Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 877007 Details for
Bug 1079035
DBusCallError: Failed to call Get method on /org/freedesktop/locale1 with ('org.freedesktop.locale1', 'VConsoleKeymap') arguments: Timeout was reached
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
File: journalctl
journalctl (text/plain), 2.95 MB, created by
David Shea
on 2014-03-20 19:38:38 UTC
(
hide
)
Description:
File: journalctl
Filename:
MIME Type:
Creator:
David Shea
Created:
2014-03-20 19:38:38 UTC
Size:
2.95 MB
patch
obsolete
>-- Logs begin at Thu 2013-10-17 10:37:55 EDT, end at Thu 2014-03-20 15:36:28 EDT. -- >Mar 17 14:01:05 spectre systemd-journal[83]: Runtime journal is using 8.0M (max allowed 196.6M, trying to leave 294.9M free of 1.9G available â current limit 196.6M). >Mar 17 14:01:05 spectre systemd-journal[83]: Runtime journal is using 8.0M (max allowed 196.6M, trying to leave 294.9M free of 1.9G available â current limit 196.6M). >Mar 17 14:01:05 spectre kernel: Initializing cgroup subsys cpuset >Mar 17 14:01:05 spectre kernel: Initializing cgroup subsys cpu >Mar 17 14:01:05 spectre kernel: Initializing cgroup subsys cpuacct >Mar 17 14:01:05 spectre kernel: Linux version 3.14.0-0.rc6.git4.1.fc21.x86_64 (mockbuild@bkernel02) (gcc version 4.8.2 20140120 (Red Hat 4.8.2-14) (GCC) ) #1 SMP Fri Mar 14 20:07:37 UTC 2014 >Mar 17 14:01:05 spectre kernel: Command line: BOOT_IMAGE=/vmlinuz-3.14.0-0.rc6.git4.1.fc21.x86_64 root=/dev/mapper/fedora-root ro rd.lvm.lv=fedora/swap vconsole.font=latarcyrheb-sun16 rd.lvm.lv=fedora/root vconsole.keymap=us rhgb quiet LANG=en_US.UTF-8 >Mar 17 14:01:05 spectre kernel: e820: BIOS-provided physical RAM map: >Mar 17 14:01:05 spectre kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable >Mar 17 14:01:05 spectre kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved >Mar 17 14:01:05 spectre kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved >Mar 17 14:01:05 spectre kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000dfffdfff] usable >Mar 17 14:01:05 spectre kernel: BIOS-e820: [mem 0x00000000dfffe000-0x00000000dfffffff] reserved >Mar 17 14:01:05 spectre kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved >Mar 17 14:01:05 spectre kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved >Mar 17 14:01:05 spectre kernel: BIOS-e820: [mem 0x0000000100000000-0x000000011fffffff] usable >Mar 17 14:01:05 spectre kernel: NX (Execute Disable) protection: active >Mar 17 14:01:05 spectre kernel: SMBIOS 2.4 present. >Mar 17 14:01:05 spectre kernel: DMI: Bochs Bochs, BIOS Bochs 01/01/2011 >Mar 17 14:01:05 spectre kernel: Hypervisor detected: KVM >Mar 17 14:01:05 spectre kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved >Mar 17 14:01:05 spectre kernel: e820: remove [mem 0x000a0000-0x000fffff] usable >Mar 17 14:01:05 spectre kernel: e820: last_pfn = 0x120000 max_arch_pfn = 0x400000000 >Mar 17 14:01:05 spectre kernel: MTRR default type: write-back >Mar 17 14:01:05 spectre kernel: MTRR fixed ranges enabled: >Mar 17 14:01:05 spectre kernel: 00000-9FFFF write-back >Mar 17 14:01:05 spectre kernel: A0000-BFFFF uncachable >Mar 17 14:01:05 spectre kernel: C0000-FFFFF write-protect >Mar 17 14:01:05 spectre kernel: MTRR variable ranges enabled: >Mar 17 14:01:05 spectre kernel: 0 base 00E0000000 mask FFE0000000 uncachable >Mar 17 14:01:05 spectre kernel: 1 disabled >Mar 17 14:01:05 spectre kernel: 2 disabled >Mar 17 14:01:05 spectre kernel: 3 disabled >Mar 17 14:01:05 spectre kernel: 4 disabled >Mar 17 14:01:05 spectre kernel: 5 disabled >Mar 17 14:01:05 spectre kernel: 6 disabled >Mar 17 14:01:05 spectre kernel: 7 disabled >Mar 17 14:01:05 spectre kernel: PAT not supported by CPU. >Mar 17 14:01:05 spectre kernel: e820: last_pfn = 0xdfffe max_arch_pfn = 0x400000000 >Mar 17 14:01:05 spectre kernel: found SMP MP-table at [mem 0x000f1790-0x000f179f] mapped at [ffff8800000f1790] >Mar 17 14:01:05 spectre kernel: Scanning 1 areas for low memory corruption >Mar 17 14:01:05 spectre kernel: Base memory trampoline at [ffff880000099000] 99000 size 24576 >Mar 17 14:01:05 spectre kernel: init_memory_mapping: [mem 0x00000000-0x000fffff] >Mar 17 14:01:05 spectre kernel: [mem 0x00000000-0x000fffff] page 4k >Mar 17 14:01:05 spectre kernel: BRK [0x02dc8000, 0x02dc8fff] PGTABLE >Mar 17 14:01:05 spectre kernel: BRK [0x02dc9000, 0x02dc9fff] PGTABLE >Mar 17 14:01:05 spectre kernel: BRK [0x02dca000, 0x02dcafff] PGTABLE >Mar 17 14:01:05 spectre kernel: init_memory_mapping: [mem 0x11fe00000-0x11fffffff] >Mar 17 14:01:05 spectre kernel: [mem 0x11fe00000-0x11fffffff] page 2M >Mar 17 14:01:05 spectre kernel: BRK [0x02dcb000, 0x02dcbfff] PGTABLE >Mar 17 14:01:05 spectre kernel: init_memory_mapping: [mem 0x11c000000-0x11fdfffff] >Mar 17 14:01:05 spectre kernel: [mem 0x11c000000-0x11fdfffff] page 2M >Mar 17 14:01:05 spectre kernel: init_memory_mapping: [mem 0x100000000-0x11bffffff] >Mar 17 14:01:05 spectre kernel: [mem 0x100000000-0x11bffffff] page 2M >Mar 17 14:01:05 spectre kernel: init_memory_mapping: [mem 0x00100000-0xdfffdfff] >Mar 17 14:01:05 spectre kernel: [mem 0x00100000-0x001fffff] page 4k >Mar 17 14:01:05 spectre kernel: [mem 0x00200000-0xdfdfffff] page 2M >Mar 17 14:01:05 spectre kernel: [mem 0xdfe00000-0xdfffdfff] page 4k >Mar 17 14:01:05 spectre kernel: RAMDISK: [mem 0x35d54000-0x36ea1fff] >Mar 17 14:01:05 spectre kernel: ACPI: RSDP 00000000000f1580 000014 (v00 BOCHS ) >Mar 17 14:01:05 spectre kernel: ACPI: RSDT 00000000dfffe320 000034 (v01 BOCHS BXPCRSDT 00000001 BXPC 00000001) >Mar 17 14:01:05 spectre kernel: ACPI: FACP 00000000dfffff80 000074 (v01 BOCHS BXPCFACP 00000001 BXPC 00000001) >Mar 17 14:01:05 spectre kernel: ACPI: DSDT 00000000dfffe360 001137 (v01 BXPC BXDSDT 00000001 INTL 20120913) >Mar 17 14:01:05 spectre kernel: ACPI: FACS 00000000dfffff40 000040 >Mar 17 14:01:05 spectre kernel: ACPI: SSDT 00000000dffff5e0 00095B (v01 BOCHS BXPCSSDT 00000001 BXPC 00000001) >Mar 17 14:01:05 spectre kernel: ACPI: APIC 00000000dffff4e0 000090 (v01 BOCHS BXPCAPIC 00000001 BXPC 00000001) >Mar 17 14:01:05 spectre kernel: ACPI: HPET 00000000dffff4a0 000038 (v01 BOCHS BXPCHPET 00000001 BXPC 00000001) >Mar 17 14:01:05 spectre kernel: ACPI: Local APIC address 0xfee00000 >Mar 17 14:01:05 spectre kernel: No NUMA configuration found >Mar 17 14:01:05 spectre kernel: Faking a node at [mem 0x0000000000000000-0x000000011fffffff] >Mar 17 14:01:05 spectre kernel: Initmem setup node 0 [mem 0x00000000-0x11fffffff] >Mar 17 14:01:05 spectre kernel: NODE_DATA [mem 0x11ffd5000-0x11fffbfff] >Mar 17 14:01:05 spectre kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 >Mar 17 14:01:05 spectre kernel: kvm-clock: cpu 0, msr 1:1ff55001, boot clock >Mar 17 14:01:05 spectre kernel: [ffffea0000000000-ffffea00047fffff] PMD -> [ffff88011b600000-ffff88011f5fffff] on node 0 >Mar 17 14:01:05 spectre kernel: Zone ranges: >Mar 17 14:01:05 spectre kernel: DMA [mem 0x00001000-0x00ffffff] >Mar 17 14:01:05 spectre kernel: DMA32 [mem 0x01000000-0xffffffff] >Mar 17 14:01:05 spectre kernel: Normal [mem 0x100000000-0x11fffffff] >Mar 17 14:01:05 spectre kernel: Movable zone start for each node >Mar 17 14:01:05 spectre kernel: Early memory node ranges >Mar 17 14:01:05 spectre kernel: node 0: [mem 0x00001000-0x0009efff] >Mar 17 14:01:05 spectre kernel: node 0: [mem 0x00100000-0xdfffdfff] >Mar 17 14:01:05 spectre kernel: node 0: [mem 0x100000000-0x11fffffff] >Mar 17 14:01:05 spectre kernel: On node 0 totalpages: 1048476 >Mar 17 14:01:05 spectre kernel: DMA zone: 64 pages used for memmap >Mar 17 14:01:05 spectre kernel: DMA zone: 21 pages reserved >Mar 17 14:01:05 spectre kernel: DMA zone: 3998 pages, LIFO batch:0 >Mar 17 14:01:05 spectre kernel: DMA32 zone: 14272 pages used for memmap >Mar 17 14:01:05 spectre kernel: DMA32 zone: 913406 pages, LIFO batch:31 >Mar 17 14:01:05 spectre kernel: Normal zone: 2048 pages used for memmap >Mar 17 14:01:05 spectre kernel: Normal zone: 131072 pages, LIFO batch:31 >Mar 17 14:01:05 spectre kernel: ACPI: PM-Timer IO Port: 0xb008 >Mar 17 14:01:05 spectre kernel: ACPI: Local APIC address 0xfee00000 >Mar 17 14:01:05 spectre kernel: ACPI: LAPIC (acpi_id[0x00] lapic_id[0x00] enabled) >Mar 17 14:01:05 spectre kernel: ACPI: LAPIC (acpi_id[0x01] lapic_id[0x01] enabled) >Mar 17 14:01:05 spectre kernel: ACPI: LAPIC (acpi_id[0x02] lapic_id[0x02] enabled) >Mar 17 