7fff0772a7a0 a2=7f0ade19e3c0 a3=7f0aec873330 items=0 ppid=989 pid=2667 auid=1000 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=1 tty=(none) comm="sddm" exe="/usr/bin/sddm" subj=system_u:system_r:init_t:s0 key=(null) >Jan 13 09:49:30 g55 setroubleshoot[2608]: AuditRecordReceiver.add_record_to_cache(): node=g55 type=EOE msg=audit(1389628170.770:985): >Jan 13 09:49:31 g55 setroubleshoot[2608]: analyze_avc() avc=scontext=system_u:system_r:init_t:s0 tcontext=unconfined_u:unconfined_r:unconfined_t:s0 access=['transition'] tclass=process tpath= >Jan 13 09:49:31 g55 setroubleshoot[2608]: dbus avc(node=g55 type=AVC msg=audit(1389628170.771:986): avc: denied { transition } for pid=2668 comm="sddm" path="/usr/sbin/unix_chkpwd" dev="dm-0" ino=2495219 scontext=system_u:system_r:init_t:s0 tcontext=unconfined_u:unconfined_r:unconfined_t:s0 tclass=process > node=g55 type=SYSCALL msg=audit(1389628170.771:986): arch=c000003e syscall=59 success=no exit=-13 a0=7f0addf9738d a1=7fff0772a740 a2=7f0ade19e3c0 a3=7f0aec873330 items=0 ppid=989 pid=2668 auid=1000 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=1 tty=(none) comm="sddm" exe="/usr/bin/sddm" subj=system_u:system_r:init_t:s0 key=(null) > node=g55 type=EOE msg=audit(1389628170.771:986): > ) called: 1 Connections >Jan 13 09:49:31 g55 setroubleshoot[2608]: AuditRecordReceiver.add_record_to_cache(): node=g55 type=AVC msg=audit(1389628170.771:986): avc: denied { transition } for pid=2668 comm="sddm" path="/usr/sbin/unix_chkpwd" dev="dm-0" ino=2495219 scontext=system_u:system_r:init_t:s0 tcontext=unconfined_u:unconfined_r:unconfined_t:s0 tclass=process >Jan 13 09:49:31 g55 setroubleshoot[2608]: AuditRecordReceiver.add_record_to_cache(): node=g55 type=SYSCALL msg=audit(1389628170.771:986): arch=c000003e syscall=59 success=no exit=-13 a0=7f0addf9738d a1=7fff0772a740 a2=7f0ade19e3c0 a3=7f0aec873330 items=0 ppid=989 pid=2668 auid=1000 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=1 tty=(none) comm="sddm" exe="/usr/bin/sddm" subj=system_u:system_r:init_t:s0 key=(null) >Jan 13 09:49:31 g55 setroubleshoot[2608]: AuditRecordReceiver.add_record_to_cache(): node=g55 type=EOE msg=audit(1389628170.771:986): >Jan 13 09:49:31 g55 setroubleshoot[2608]: lookup_signature: found 1 matches with scores 1.00 >Jan 13 09:49:31 g55 setroubleshoot[2608]: signature found in database >Jan 13 09:49:31 g55 setroubleshoot[2608]: sending alert to all clients >Jan 13 09:49:31 g55 setroubleshoot[2608]: SELinux is preventing /usr/bin/sddm from using the transition access on a process. For complete SELinux messages. run sealert -l 740c23a9-6d07-4fc0-a10f-0577a695c2e5 >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() names=['associate', 'mozplugger_remove', 'dac_override', 'sys_resource', 'mounton', 'allow_ftpd_use_cifs', 'restorecon_source', 'mmap_zero', 'public_content', 'bind_ports', 'samba_share', 'swapfile', 'allow_execheap', 'qemu_file_image', 'device', 'chrome', 'sshd_root', 'allow_execmod', 'file', 'leaks', 'openvpn', 'selinuxpolicy', 'mozplugger', 'qemu_blk_image', 'httpd_write_content', 'sys_module', 'automount_exec_config', 'wine', 'catchall_boolean', 'filesystem_associate', 'xen_image', 'connect_ports', 'catchall_labels', 'sandbox_connect', 'catchall', 'cvs_data', 'restorecon', 'allow_ftpd_use_nfs', 'setenforce', 'kernel_modules', 'rsync_data', 'allow_execstack', 'disable_ipv6', 'allow_anon_write', 'vbetool', 'httpd_can_sendmail'] >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.associate previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.mozplugger_remove previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.dac_override previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.sys_resource previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.mounton previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.restorecon_source previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.mmap_zero previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.public_content previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.bind_ports previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.samba_share previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.swapfile previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.allow_execheap previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.qemu_file_image previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.device previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.chrome previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.sshd_root previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.allow_execmod previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.file previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.leaks previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.openvpn previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.selinuxpolicy previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.mozplugger previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.qemu_blk_image previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.httpd_write_content previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.sys_module previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.automount_exec_config previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.wine previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.catchall_boolean previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.filesystem_associate previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.xen_image previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.connect_ports previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.catchall_labels previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.sandbox_connect previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.catchall previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.cvs_data previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.restorecon previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.setenforce previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.kernel_modules previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.rsync_data previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.allow_execstack previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.disable_ipv6 previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.allow_anon_write previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.vbetool previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.httpd_can_sendmail previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: analyze_avc() avc=scontext=system_u:system_r:init_t:s0 tcontext=unconfined_u:unconfined_r:unconfined_t:s0 access=['transition'] tclass=process tpath= >Jan 13 09:49:31 g55 python[2608]: SELinux is preventing /usr/bin/sddm from using the transition access on a process. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that sddm should be allowed transition access on processes labeled unconfined_t by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # grep sddm /var/log/audit/audit.log | audit2allow -M mypol > # semodule -i mypol.pp > >Jan 13 09:49:31 g55 setroubleshoot[2608]: lookup_signature: found 1 matches with scores 1.00 >Jan 13 09:49:31 g55 setroubleshoot[2608]: signature found in database >Jan 13 09:49:31 g55 setroubleshoot[2608]: sending alert to all clients >Jan 13 09:49:31 g55 setroubleshoot[2608]: SELinux is preventing /usr/bin/sddm from using the transition access on a process. For complete SELinux messages. run sealert -l 740c23a9-6d07-4fc0-a10f-0577a695c2e5 >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() names=['associate', 'mozplugger_remove', 'dac_override', 'sys_resource', 'mounton', 'allow_ftpd_use_cifs', 'restorecon_source', 'mmap_zero', 'public_content', 'bind_ports', 'samba_share', 'swapfile', 'allow_execheap', 'qemu_file_image', 'device', 'chrome', 'sshd_root', 'allow_execmod', 'file', 'leaks', 'openvpn', 'selinuxpolicy', 'mozplugger', 'qemu_blk_image', 'httpd_write_content', 'sys_module', 'automount_exec_config', 'wine', 'catchall_boolean', 'filesystem_associate', 'xen_image', 'connect_ports', 'catchall_labels', 'sandbox_connect', 'catchall', 'cvs_data', 'restorecon', 'allow_ftpd_use_nfs', 'setenforce', 'kernel_modules', 'rsync_data', 'allow_execstack', 'disable_ipv6', 'allow_anon_write', 'vbetool', 'httpd_can_sendmail'] >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.associate previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.mozplugger_remove previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.dac_override previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.sys_resource previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.mounton previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.restorecon_source previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.mmap_zero previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.public_content previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.bind_ports previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.samba_share previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.swapfile previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.allow_execheap previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.qemu_file_image previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.device previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.chrome previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.sshd_root previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.allow_execmod previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.file previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.leaks previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.openvpn previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.selinuxpolicy previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.mozplugger previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.qemu_blk_image previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.httpd_write_content previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.sys_module previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.automount_exec_config previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.wine previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.catchall_boolean previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.filesystem_associate previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.xen_image previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.connect_ports previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.catchall_labels previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.sandbox_connect previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.catchall previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.cvs_data previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.restorecon previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.setenforce previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.kernel_modules previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.rsync_data previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.allow_execstack previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.disable_ipv6 previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.allow_anon_write previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.vbetool previously imported >Jan 13 09:49:31 g55 setroubleshoot[2608]: load_plugins() plugins.httpd_can_sendmail previously imported >Jan 13 09:49:31 g55 python[2608]: SELinux is preventing /usr/bin/sddm from using the transition access on a process. > > ***** Plugin catchall (100. confidence) suggests ************************** > > If you believe that sddm should be allowed transition access on processes labeled unconfined_t by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # grep sddm /var/log/audit/audit.log | audit2allow -M mypol > # semodule -i mypol.pp > >Jan 13 09:49:41 g55 setroubleshoot[2608]: auto_save database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=9 >Jan 13 09:49:41 g55 setroubleshoot[2608]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=9 >Jan 13 09:49:41 g55 setroubleshoot[2608]: received signal=14 >Jan 13 09:49:41 g55 setroubleshoot[2608]: KeyboardInterrupt in RunFaultServer >Jan 13 09:49:41 g55 setroubleshoot[2608]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=0 >Jan 13 09:49:41 g55 dbus-daemon[953]: 'list' object has no attribute 'split'
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1052317
:
849467
|
849468
| 849469 |
849470
|
849471