14:01:05 spectre kernel: ACPI: LAPIC (acpi_id[0x03] lapic_id[0x03] enabled) >Mar 17 14:01:05 spectre kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) >Mar 17 14:01:05 spectre kernel: ACPI: IOAPIC (id[0x00] address[0xfec00000] gsi_base[0]) >Mar 17 14:01:05 spectre kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 >Mar 17 14:01:05 spectre kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) >Mar 17 14:01:05 spectre kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) >Mar 17 14:01:05 spectre kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) >Mar 17 14:01:05 spectre kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) >Mar 17 14:01:05 spectre kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) >Mar 17 14:01:05 spectre kernel: ACPI: IRQ0 used by override. >Mar 17 14:01:05 spectre kernel: ACPI: IRQ2 used by override. >Mar 17 14:01:05 spectre kernel: ACPI: IRQ5 used by override. >Mar 17 14:01:05 spectre kernel: ACPI: IRQ9 used by override. >Mar 17 14:01:05 spectre kernel: ACPI: IRQ10 used by override. >Mar 17 14:01:05 spectre kernel: ACPI: IRQ11 used by override. >Mar 17 14:01:05 spectre kernel: Using ACPI (MADT) for SMP configuration information >Mar 17 14:01:05 spectre kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 >Mar 17 14:01:05 spectre kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs >Mar 17 14:01:05 spectre kernel: nr_irqs_gsi: 40 >Mar 17 14:01:05 spectre kernel: PM: Registered nosave memory: [mem 0x0009f000-0x0009ffff] >Mar 17 14:01:05 spectre kernel: PM: Registered nosave memory: [mem 0x000a0000-0x000effff] >Mar 17 14:01:05 spectre kernel: PM: Registered nosave memory: [mem 0x000f0000-0x000fffff] >Mar 17 14:01:05 spectre kernel: PM: Registered nosave memory: [mem 0xdfffe000-0xdfffffff] >Mar 17 14:01:05 spectre kernel: PM: Registered nosave memory: [mem 0xe0000000-0xfeffbfff] >Mar 17 14:01:05 spectre kernel: PM: Registered nosave memory: [mem 0xfeffc000-0xfeffffff] >Mar 17 14:01:05 spectre kernel: PM: Registered nosave memory: [mem 0xff000000-0xfffbffff] >Mar 17 14:01:05 spectre kernel: PM: Registered nosave memory: [mem 0xfffc0000-0xffffffff] >Mar 17 14:01:05 spectre kernel: e820: [mem 0xe0000000-0xfeffbfff] available for PCI devices >Mar 17 14:01:05 spectre kernel: Booting paravirtualized kernel on KVM >Mar 17 14:01:05 spectre kernel: setup_percpu: NR_CPUS:8192 nr_cpumask_bits:4 nr_cpu_ids:4 nr_node_ids:1 >Mar 17 14:01:05 spectre kernel: PERCPU: Embedded 478 pages/cpu @ffff88011ae00000 s1926720 r8192 d22976 u2097152 >Mar 17 14:01:05 spectre kernel: pcpu-alloc: s1926720 r8192 d22976 u2097152 alloc=1*2097152 >Mar 17 14:01:05 spectre kernel: pcpu-alloc: [0] 0 [0] 1 [0] 2 [0] 3 >Mar 17 14:01:05 spectre kernel: kvm-clock: cpu 0, msr 1:1ff55001, primary cpu clock >Mar 17 14:01:05 spectre kernel: KVM setup async PF for cpu 0 >Mar 17 14:01:05 spectre kernel: kvm-stealtime: cpu 0, msr 11ae0e280 >Mar 17 14:01:05 spectre kernel: Built 1 zonelists in Node order, mobility grouping on. Total pages: 1032071 >Mar 17 14:01:05 spectre kernel: Policy zone: Normal >Mar 17 14:01:05 spectre kernel: Kernel command line: BOOT_IMAGE=/vmlinuz-3.14.0-0.rc6.git4.1.fc21.x86_64 root=/dev/mapper/fedora-root ro rd.lvm.lv=fedora/swap vconsole.font=latarcyrheb-sun16 rd.lvm.lv=fedora/root vconsole.keymap=us rhgb quiet LANG=en_US.UTF-8 >Mar 17 14:01:05 spectre kernel: PID hash table entries: 4096 (order: 3, 32768 bytes) >Mar 17 14:01:05 spectre kernel: Memory: 4004640K/4193904K available (8103K kernel code, 1605K rwdata, 3300K rodata, 3700K init, 12864K bss, 189264K reserved) >Mar 17 14:01:05 spectre kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 >Mar 17 14:01:05 spectre kernel: Hierarchical RCU implementation. >Mar 17 14:01:05 spectre kernel: RCU lockdep checking is enabled. >Mar 17 14:01:05 spectre kernel: RCU restricting CPUs from NR_CPUS=8192 to nr_cpu_ids=4. >Mar 17 14:01:05 spectre kernel: RCU: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 >Mar 17 14:01:05 spectre kernel: NR_IRQS:524544 nr_irqs:712 16 >Mar 17 14:01:05 spectre kernel: ACPI: Core revision 20131218 >Mar 17 14:01:05 spectre kernel: kmemleak: Kernel memory leak detector disabled >Mar 17 14:01:05 spectre kernel: ACPI: All ACPI Tables successfully acquired >Mar 17 14:01:05 spectre kernel: Console: colour VGA+ 80x25 >Mar 17 14:01:05 spectre kernel: console [tty0] enabled >Mar 17 14:01:05 spectre kernel: Lock dependency validator: Copyright (c) 2006 Red Hat, Inc., Ingo Molnar >Mar 17 14:01:05 spectre kernel: ... MAX_LOCKDEP_SUBCLASSES: 8 >Mar 17 14:01:05 spectre kernel: ... MAX_LOCK_DEPTH: 48 >Mar 17 14:01:05 spectre kernel: ... MAX_LOCKDEP_KEYS: 8191 >Mar 17 14:01:05 spectre kernel: ... CLASSHASH_SIZE: 4096 >Mar 17 14:01:05 spectre kernel: ... MAX_LOCKDEP_ENTRIES: 16384 >Mar 17 14:01:05 spectre kernel: ... MAX_LOCKDEP_CHAINS: 32768 >Mar 17 14:01:05 spectre kernel: ... CHAINHASH_SIZE: 16384 >Mar 17 14:01:05 spectre kernel: memory used by lock dependency info: 6367 kB >Mar 17 14:01:05 spectre kernel: per task-struct memory footprint: 2688 bytes >Mar 17 14:01:05 spectre kernel: allocated 16777216 bytes of page_cgroup >Mar 17 14:01:05 spectre kernel: please try 'cgroup_disable=memory' option if you don't want memory cgroups >Mar 17 14:01:05 spectre kernel: ODEBUG: 24 of 24 active objects replaced >Mar 17 14:01:05 spectre kernel: hpet clockevent registered >Mar 17 14:01:05 spectre kernel: tsc: Detected 3392.292 MHz processor >Mar 17 14:01:05 spectre kernel: Calibrating delay loop (skipped) preset value.. 6784.58 BogoMIPS (lpj=3392292) >Mar 17 14:01:05 spectre kernel: pid_max: default: 32768 minimum: 301 >Mar 17 14:01:05 spectre kernel: Security Framework initialized >Mar 17 14:01:05 spectre kernel: SELinux: Initializing. >Mar 17 14:01:05 spectre kernel: SELinux: Starting in permissive mode >Mar 17 14:01:05 spectre kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes) >Mar 17 14:01:05 spectre kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes) >Mar 17 14:01:05 spectre kernel: Mount-cache hash table entries: 256 >Mar 17 14:01:05 spectre kernel: Initializing cgroup subsys memory >Mar 17 14:01:05 spectre kernel: Initializing cgroup subsys devices >Mar 17 14:01:05 spectre kernel: Initializing cgroup subsys freezer >Mar 17 14:01:05 spectre kernel: Initializing cgroup subsys net_cls >Mar 17 14:01:05 spectre kernel: Initializing cgroup subsys blkio >Mar 17 14:01:05 spectre kernel: Initializing cgroup subsys perf_event >Mar 17 14:01:05 spectre kernel: Initializing cgroup subsys hugetlb >Mar 17 14:01:05 spectre kernel: mce: CPU supports 10 MCE banks >Mar 17 14:01:05 spectre kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 >Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 >tlb_flushall_shift: 6 >Mar 17 14:01:05 spectre kernel: Freeing SMP alternatives memory: 24K (ffffffff82130000 - ffffffff82136000) >Mar 17 14:01:05 spectre kernel: ftrace: allocating 26543 entries in 104 pages >Mar 17 14:01:05 spectre kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 >Mar 17 14:01:05 spectre kernel: smpboot: CPU0: Intel QEMU Virtual CPU version 1.6.1 (fam: 06, model: 02, stepping: 03) >Mar 17 14:01:05 spectre kernel: Performance Events: unsupported p6 CPU model 2 no PMU driver, software events only. >Mar 17 14:01:05 spectre kernel: watchdog: disabled (inside virtual machine) >Mar 17 14:01:05 spectre kernel: x86: Booting SMP configuration: >Mar 17 14:01:05 spectre kernel: .... node #0, CPUs: #1 >Mar 17 14:01:05 spectre kernel: kvm-clock: cpu 1, msr 1:1ff55041, secondary cpu clock >Mar 17 14:01:05 spectre kernel: KVM setup async PF for cpu 1 >Mar 17 14:01:05 spectre kernel: kvm-stealtime: cpu 1, msr 11b00e280 >Mar 17 14:01:05 spectre kernel: #2 >Mar 17 14:01:05 spectre kernel: kvm-clock: cpu 2, msr 1:1ff55081, secondary cpu clock >Mar 17 14:01:05 spectre kernel: KVM setup async PF for cpu 2 >Mar 17 14:01:05 spectre kernel: kvm-stealtime: cpu 2, msr 11b20e280 >Mar 17 14:01:05 spectre kernel: #3 >Mar 17 14:01:05 spectre kernel: kvm-clock: cpu 3, msr 1:1ff550c1, secondary cpu clock >Mar 17 14:01:05 spectre kernel: x86: Booted up 1 node, 4 CPUs >Mar 17 14:01:05 spectre kernel: KVM setup async PF for cpu 3 >Mar 17 14:01:05 spectre kernel: smpboot: Total of 4 processors activated (27138.33 BogoMIPS) >Mar 17 14:01:05 spectre kernel: kvm-stealtime: cpu 3, msr 11b40e280 >Mar 17 14:01:05 spectre kernel: devtmpfs: initialized >Mar 17 14:01:05 spectre kernel: atomic64 test passed for x86-64 platform with CX8 and with SSE >Mar 17 14:01:05 spectre kernel: pinctrl core: initialized pinctrl subsystem >Mar 17 14:01:05 spectre kernel: RTC time: 18:01:05, date: 03/17/14 >Mar 17 14:01:05 spectre kernel: NET: Registered protocol family 16 >Mar 17 14:01:05 spectre kernel: cpuidle: using governor menu >Mar 17 14:01:05 spectre kernel: ACPI: bus type PCI registered >Mar 17 14:01:05 spectre kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 >Mar 17 14:01:05 spectre kernel: PCI: Using configuration type 1 for base access >Mar 17 14:01:05 spectre kernel: bio: create slab <bio-0> at 0 >Mar 17 14:01:05 spectre kernel: ACPI: Added _OSI(Module Device) >Mar 17 14:01:05 spectre kernel: ACPI: Added _OSI(Processor Device) >Mar 17 14:01:05 spectre kernel: ACPI: Added _OSI(3.0 _SCP Extensions) >Mar 17 14:01:05 spectre kernel: ACPI: Added _OSI(Processor Aggregator Device) >Mar 17 14:01:05 spectre kernel: ACPI: Interpreter enabled >Mar 17 14:01:05 spectre kernel: ACPI Exception: AE_NOT_FOUND, While evaluating Sleep State [\_S1_] (20131218/hwxface-580) >Mar 17 14:01:05 spectre kernel: ACPI Exception: AE_NOT_FOUND, While evaluating Sleep State [\_S2_] (20131218/hwxface-580) >Mar 17 14:01:05 spectre kernel: ACPI: (supports S0 S3 S4 S5) >Mar 17 14:01:05 spectre kernel: ACPI: Using IOAPIC for interrupt routing >Mar 17 14:01:05 spectre kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug >Mar 17 14:01:05 spectre kernel: ACPI: No dock devices found. >Mar 17 14:01:05 spectre kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) >Mar 17 14:01:05 spectre kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI] >Mar 17 14:01:05 spectre kernel: acpi PNP0A03:00: _OSC failed (AE_NOT_FOUND); disabling ASPM >Mar 17 14:01:05 spectre kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. >Mar 17 14:01:05 spectre kernel: acpiphp: Slot [3] registered >Mar 17 14:01:05 spectre kernel: acpiphp: Slot [4] registered >Mar 17 14:01:05 spectre kernel: acpiphp: Slot [5] registered >Mar 17 14:01:05 spectre kernel: acpiphp: Slot [6] registered >Mar 17 14:01:05 spectre kernel: acpiphp: Slot [7] registered >Mar 17 14:01:05 spectre kernel: acpiphp: Slot [8] registered >Mar 17 14:01:05 spectre kernel: acpiphp: Slot [9] registered >Mar 17 14:01:05 spectre kernel: acpiphp: Slot [10] registered >Mar 17 14:01:05 spectre kernel: acpiphp: Slot [11] registered >Mar 17 14:01:05 spectre kernel: acpiphp: Slot [12] registered >Mar 17 14:01:05 spectre kernel: acpiphp: Slot [13] registered >Mar 17 14:01:05 spectre kernel: acpiphp: Slot [14] registered >Mar 17 14:01:05 spectre kernel: acpiphp: Slot [15] registered >Mar 17 14:01:05 spectre kernel: acpiphp: Slot [16] registered >Mar 17 14:01:05 spectre kernel: acpiphp: Slot [17] registered >Mar 17 14:01:05 spectre kernel: acpiphp: Slot [18] registered >Mar 17 14:01:05 spectre kernel: acpiphp: Slot [19] registered >Mar 17 14:01:05 spectre kernel: acpiphp: Slot [20] registered >Mar 17 14:01:05 spectre kernel: acpiphp: Slot [21] registered >Mar 17 14:01:05 spectre kernel: acpiphp: Slot [22] registered >Mar 17 14:01:05 spectre kernel: acpiphp: Slot [23] registered >Mar 17 14:01:05 spectre kernel: acpiphp: Slot [24] registered >Mar 17 14:01:05 spectre kernel: acpiphp: Slot [25] registered >Mar 17 14:01:05 spectre kernel: acpiphp: Slot [26] registered >Mar 17 14:01:05 spectre kernel: acpiphp: Slot [27] registered >Mar 17 14:01:05 spectre kernel: acpiphp: Slot [28] registered >Mar 17 14:01:05 spectre kernel: acpiphp: Slot [29] registered >Mar 17 14:01:05 spectre kernel: acpiphp: Slot [30] registered >Mar 17 14:01:05 spectre kernel: acpiphp: Slot [31] registered >Mar 17 14:01:05 spectre kernel: PCI host bridge to bus 0000:00 >Mar 17 14:01:05 spectre kernel: pci_bus 0000:00: root bus resource [bus 00-ff] >Mar 17 14:01:05 spectre kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7] >Mar 17 14:01:05 spectre kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff] >Mar 17 14:01:05 spectre kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff] >Mar 17 14:01:05 spectre kernel: pci_bus 0000:00: root bus resource [mem 0xe0000000-0xfebfffff] >Mar 17 14:01:05 spectre kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 >Mar 17 14:01:05 spectre kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 >Mar 17 14:01:05 spectre kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 >Mar 17 14:01:05 spectre kernel: pci 0000:00:01.1: reg 0x20: [io 0xc0e0-0xc0ef] >Mar 17 14:01:05 spectre kernel: pci 0000:00:01.2: [8086:7020] type 00 class 0x0c0300 >Mar 17 14:01:05 spectre kernel: pci 0000:00:01.2: reg 0x20: [io 0xc040-0xc05f] >Mar 17 14:01:05 spectre kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 >Mar 17 14:01:05 spectre kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI >Mar 17 14:01:05 spectre kernel: pci 0000:00:01.3: quirk: [io 0xb100-0xb10f] claimed by PIIX4 SMB >Mar 17 14:01:05 spectre kernel: pci 0000:00:02.0: [1b36:0100] type 00 class 0x030000 >Mar 17 14:01:05 spectre kernel: pci 0000:00:02.0: reg 0x10: [mem 0xf4000000-0xf7ffffff] >Mar 17 14:01:05 spectre kernel: pci 0000:00:02.0: reg 0x14: [mem 0xf8000000-0xfbffffff] >Mar 17 14:01:05 spectre kernel: pci 0000:00:02.0: reg 0x18: [mem 0xfc030000-0xfc031fff] >Mar 17 14:01:05 spectre kernel: pci 0000:00:02.0: reg 0x1c: [io 0xc060-0xc07f] >Mar 17 14:01:05 spectre kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfc020000-0xfc02ffff pref] >Mar 17 14:01:05 spectre kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 >Mar 17 14:01:05 spectre kernel: pci 0000:00:03.0: reg 0x10: [io 0xc080-0xc09f] >Mar 17 14:01:05 spectre kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfc032000-0xfc032fff] >Mar 17 14:01:05 spectre kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfc000000-0xfc01ffff pref] >Mar 17 14:01:05 spectre kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 >Mar 17 14:01:05 spectre kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc03f] >Mar 17 14:01:05 spectre kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfc033000-0xfc033fff] >Mar 17 14:01:05 spectre kernel: pci 0000:00:05.0: [1af4:1003] type 00 class 0x078000 >Mar 17 14:01:05 spectre kernel: pci 0000:00:05.0: reg 0x10: [io 0xc0a0-0xc0bf] >Mar 17 14:01:05 spectre kernel: pci 0000:00:05.0: reg 0x14: [mem 0xfc034000-0xfc034fff] >Mar 17 14:01:05 spectre kernel: pci 0000:00:07.0: [1af4:1002] type 00 class 0x00ff00 >Mar 17 14:01:05 spectre kernel: pci 0000:00:07.0: reg 0x10: [io 0xc0c0-0xc0df] >Mar 17 14:01:05 spectre kernel: ACPI: PCI Interrupt Link [LNKA] (IRQs 5 *10 11) >Mar 17 14:01:05 spectre kernel: ACPI: PCI Interrupt Link [LNKB] (IRQs 5 *10 11) >Mar 17 14:01:05 spectre kernel: ACPI: PCI Interrupt Link [LNKC] (IRQs 5 10 *11) >Mar 17 14:01:05 spectre kernel: ACPI: PCI Interrupt Link [LNKD] (IRQs 5 10 *11) >Mar 17 14:01:05 spectre kernel: ACPI: PCI Interrupt Link [LNKS] (IRQs *9) >Mar 17 14:01:05 spectre kernel: ACPI: Enabled 16 GPEs in block 00 to 0F >Mar 17 14:01:05 spectre kernel: vgaarb: device added: PCI:0000:00:02.0,decodes=io+mem,owns=io+mem,locks=none >Mar 17 14:01:05 spectre kernel: vgaarb: loaded >Mar 17 14:01:05 spectre kernel: vgaarb: bridge control possible 0000:00:02.0 >Mar 17 14:01:05 spectre kernel: SCSI subsystem initialized >Mar 17 14:01:05 spectre kernel: libata version 3.00 loaded. >Mar 17 14:01:05 spectre kernel: ACPI: bus type USB registered >Mar 17 14:01:05 spectre kernel: usbcore: registered new interface driver usbfs >Mar 17 14:01:05 spectre kernel: usbcore: registered new interface driver hub >Mar 17 14:01:05 spectre kernel: usbcore: registered new device driver usb >Mar 17 14:01:05 spectre kernel: PCI: Using ACPI for IRQ routing >Mar 17 14:01:05 spectre kernel: PCI: pci_cache_line_size set to 64 bytes >Mar 17 14:01:05 spectre kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] >Mar 17 14:01:05 spectre kernel: e820: reserve RAM buffer [mem 0xdfffe000-0xdfffffff] >Mar 17 14:01:05 spectre kernel: NetLabel: Initializing >Mar 17 14:01:05 spectre kernel: NetLabel: domain hash size = 128 >Mar 17 14:01:05 spectre kernel: NetLabel: protocols = UNLABELED CIPSOv4 >Mar 17 14:01:05 spectre kernel: NetLabel: unlabeled traffic allowed by default >Mar 17 14:01:05 spectre kernel: HPET: 3 timers in total, 0 timers will be used for per-cpu timer >Mar 17 14:01:05 spectre kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 >Mar 17 14:01:05 spectre kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter >Mar 17 14:01:05 spectre kernel: Switched to clocksource kvm-clock >Mar 17 14:01:05 spectre kernel: pnp: PnP ACPI init >Mar 17 14:01:05 spectre kernel: ACPI: bus type PNP registered >Mar 17 14:01:05 spectre kernel: pnp 00:00: Plug and Play ACPI device, IDs PNP0b00 (active) >Mar 17 14:01:05 spectre kernel: pnp 00:01: Plug and Play ACPI device, IDs PNP0303 (active) >Mar 17 14:01:05 spectre kernel: pnp 00:02: Plug and Play ACPI device, IDs PNP0f13 (active) >Mar 17 14:01:05 spectre kernel: pnp 00:03: [dma 2] >Mar 17 14:01:05 spectre kernel: pnp 00:03: Plug and Play ACPI device, IDs PNP0700 (active) >Mar 17 14:01:05 spectre kernel: pnp 00:04: Plug and Play ACPI device, IDs PNP0400 (active) >Mar 17 14:01:05 spectre kernel: pnp 00:05: Plug and Play ACPI device, IDs PNP0501 (active) >Mar 17 14:01:05 spectre kernel: pnp 00:06: Plug and Play ACPI device, IDs PNP0501 (active) >Mar 17 14:01:05 spectre kernel: pnp 00:07: Plug and Play ACPI device, IDs PNP0103 (active) >Mar 17 14:01:05 spectre kernel: pnp: PnP ACPI: found 8 devices >Mar 17 14:01:05 spectre kernel: ACPI: bus type PNP unregistered >Mar 17 14:01:05 spectre kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7] >Mar 17 14:01:05 spectre kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff] >Mar 17 14:01:05 spectre kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff] >Mar 17 14:01:05 spectre kernel: pci_bus 0000:00: resource 7 [mem 0xe0000000-0xfebfffff] >Mar 17 14:01:05 spectre kernel: NET: Registered protocol family 2 >Mar 17 14:01:05 spectre kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes) >Mar 17 14:01:05 spectre kernel: TCP bind hash table entries: 32768 (order: 9, 2621440 bytes) >Mar 17 14:01:05 spectre kernel: TCP: Hash tables configured (established 32768 bind 32768) >Mar 17 14:01:05 spectre kernel: TCP: reno registered >Mar 17 14:01:05 spectre kernel: UDP hash table entries: 2048 (order: 6, 393216 bytes) >Mar 17 14:01:05 spectre kernel: UDP-Lite hash table entries: 2048 (order: 6, 393216 bytes) >Mar 17 14:01:05 spectre kernel: NET: Registered protocol family 1 >Mar 17 14:01:05 spectre kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers >Mar 17 14:01:05 spectre kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release >Mar 17 14:01:05 spectre kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds >Mar 17 14:01:05 spectre kernel: ACPI: PCI Interrupt Link [LNKD] enabled at IRQ 11 >Mar 17 14:01:05 spectre kernel: pci 0000:00:02.0: Boot video device >Mar 17 14:01:05 spectre kernel: PCI: CLS 0 bytes, default 64 >Mar 17 14:01:05 spectre kernel: Unpacking initramfs... >Mar 17 14:01:05 spectre kernel: Freeing initrd memory: 17720K (ffff880035d54000 - ffff880036ea2000) >Mar 17 14:01:05 spectre kernel: DMA-API: preallocated 65536 debug entries >Mar 17 14:01:05 spectre kernel: DMA-API: debugging enabled by kernel config >Mar 17 14:01:05 spectre kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) >Mar 17 14:01:05 spectre kernel: software IO TLB [mem 0xdbffe000-0xdfffe000] (64MB) mapped at [ffff8800dbffe000-ffff8800dfffdfff] >Mar 17 14:01:05 spectre kernel: Scanning for low memory corruption every 60 seconds >Mar 17 14:01:05 spectre kernel: cryptomgr_test (38) used greatest stack depth: 5824 bytes left >Mar 17 14:01:05 spectre kernel: futex hash table entries: 1024 (order: 5, 131072 bytes) >Mar 17 14:01:05 spectre kernel: Initialise system trusted keyring >Mar 17 14:01:05 spectre kernel: audit: initializing netlink subsys (disabled) >Mar 17 14:01:05 spectre kernel: audit: type=2000 audit(1395079265.892:1): initialized >Mar 17 14:01:05 spectre kernel: HugeTLB registered 2 MB page size, pre-allocated 0 pages >Mar 17 14:01:05 spectre kernel: zbud: loaded >Mar 17 14:01:05 spectre kernel: VFS: Disk quotas dquot_6.5.2 >Mar 17 14:01:05 spectre kernel: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) >Mar 17 14:01:05 spectre kernel: msgmni has been set to 7856 >Mar 17 14:01:05 spectre kernel: Key type big_key registered >Mar 17 14:01:05 spectre kernel: SELinux: Registering netfilter hooks >Mar 17 14:01:05 spectre kernel: cryptomgr_test (43) used greatest stack depth: 5488 bytes left >Mar 17 14:01:05 spectre kernel: cryptomgr_test (45) used greatest stack depth: 5168 bytes left >Mar 17 14:01:05 spectre kernel: cryptomgr_test (48) used greatest stack depth: 5040 bytes left >Mar 17 14:01:05 spectre kernel: alg: No test for stdrng (krng) >Mar 17 14:01:05 spectre kernel: NET: Registered protocol family 38 >Mar 17 14:01:05 spectre kernel: Key type asymmetric registered >Mar 17 14:01:05 spectre kernel: Asymmetric key parser 'x509' registered >Mar 17 14:01:05 spectre kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 252) >Mar 17 14:01:05 spectre kernel: io scheduler noop registered >Mar 17 14:01:05 spectre kernel: io scheduler deadline registered >Mar 17 14:01:05 spectre kernel: io scheduler cfq registered (default) >Mar 17 14:01:05 spectre kernel: list_sort_test: start testing list_sort() >Mar 17 14:01:05 spectre kernel: pci_hotplug: PCI Hot Plug PCI Core version: 0.5 >Mar 17 14:01:05 spectre kernel: pciehp: PCI Express Hot Plug Controller Driver version: 0.4 >Mar 17 14:01:05 spectre kernel: intel_idle: does not run on family 6 model 2 >Mar 17 14:01:05 spectre kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input0 >Mar 17 14:01:05 spectre kernel: ACPI: Power Button [PWRF] >Mar 17 14:01:05 spectre kernel: GHES: HEST is not enabled! >Mar 17 14:01:05 spectre kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled >Mar 17 14:01:05 spectre kernel: 00:05: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A >Mar 17 14:01:05 spectre kernel: Non-volatile memory driver v1.3 >Mar 17 14:01:05 spectre kernel: Linux agpgart interface v0.103 >Mar 17 14:01:05 spectre kernel: ata_piix 0000:00:01.1: version 2.13 >Mar 17 14:01:05 spectre kernel: scsi0 : ata_piix >Mar 17 14:01:05 spectre kernel: scsi1 : ata_piix >Mar 17 14:01:05 spectre kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc0e0 irq 14 >Mar 17 14:01:05 spectre kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc0e8 irq 15 >Mar 17 14:01:05 spectre kernel: libphy: Fixed MDIO Bus: probed >Mar 17 14:01:05 spectre kernel: ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver >Mar 17 14:01:05 spectre kernel: ehci-pci: EHCI PCI platform driver >Mar 17 14:01:05 spectre kernel: ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver >Mar 17 14:01:05 spectre kernel: ohci-pci: OHCI PCI platform driver >Mar 17 14:01:05 spectre kernel: uhci_hcd: USB Universal Host Controller Interface driver >Mar 17 14:01:05 spectre kernel: uhci_hcd 0000:00:01.2: UHCI Host Controller >Mar 17 14:01:05 spectre kernel: uhci_hcd 0000:00:01.2: new USB bus registered, assigned bus number 1 >Mar 17 14:01:05 spectre kernel: uhci_hcd 0000:00:01.2: detected 2 ports >Mar 17 14:01:05 spectre kernel: uhci_hcd 0000:00:01.2: irq 11, io base 0x0000c040 >Mar 17 14:01:05 spectre kernel: usb usb1: New USB device found, idVendor=1d6b, idProduct=0001 >Mar 17 14:01:05 spectre kernel: usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1 >Mar 17 14:01:05 spectre kernel: usb usb1: Product: UHCI Host Controller >Mar 17 14:01:05 spectre kernel: usb usb1: Manufacturer: Linux 3.14.0-0.rc6.git4.1.fc21.x86_64 uhci_hcd >Mar 17 14:01:05 spectre kernel: usb usb1: SerialNumber: 0000:00:01.2 >Mar 17 14:01:05 spectre kernel: hub 1-0:1.0: USB hub found >Mar 17 14:01:05 spectre kernel: hub 1-0:1.0: 2 ports detected >Mar 17 14:01:05 spectre kernel: usbcore: registered new interface driver usbserial >Mar 17 14:01:05 spectre kernel: usbcore: registered new interface driver usbserial_generic >Mar 17 14:01:05 spectre kernel: usbserial: USB Serial support registered for generic >Mar 17 14:01:05 spectre kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 >Mar 17 14:01:05 spectre kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 >Mar 17 14:01:05 spectre kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 >Mar 17 14:01:05 spectre kernel: mousedev: PS/2 mouse device common for all mice >Mar 17 14:01:05 spectre kernel: rtc_cmos 00:00: RTC can wake from S4 >Mar 17 14:01:05 spectre kernel: rtc_cmos 00:00: rtc core: registered rtc_cmos as rtc0 >Mar 17 14:01:05 spectre kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram, hpet irqs >Mar 17 14:01:05 spectre kernel: device-mapper: uevent: version 1.0.3 >Mar 17 14:01:05 spectre kernel: device-mapper: ioctl: 4.27.0-ioctl (2013-10-30) initialised: dm-devel@redhat.com >Mar 17 14:01:05 spectre kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input1 >Mar 17 14:01:05 spectre kernel: hidraw: raw HID events driver (C) Jiri Kosina >Mar 17 14:01:05 spectre kernel: usbcore: registered new interface driver usbhid >Mar 17 14:01:05 spectre kernel: usbhid: USB HID core driver >Mar 17 14:01:05 spectre kernel: drop_monitor: Initializing network drop monitor service >Mar 17 14:01:05 spectre kernel: ip_tables: (C) 2000-2006 Netfilter Core Team >Mar 17 14:01:05 spectre kernel: TCP: cubic registered >Mar 17 14:01:05 spectre kernel: Initializing XFRM netlink socket >Mar 17 14:01:05 spectre kernel: NET: Registered protocol family 10 >Mar 17 14:01:05 spectre kernel: mip6: Mobile IPv6 >Mar 17 14:01:05 spectre kernel: NET: Registered protocol family 17 >Mar 17 14:01:05 spectre kernel: Loading compiled-in X.509 certificates >Mar 17 14:01:05 spectre kernel: Loaded X.509 cert 'Fedora kernel signing key: 5ddcc90806cba1e382c1a18c67825344ccb0beb1' >Mar 17 14:01:05 spectre kernel: registered taskstats version 1 >Mar 17 14:01:05 spectre kernel: Magic number: 6:130:39 >Mar 17 14:01:05 spectre kernel: rtc_cmos 00:00: setting system clock to 2014-03-17 18:01:05 UTC (1395079265) >Mar 17 14:01:05 spectre kernel: PM: Hibernation image not present or could not be loaded. >Mar 17 14:01:05 spectre kernel: ata2.01: NODEV after polling detection >Mar 17 14:01:05 spectre kernel: ata2.00: ATAPI: QEMU DVD-ROM, 1.6.1, max UDMA/100 >Mar 17 14:01:05 spectre kernel: ata2.00: configured for MWDMA2 >Mar 17 14:01:05 spectre kernel: scsi 1:0:0:0: CD-ROM QEMU QEMU DVD-ROM 1.6. PQ: 0 ANSI: 5 >Mar 17 14:01:05 spectre kernel: sr0: scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray >Mar 17 14:01:05 spectre kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 >Mar 17 14:01:05 spectre kernel: sr 1:0:0:0: Attached scsi CD-ROM sr0 >Mar 17 14:01:05 spectre kernel: sr 1:0:0:0: Attached scsi generic sg0 type 5 >Mar 17 14:01:05 spectre kernel: Freeing unused kernel memory: 3700K (ffffffff81d93000 - ffffffff82130000) >Mar 17 14:01:05 spectre kernel: Write protecting the kernel read-only data: 12288k >Mar 17 14:01:05 spectre kernel: Freeing unused kernel memory: 76K (ffff8800017ed000 - ffff880001800000) >Mar 17 14:01:05 spectre kernel: Freeing unused kernel memory: 796K (ffff880001b39000 - ffff880001c00000) >Mar 17 14:01:05 spectre kernel: random: systemd urandom read with 5 bits of entropy available >Mar 17 14:01:05 spectre systemd[1]: systemd 211 running in system mode. (+PAM +LIBWRAP +AUDIT +SELINUX +IMA +SYSVINIT +LIBCRYPTSETUP +GCRYPT +ACL +XZ +SECCOMP -APPARMOR) >Mar 17 14:01:05 spectre systemd[1]: Detected virtualization 'kvm'. >Mar 17 14:01:05 spectre systemd[1]: Detected architecture 'x86-64'. >Mar 17 14:01:05 spectre systemd[1]: Running in initial RAM disk. >Mar 17 14:01:05 spectre systemd[1]: Set hostname to <spectre>. >Mar 17 14:01:05 spectre kernel: systemd-fstab-g (67) used greatest stack depth: 5032 bytes left >Mar 17 14:01:05 spectre systemd[1]: Expecting device dev-mapper-fedora\x2dswap.device... >Mar 17 14:01:05 spectre systemd[1]: Expecting device dev-disk-by\x2duuid-1e685958\x2dfb94\x2d40dc\x2da650\x2de06b77358e64.device... >Mar 17 14:01:05 spectre systemd[1]: Expecting device dev-mapper-fedora\x2droot.device... >Mar 17 14:01:05 spectre systemd[1]: Starting Timers. >Mar 17 14:01:05 spectre systemd[1]: Reached target Timers. >Mar 17 14:01:05 spectre systemd[1]: Starting -.slice. >Mar 17 14:01:05 spectre systemd[1]: Created slice -.slice. >Mar 17 14:01:05 spectre systemd[1]: Starting udev Kernel Socket. >Mar 17 14:01:05 spectre systemd[1]: Listening on udev Kernel Socket. >Mar 17 14:01:05 spectre systemd[1]: Starting Journal Socket. >Mar 17 14:01:05 spectre systemd[1]: Listening on Journal Socket. >Mar 17 14:01:05 spectre systemd[1]: Starting System Slice. >Mar 17 14:01:05 spectre systemd[1]: Created slice System Slice. >Mar 17 14:01:05 spectre systemd[1]: Starting dracut cmdline hook... >Mar 17 14:01:05 spectre systemd[1]: Starting system-systemd\x2dfsck.slice. >Mar 17 14:01:05 spectre systemd[1]: Created slice system-systemd\x2dfsck.slice. >Mar 17 14:01:05 spectre systemd[1]: Started Load Kernel Modules. >Mar 17 14:01:05 spectre systemd[1]: Starting Create list of required static device nodes for the current kernel... >Mar 17 14:01:05 spectre systemd[1]: Starting Journal Service... >Mar 17 14:01:05 spectre systemd[1]: Started Journal Service. >Mar 17 14:01:05 spectre systemd-journal[83]: Journal started >Mar 17 14:01:05 spectre systemd[1]: Starting Slices. >Mar 17 14:01:05 spectre systemd[1]: Reached target Slices. >Mar 17 14:01:05 spectre systemd[1]: Starting Setup Virtual Console... >Mar 17 14:01:05 spectre systemd[1]: Starting udev Control Socket. >Mar 17 14:01:05 spectre systemd[1]: Listening on udev Control Socket. >Mar 17 14:01:05 spectre systemd[1]: Starting Sockets. >Mar 17 14:01:05 spectre systemd[1]: Reached target Sockets. >Mar 17 14:01:05 spectre systemd[1]: Starting Swap. >Mar 17 14:01:05 spectre systemd[1]: Reached target Swap. >Mar 17 14:01:05 spectre systemd[1]: Starting Local File Systems. >Mar 17 14:01:05 spectre systemd[1]: Reached target Local File Systems. >Mar 17 14:01:05 spectre systemd[1]: Started Create Static Device Nodes in /dev. >Mar 17 14:01:05 spectre dracut-cmdline[81]: dracut-21 (Rawhide) dracut-036-16.git20140206.fc21 >Mar 17 14:01:05 spectre kernel: usb 1-1: new full-speed USB device number 2 using uhci_hcd >Mar 17 14:01:05 spectre systemd[1]: Started Setup Virtual Console. >Mar 17 14:01:05 spectre dracut-cmdline[81]: warn "Cancelling resume operation. Device not found."; >Mar 17 14:01:05 spectre systemd[1]: Started dracut cmdline hook. >Mar 17 14:01:05 spectre systemd[1]: Starting dracut pre-udev hook... >Mar 17 14:01:05 spectre kernel: usb 1-1: New USB device found, idVendor=0627, idProduct=0001 >Mar 17 14:01:05 spectre kernel: usb 1-1: New USB device strings: Mfr=1, Product=3, SerialNumber=5 >Mar 17 14:01:05 spectre kernel: usb 1-1: Product: QEMU USB Tablet >Mar 17 14:01:05 spectre kernel: usb 1-1: Manufacturer: QEMU >Mar 17 14:01:05 spectre kernel: usb 1-1: SerialNumber: 42 >Mar 17 14:01:05 spectre kernel: input: QEMU QEMU USB Tablet as /devices/pci0000:00/0000:00:01.2/usb1/1-1/1-1:1.0/0003:0627:0001.0001/input/input4 >Mar 17 14:01:05 spectre kernel: hid-generic 0003:0627:0001.0001: input,hidraw0: USB HID v0.01 Pointer [QEMU QEMU USB Tablet] on usb-0000:00:01.2-1/input0 >Mar 17 14:01:05 spectre systemd[1]: Started dracut pre-udev hook. >Mar 17 14:01:05 spectre systemd[1]: Starting udev Kernel Device Manager... >Mar 17 14:01:05 spectre systemd[1]: Started udev Kernel Device Manager. >Mar 17 14:01:05 spectre systemd[1]: Started dracut pre-trigger hook. >Mar 17 14:01:05 spectre systemd[1]: Starting udev Coldplug all Devices... >Mar 17 14:01:05 spectre systemd-udevd[223]: starting version 211 >Mar 17 14:01:06 spectre systemd[1]: Mounting Configuration File System... >Mar 17 14:01:06 spectre systemd[1]: Mounted Configuration File System. >Mar 17 14:01:06 spectre systemd[1]: Started udev Coldplug all Devices. >Mar 17 14:01:06 spectre systemd[1]: Starting dracut initqueue hook... >Mar 17 14:01:06 spectre systemd[1]: Starting System Initialization. >Mar 17 14:01:06 spectre systemd[1]: Reached target System Initialization. >Mar 17 14:01:06 spectre systemd[1]: Starting Show Plymouth Boot Screen... >Mar 17 14:01:06 spectre kernel: ACPI: PCI Interrupt Link [LNKC] enabled at IRQ 10 >Mar 17 14:01:06 spectre kernel: [drm] Initialized drm 1.1.0 20060810 >Mar 17 14:01:06 spectre kernel: ACPI: PCI Interrupt Link [LNKA] enabled at IRQ 10 >Mar 17 14:01:06 spectre kernel: ACPI: PCI Interrupt Link [LNKB] enabled at IRQ 11 >Mar 17 14:01:06 spectre kernel: [drm] Device Version 0.0 >Mar 17 14:01:06 spectre kernel: [drm] Compression level 0 log level 0 >Mar 17 14:01:06 spectre kernel: [drm] Currently using mode #0, list at 0x488 >Mar 17 14:01:06 spectre kernel: [drm] 12286 io pages at offset 0x1000000 >Mar 17 14:01:06 spectre kernel: [drm] 16777216 byte draw area at offset 0x0 >Mar 17 14:01:06 spectre kernel: [drm] RAM header offset: 0x3ffe000 >Mar 17 14:01:06 spectre kernel: [drm] rom modes offset 0x488 for 128 modes >Mar 17 14:01:06 spectre kernel: ata_id (259) used greatest stack depth: 3808 bytes left >Mar 17 14:01:06 spectre kernel: [TTM] Zone kernel: Available graphics memory: 2013478 kiB >Mar 17 14:01:06 spectre kernel: [TTM] Initializing pool allocator >Mar 17 14:01:06 spectre kernel: [TTM] Initializing DMA pool allocator >Mar 17 14:01:06 spectre kernel: [drm] qxl: 16M of VRAM memory size >Mar 17 14:01:06 spectre kernel: [drm] qxl: 63M of IO pages memory ready (VRAM domain) >Mar 17 14:01:06 spectre kernel: [drm] qxl: 64M of Surface memory size >Mar 17 14:01:06 spectre kernel: [drm] main mem slot 1 [f4000000,3ffe000] >Mar 17 14:01:06 spectre kernel: [drm] surface mem slot 2 [f8000000,4000000] >Mar 17 14:01:06 spectre kernel: [drm] fb mappable at 0xF4000000, size 3145728 >Mar 17 14:01:06 spectre kernel: [drm] fb: depth 24, pitch 4096, width 1024, height 768 >Mar 17 14:01:06 spectre kernel: fbcon: qxldrmfb (fb0) is primary device >Mar 17 14:01:06 spectre kernel: virtio-pci 0000:00:03.0: irq 40 for MSI/MSI-X >Mar 17 14:01:06 spectre kernel: virtio-pci 0000:00:03.0: irq 41 for MSI/MSI-X >Mar 17 14:01:06 spectre kernel: virtio-pci 0000:00:03.0: irq 42 for MSI/MSI-X >Mar 17 14:01:06 spectre kernel: Console: switching to colour frame buffer device 128x48 >Mar 17 14:01:06 spectre kernel: virtio-pci 0000:00:04.0: irq 43 for MSI/MSI-X >Mar 17 14:01:06 spectre kernel: virtio-pci 0000:00:04.0: irq 44 for MSI/MSI-X >Mar 17 14:01:06 spectre kernel: blk-mq: CPU -> queue map >Mar 17 14:01:06 spectre kernel: CPU 0 -> Queue 0 >Mar 17 14:01:06 spectre kernel: CPU 1 -> Queue 0 >Mar 17 14:01:06 spectre kernel: CPU 2 -> Queue 0 >Mar 17 14:01:06 spectre kernel: CPU 3 -> Queue 0 >Mar 17 14:01:06 spectre kernel: vda: vda1 vda2 >Mar 17 14:01:06 spectre kernel: qxl 0000:00:02.0: fb0: qxldrmfb frame buffer device >Mar 17 14:01:06 spectre kernel: qxl 0000:00:02.0: registered panic notifier >Mar 17 14:01:06 spectre kernel: [drm] Initialized qxl 0.1.0 20120117 for 0000:00:02.0 on minor 0 >Mar 17 14:01:06 spectre systemd[1]: Received SIGRTMIN+20 from PID 249 (plymouthd). >Mar 17 14:01:06 spectre systemd[1]: Started Show Plymouth Boot Screen. >Mar 17 14:01:06 spectre systemd[1]: Started Dispatch Password Requests to Console Directory Watch. >Mar 17 14:01:06 spectre systemd[1]: Starting Paths. >Mar 17 14:01:06 spectre systemd[1]: Reached target Paths. >Mar 17 14:01:06 spectre systemd[1]: Starting Forward Password Requests to Plymouth Directory Watch. >Mar 17 14:01:06 spectre systemd[1]: Started Forward Password Requests to Plymouth Directory Watch. >Mar 17 14:01:06 spectre systemd[1]: Starting Basic System. >Mar 17 14:01:06 spectre systemd[1]: Reached target Basic System. >Mar 17 14:01:06 spectre systemd[1]: Found device /dev/disk/by-uuid/1e685958-fb94-40dc-a650-e06b77358e64. >Mar 17 14:01:06 spectre kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 >Mar 17 14:01:06 spectre dracut-initqueue[247]: Scanning devices vda2 for LVM logical volumes fedora/root fedora/swap fedora/swap fedora/root >Mar 17 14:01:06 spectre dracut-initqueue[247]: inactive '/dev/fedora/swap' [1.95 GiB] inherit >Mar 17 14:01:06 spectre dracut-initqueue[247]: inactive '/dev/fedora/root' [17.09 GiB] inherit >Mar 17 14:01:06 spectre kernel: bio: create slab <bio-1> at 1 >Mar 17 14:01:06 spectre kernel: tsc: Refined TSC clocksource calibration: 3392.257 MHz >Mar 17 14:01:06 spectre systemd[1]: Found device /dev/mapper/fedora-swap. >Mar 17 14:01:06 spectre systemd[1]: Found device /dev/mapper/fedora-root. >Mar 17 14:01:06 spectre systemd[1]: Starting File System Check on /dev/mapper/fedora-root... >Mar 17 14:01:06 spectre systemd[1]: Started dracut initqueue hook. >Mar 17 14:01:06 spectre systemd[1]: Starting dracut pre-mount hook... >Mar 17 14:01:06 spectre kernel: PM: Starting manual resume from disk >Mar 17 14:01:06 spectre kernel: PM: Hibernation image partition 253:0 present >Mar 17 14:01:06 spectre kernel: PM: Looking for hibernation image. >Mar 17 14:01:06 spectre kernel: PM: Image not found (code -22) >Mar 17 14:01:06 spectre kernel: PM: Hibernation image not present or could not be loaded. >Mar 17 14:01:06 spectre systemd[1]: Started dracut pre-mount hook. >Mar 17 14:01:06 spectre systemd-fsck[342]: /dev/mapper/fedora-root: recovering journal >Mar 17 14:01:09 spectre kernel: systemd-udevd (229) used greatest stack depth: 2088 bytes left >Mar 17 14:01:10 spectre systemd-fsck[342]: /dev/mapper/fedora-root: Clearing orphaned inode 920178 (uid=42, gid=42, mode=0100644, size=639) >Mar 17 14:01:10 spectre systemd-fsck[342]: /dev/mapper/fedora-root: clean, 189562/1120112 files, 2457052/4478976 blocks >Mar 17 14:01:10 spectre systemd[1]: Started File System Check on /dev/mapper/fedora-root. >Mar 17 14:01:10 spectre systemd[1]: Mounting /sysroot... >Mar 17 14:01:10 spectre systemd[1]: Mounted /sysroot. >Mar 17 14:01:10 spectre kernel: EXT4-fs (dm-1): mounted filesystem with ordered data mode. Opts: (null) >Mar 17 14:01:10 spectre systemd[1]: Starting Initrd Root File System. >Mar 17 14:01:10 spectre systemd[1]: Reached target Initrd Root File System. >Mar 17 14:01:10 spectre systemd[1]: Starting Reload Configuration from the Real Root... >Mar 17 14:01:10 spectre systemd[1]: Reloading. >Mar 17 14:01:11 spectre systemd[1]: Started Reload Configuration from the Real Root. >Mar 17 14:01:11 spectre systemd[1]: Starting Initrd File Systems. >Mar 17 14:01:11 spectre systemd[1]: Reached target Initrd File Systems. >Mar 17 14:01:11 spectre systemd[1]: Started dracut mount hook. >Mar 17 14:01:11 spectre systemd[1]: Starting Initrd Default Target. >Mar 17 14:01:11 spectre systemd[1]: Reached target Initrd Default Target. >Mar 17 14:01:11 spectre systemd[1]: Starting dracut pre-pivot and cleanup hook... >Mar 17 14:01:11 spectre systemd[1]: Started dracut pre-pivot and cleanup hook. >Mar 17 14:01:11 spectre systemd[1]: Starting Cleaning Up and Shutting Down Daemons... >Mar 17 14:01:11 spectre systemd[1]: Stopping Cleaning Up and Shutting Down Daemons... >Mar 17 14:01:11 spectre systemd[1]: Starting Plymouth switch root service... >Mar 17 14:01:11 spectre systemd[1]: Stopped Cleaning Up and Shutting Down Daemons. >Mar 17 14:01:11 spectre systemd[1]: Stopping dracut pre-pivot and cleanup hook... >Mar 17 14:01:11 spectre systemd[1]: Stopped dracut pre-pivot and cleanup hook. >Mar 17 14:01:11 spectre systemd[1]: Stopping dracut pre-mount hook... >Mar 17 14:01:11 spectre systemd[1]: Stopped dracut pre-mount hook. >Mar 17 14:01:11 spectre systemd[1]: Stopping dracut initqueue hook... >Mar 17 14:01:11 spectre systemd[1]: Stopped dracut initqueue hook. >Mar 17 14:01:11 spectre systemd[1]: Stopping Initrd Default Target. >Mar 17 14:01:11 spectre systemd[1]: Stopped target Initrd Default Target. >Mar 17 14:01:11 spectre systemd[1]: Stopping Basic System. >Mar 17 14:01:11 spectre systemd[1]: Stopped target Basic System. >Mar 17 14:01:11 spectre systemd[1]: Stopping Slices. >Mar 17 14:01:11 spectre systemd[1]: Stopped target Slices. >Mar 17 14:01:11 spectre systemd[1]: Stopping Paths. >Mar 17 14:01:11 spectre systemd[1]: Stopped target Paths. >Mar 17 14:01:11 spectre systemd[1]: Stopping Timers. >Mar 17 14:01:11 spectre systemd[1]: Stopped target Timers. >Mar 17 14:01:11 spectre systemd[1]: Stopping Sockets. >Mar 17 14:01:11 spectre systemd[1]: Stopped target Sockets. >Mar 17 14:01:11 spectre systemd[1]: Stopping System Initialization. >Mar 17 14:01:11 spectre systemd[1]: Stopped target System Initialization. >Mar 17 14:01:11 spectre systemd[1]: Stopping udev Coldplug all Devices... >Mar 17 14:01:11 spectre systemd[1]: Stopped udev Coldplug all Devices. >Mar 17 14:01:11 spectre systemd[1]: Stopping Swap. >Mar 17 14:01:11 spectre systemd[1]: Stopped target Swap. >Mar 17 14:01:11 spectre systemd[1]: Stopping Local File Systems. >Mar 17 14:01:11 spectre systemd[1]: Stopped target Local File Systems. >Mar 17 14:01:11 spectre systemd[1]: Stopping udev Kernel Device Manager... >Mar 17 14:01:11 spectre systemd[1]: Stopped udev Kernel Device Manager. >Mar 17 14:01:11 spectre systemd[1]: Stopping dracut pre-udev hook... >Mar 17 14:01:11 spectre systemd[1]: Stopped dracut pre-udev hook. >Mar 17 14:01:11 spectre systemd[1]: Stopping dracut cmdline hook... >Mar 17 14:01:11 spectre systemd[1]: Stopped dracut cmdline hook. >Mar 17 14:01:11 spectre systemd[1]: Stopping Create Static Device Nodes in /dev... >Mar 17 14:01:11 spectre systemd[1]: Stopped Create Static Device Nodes in /dev. >Mar 17 14:01:11 spectre systemd[1]: Stopping Create list of required static device nodes for the current kernel... >Mar 17 14:01:11 spectre systemd[1]: Stopped Create list of required static device nodes for the current kernel. >Mar 17 14:01:11 spectre systemd[1]: Stopping udev Control Socket. >Mar 17 14:01:11 spectre systemd[1]: Closed udev Control Socket. >Mar 17 14:01:11 spectre systemd[1]: Stopping udev Kernel Socket. >Mar 17 14:01:11 spectre systemd[1]: Closed udev Kernel Socket. >Mar 17 14:01:11 spectre systemd[1]: Starting Cleanup udevd DB... >Mar 17 14:01:11 spectre systemd[1]: Started Cleanup udevd DB. >Mar 17 14:01:11 spectre systemd[1]: Starting Switch Root. >Mar 17 14:01:11 spectre systemd[1]: Reached target Switch Root. >Mar 17 14:01:11 spectre systemd[1]: Started Plymouth switch root service. >Mar 17 14:01:11 spectre systemd[1]: Starting Switch Root... >Mar 17 14:01:11 spectre systemd[1]: Switching root. >Mar 17 14:01:11 spectre systemd-journal[83]: Journal stopped >Mar 17 14:01:22 spectre systemd-journal[439]: Runtime journal is using 8.0M (max allowed 196.6M, trying to leave 294.9M free of 1.9G available â current limit 196.6M). >Mar 17 14:01:22 spectre systemd-journal[439]: Runtime journal is using 8.0M (max allowed 196.6M, trying to leave 294.9M free of 1.9G available â current limit 196.6M). >Mar 17 14:01:22 spectre systemd-journald[83]: Received SIGTERM from PID 1 (systemd). >Mar 17 14:01:22 spectre kernel: audit: type=1404 audit(1395079274.372:2): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 >Mar 17 14:01:22 spectre kernel: SELinux: 2048 avtab hash slots, 99066 rules. >Mar 17 14:01:22 spectre kernel: SELinux: 2048 avtab hash slots, 99066 rules. >Mar 17 14:01:22 spectre kernel: SELinux: 8 users, 101 roles, 4823 types, 277 bools, 1 sens, 1024 cats >Mar 17 14:01:22 spectre kernel: SELinux: 83 classes, 99066 rules >Mar 17 14:01:22 spectre kernel: SELinux: Completing initialization. >Mar 17 14:01:22 spectre kernel: SELinux: Setting up existing superblocks. >Mar 17 14:01:22 spectre kernel: SELinux: initialized (dev rootfs, type rootfs), uses genfs_contexts >Mar 17 14:01:22 spectre kernel: SELinux: initialized (dev bdev, type bdev), uses genfs_contexts >Mar 17 14:01:22 spectre kernel: SELinux: initialized (dev proc, type proc), uses genfs_contexts >Mar 17 14:01:22 spectre kernel: SELinux: initialized (dev tmpfs, type tmpfs), uses transition SIDs >Mar 17 14:01:22 spectre kernel: SELinux: initialized (dev devtmpfs, type devtmpfs), uses transition SIDs >Mar 17 14:01:22 spectre kernel: SELinux: initialized (dev debugfs, type debugfs), uses genfs_contexts >Mar 17 14:01:22 spectre kernel: SELinux: initialized (dev sockfs, type sockfs), uses task SIDs >Mar 17 14:01:22 spectre kernel: SELinux: initialized (dev pipefs, type pipefs), uses task SIDs >Mar 17 14:01:22 spectre kernel: SELinux: initialized (dev anon_inodefs, type anon_inodefs), uses genfs_contexts >Mar 17 14:01:22 spectre kernel: SELinux: initialized (dev aio, type aio), not configured for labeling >Mar 17 14:01:22 spectre kernel: SELinux: initialized (dev devpts, type devpts), uses transition SIDs >Mar 17 14:01:22 spectre kernel: SELinux: initialized (dev hugetlbfs, type hugetlbfs), uses transition SIDs >Mar 17 14:01:22 spectre kernel: SELinux: initialized (dev mqueue, type mqueue), uses transition SIDs >Mar 17 14:01:22 spectre kernel: SELinux: initialized (dev selinuxfs, type selinuxfs), uses genfs_contexts >Mar 17 14:01:22 spectre kernel: SELinux: initialized (dev sysfs, type sysfs), uses genfs_contexts >Mar 17 14:01:22 spectre kernel: SELinux: initialized (dev securityfs, type securityfs), uses genfs_contexts >Mar 17 14:01:22 spectre kernel: SELinux: initialized (dev tmpfs, type tmpfs), uses transition SIDs >Mar 17 14:01:22 spectre kernel: SELinux: initialized (dev tmpfs, type tmpfs), uses transition SIDs >Mar 17 14:01:22 spectre kernel: SELinux: initialized (dev tmpfs, type tmpfs), uses transition SIDs >Mar 17 14:01:22 spectre kernel: SELinux: initialized (dev cgroup, type cgroup), uses genfs_contexts >Mar 17 14:01:22 spectre kernel: SELinux: initialized (dev pstore, type pstore), uses genfs_contexts >Mar 17 14:01:22 spectre kernel: SELinux: initialized (dev cgroup, type cgroup), uses genfs_contexts >Mar 17 14:01:22 spectre kernel: SELinux: initialized (dev cgroup, type cgroup), uses genfs_contexts >Mar 17 14:01:22 spectre kernel: SELinux: initialized (dev cgroup, type cgroup), uses genfs_contexts >Mar 17 14:01:22 spectre kernel: SELinux: initialized (dev cgroup, type cgroup), uses genfs_contexts >Mar 17 14:01:22 spectre kernel: SELinux: initialized (dev cgroup, type cgroup), uses genfs_contexts >Mar 17 14:01:22 spectre kernel: SELinux: initialized (dev cgroup, type cgroup), uses genfs_contexts >Mar 17 14:01:22 spectre kernel: SELinux: initialized (dev cgroup, type cgroup), uses genfs_contexts >Mar 17 14:01:22 spectre kernel: SELinux: initialized (dev cgroup, type cgroup), uses genfs_contexts >Mar 17 14:01:22 spectre kernel: SELinux: initialized (dev cgroup, type cgroup), uses genfs_contexts >Mar 17 14:01:22 spectre kernel: SELinux: initialized (dev configfs, type configfs), uses genfs_contexts >Mar 17 14:01:22 spectre kernel: SELinux: initialized (dev dm-1, type ext4), uses xattr >Mar 17 14:01:22 spectre kernel: audit: type=1403 audit(1395079275.270:3): policy loaded auid=4294967295 ses=4294967295 >Mar 17 14:01:22 spectre systemd[1]: Successfully loaded SELinux policy in 1.066404s. >Mar 17 14:01:22 spectre systemd[1]: Relabelled /dev and /run in 27.005ms. >Mar 17 14:01:22 spectre systemd-gpt-auto-generator[431]: Out of memory. >Mar 17 14:01:22 spectre kernel: SELinux: initialized (dev autofs, type autofs), uses genfs_contexts >Mar 17 14:01:22 spectre kernel: SELinux: initialized (dev hugetlbfs, type hugetlbfs), uses transition SIDs >Mar 17 14:01:22 spectre kernel: SELinux: initialized (dev tmpfs, type tmpfs), uses transition SIDs >Mar 17 14:01:22 spectre systemd-journal[439]: Journal started >Mar 17 14:01:16 spectre systemd[1]: systemd 211 running in system mode. (+PAM +LIBWRAP +AUDIT +SELINUX +IMA +SYSVINIT +LIBCRYPTSETUP +GCRYPT +ACL +XZ +SECCOMP -APPARMOR) >Mar 17 14:01:16 spectre systemd[1]: Detected virtualization 'kvm'. >Mar 17 14:01:16 spectre systemd[1]: Detected architecture 'x86-64'. >Mar 17 14:01:16 spectre systemd[1]: Set hostname to <spectre>. >Mar 17 14:01:17 spectre systemd[425]: /usr/lib/systemd/system-generators/systemd-gpt-auto-generator failed with error code 1. >Mar 17 14:01:18 spectre systemd[1]: Configuration file /usr/lib/systemd/system/auditd.service is marked world-inaccessible. This has no effect as configuration data is accessible via APIs without restrictions. Proceeding anyway. >Mar 17 14:01:21 spectre systemd[1]: Mounting Huge Pages File System... >Mar 17 14:01:21 spectre systemd[1]: Mounting POSIX Message Queue File System... >Mar 17 14:01:21 spectre systemd[1]: Started Dispatch Password Requests to Console Directory Watch. >Mar 17 14:01:21 spectre systemd[1]: Started Load Kernel Modules. >Mar 17 14:01:21 spectre systemd[1]: Starting Arbitrary Executable File Formats File System Automount Point. >Mar 17 14:01:22 spectre systemd[1]: Started Create list of required static device nodes for the current kernel. >Mar 17 14:01:22 spectre systemd[1]: Starting Create Static Device Nodes in /dev... >Mar 17 14:01:22 spectre systemd[1]: Started udev Coldplug all Devices. >Mar 17 14:01:22 spectre systemd[1]: Starting udev Wait for Complete Device Initialization... >Mar 17 14:01:22 spectre systemd[1]: Starting LVM2 metadata daemon... >Mar 17 14:01:22 spectre systemd[1]: Started LVM2 metadata daemon. >Mar 17 14:01:22 spectre lvm[446]: 2 logical volume(s) in volume group "fedora" monitored >Mar 17 14:01:22 spectre systemd[1]: Started Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling. >Mar 17 14:01:22 spectre kernel: device-mapper: multipath: version 1.6.0 loaded >Mar 17 14:01:23 spectre systemd[1]: Started Create Static Device Nodes in /dev. >Mar 17 14:01:23 spectre systemd[1]: Starting udev Kernel Device Manager... >Mar 17 14:01:23 spectre kernel: RPC: Registered named UNIX socket transport module. >Mar 17 14:01:23 spectre kernel: RPC: Registered udp transport module. >Mar 17 14:01:23 spectre kernel: RPC: Registered tcp transport module. >Mar 17 14:01:23 spectre kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. >Mar 17 14:01:23 spectre kernel: SELinux: initialized (dev rpc_pipefs, type rpc_pipefs), uses genfs_contexts >Mar 17 14:01:23 spectre systemd[1]: Mounted RPC Pipe File System. >Mar 17 14:01:23 spectre systemd-udevd[475]: starting version 211 >Mar 17 14:01:23 spectre systemd[1]: Started udev Kernel Device Manager. >Mar 17 14:01:23 spectre systemd[1]: PID file /var/run/multipathd/multipathd.pid not readable (yet?) after start. >Mar 17 14:01:24 spectre systemd-fsck[458]: /dev/mapper/fedora-root: clean, 189562/1120112 files, 2457052/4478976 blocks >Mar 17 14:01:24 spectre systemd[1]: Started File System Check on Root Device. >Mar 17 14:01:24 spectre systemd[1]: Starting Remount Root and Kernel File Systems... >Mar 17 14:01:24 spectre kernel: Installing knfsd (copyright (C) 1996 okir@monad.swb.de). >Mar 17 14:01:24 spectre kernel: SELinux: initialized (dev nfsd, type nfsd), uses genfs_contexts >Mar 17 14:01:24 spectre systemd[1]: Mounted RPC Pipe File System. >Mar 17 14:01:24 spectre kernel: EXT4-fs (dm-1): re-mounted. Opts: (null) >Mar 17 14:01:24 spectre systemd[1]: Started Remount Root and Kernel File Systems. >Mar 17 14:01:24 spectre systemd[1]: Starting Import network configuration from initramfs... >Mar 17 14:01:24 spectre systemd[1]: Starting Configure read-only root support... >Mar 17 14:01:24 spectre systemd[1]: Starting Local File Systems (Pre). >Mar 17 14:01:24 spectre systemd[1]: Reached target Local File Systems (Pre). >Mar 17 14:01:24 spectre systemd[1]: Starting Load/Save Random Seed... >Mar 17 14:01:24 spectre systemd[1]: Started Load/Save Random Seed. >Mar 17 14:01:24 spectre systemd[1]: Started Configure read-only root support. >Mar 17 14:01:24 spectre systemd[1]: Started Device-Mapper Multipath Device Controller. >Mar 17 14:01:24 spectre multipathd[479]: path checkers start up >Mar 17 14:01:25 spectre systemd[1]: Started Import network configuration from initramfs. >Mar 17 14:01:26 spectre kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0xb100, revision 0 >Mar 17 14:01:26 spectre kernel: random: nonblocking pool is initialized >Mar 17 14:01:26 spectre multipathd[479]: vda: add path (uevent) >Mar 17 14:01:26 spectre multipathd[479]: vda: spurious uevent, path already in pathvec >Mar 17 14:01:26 spectre multipathd[479]: vda: failed to get path uid >Mar 17 14:01:26 spectre multipathd[479]: uevent trigger error >Mar 17 14:01:27 spectre systemd[1]: Found device /dev/disk/by-uuid/1e685958-fb94-40dc-a650-e06b77358e64. >Mar 17 14:01:27 spectre systemd[1]: Starting File System Check on /dev/disk/by-uuid/1e685958-fb94-40dc-a650-e06b77358e64... >Mar 17 14:01:27 spectre kernel: microcode: CPU0 sig=0x623, pf=0x0, revision=0x1 >Mar 17 14:01:27 spectre systemd-fsck[530]: /dev/vda1: recovering journal >Mar 17 14:01:27 spectre systemd[1]: Starting system-lvm2\x2dpvscan.slice. >Mar 17 14:01:27 spectre systemd[1]: Created slice system-lvm2\x2dpvscan.slice. >Mar 17 14:01:27 spectre systemd[1]: Starting LVM2 PV scan on device 252:2... >Mar 17 14:01:27 spectre kernel: parport_pc 00:04: reported by Plug and Play ACPI >Mar 17 14:01:27 spectre kernel: virtio-pci 0000:00:05.0: irq 45 for MSI/MSI-X >Mar 17 14:01:27 spectre kernel: virtio-pci 0000:00:05.0: irq 46 for MSI/MSI-X >Mar 17 14:01:27 spectre kernel: microcode: CPU1 sig=0x623, pf=0x0, revision=0x1 >Mar 17 14:01:27 spectre kernel: microcode: CPU2 sig=0x623, pf=0x0, revision=0x1 >Mar 17 14:01:27 spectre kernel: microcode: CPU3 sig=0x623, pf=0x0, revision=0x1 >Mar 17 14:01:27 spectre kernel: microcode: Microcode Update Driver: v2.00 <tigran@aivazian.fsnet.co.uk>, Peter Oruba >Mar 17 14:01:27 spectre systemd-fsck[530]: /dev/vda1: clean, 320/128016 files, 161097/512000 blocks >Mar 17 14:01:27 spectre pvscan[537]: 2 logical volume(s) in volume group "fedora" now active >Mar 17 14:01:27 spectre systemd[1]: Started File System Check on /dev/disk/by-uuid/1e685958-fb94-40dc-a650-e06b77358e64. >Mar 17 14:01:27 spectre systemd[1]: Mounting /boot... >Mar 17 14:01:27 spectre kernel: EXT4-fs (vda1): mounted filesystem with ordered data mode. Opts: (null) >Mar 17 14:01:27 spectre kernel: SELinux: initialized (dev vda1, type ext4), uses xattr >Mar 17 14:01:27 spectre systemd[1]: Mounted /boot. >Mar 17 14:01:27 spectre mtp-probe[525]: checking bus 1, device 2: "/sys/devices/pci0000:00/0000:00:01.2/usb1/1-1" >Mar 17 14:01:27 spectre mtp-probe[525]: bus: 1, device: 2 was not an MTP device >Mar 17 14:01:28 spectre kernel: ppdev: user-space parallel port driver >Mar 17 14:01:28 spectre systemd[1]: Found device /dev/mapper/fedora-swap. >Mar 17 14:01:28 spectre systemd[1]: Started Load legacy module configuration. >Mar 17 14:01:28 spectre systemd[1]: Started Set Up Additional Binary Formats. >Mar 17 14:01:28 spectre systemd[1]: Started Dispatch Password Requests to Console Directory Watch. >Mar 17 14:01:28 spectre systemd[1]: Started Load Kernel Modules. >Mar 17 14:01:28 spectre systemd[1]: Mounted FUSE Control File System. >Mar 17 14:01:28 spectre systemd[1]: Activating swap /dev/mapper/fedora-swap... >Mar 17 14:01:28 spectre systemd[1]: Started udev Wait for Complete Device Initialization. >Mar 17 14:01:28 spectre systemd[1]: Started LVM2 PV scan on device 252:2. >Mar 17 14:01:28 spectre systemd[1]: Starting Activation of DM RAID sets... >Mar 17 14:01:28 spectre systemd-udevd[513]: renamed network interface eth0 to ens3 >Mar 17 14:01:28 spectre kernel: Adding 2047996k swap on /dev/mapper/fedora-swap. Priority:-1 extents:1 across:2047996k FS >Mar 17 14:01:28 spectre systemd[1]: Activated swap /dev/mapper/fedora-swap. >Mar 17 14:01:28 spectre systemd[1]: Starting Swap. >Mar 17 14:01:28 spectre systemd[1]: Reached target Swap. >Mar 17 14:01:28 spectre systemd[1]: Started Activation of DM RAID sets. >Mar 17 14:01:28 spectre systemd[1]: Starting Local File Systems. >Mar 17 14:01:28 spectre systemd[1]: Reached target Local File Systems. >Mar 17 14:01:28 spectre systemd[1]: Started Mark the need to relabel after reboot. >Mar 17 14:01:28 spectre systemd[1]: Started Reconfigure the system on administrator request. >Mar 17 14:01:28 spectre systemd[1]: Started Relabel all filesystems, if necessary. >Mar 17 14:01:28 spectre systemd[1]: Starting Tell Plymouth To Write Out Runtime Data... >Mar 17 14:01:28 spectre systemd[1]: Starting Trigger Flushing of Journal to Persistent Storage... >Mar 17 14:01:28 spectre systemd[1]: Starting Create Volatile Files and Directories... >Mar 17 14:01:28 spectre systemd[1]: Starting Security Auditing Service... >Mar 17 14:01:28 spectre systemd[1]: Starting Encrypted Volumes. >Mar 17 14:01:28 spectre systemd[1]: Reached target Encrypted Volumes. >Mar 17 14:01:29 spectre systemd-journal[439]: Permanent journal is using 282.9M (max allowed 1.6G, trying to leave 2.5G free of 6.8G available â current limit 1.6G). >Mar 17 14:01:29 spectre systemd-journal[439]: Time spent on flushing to /var is 15.812ms for 811 entries. >Mar 17 14:01:30 spectre kernel: audit: type=1305 audit(1395079289.455:4): audit_pid=601 old=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:auditd_t:s0 res=1 >Mar 17 14:01:29 spectre auditd[601]: Started dispatcher: /sbin/audispd pid: 615 >Mar 17 14:01:29 spectre auditd[601]: Init complete, auditd 2.3.4 listening for events (startup state enable) >Mar 17 14:01:29 spectre audispd[615]: priority_boost_parser called with: 4 >Mar 17 14:01:29 spectre audispd[615]: max_restarts_parser called with: 10 >Mar 17 14:01:29 spectre alsactl[613]: alsactl 1.0.27.2 daemon started >Mar 17 14:01:30 spectre alsactl[613]: /usr/sbin/alsactl: load_state:1677Cannot open /var/lib/alsa/asound.state for reading: No such file or directory >Mar 17 14:01:30 spectre audispd[615]: audispd initialized with q_depth=150 and 1 active plugins >Mar 17 14:01:28 spectre systemd[1]: Started Trigger Flushing of Journal to Persistent Storage. >Mar 17 14:01:28 spectre systemd[1]: Started Tell Plymouth To Write Out Runtime Data. >Mar 17 14:01:28 spectre systemd[1]: Started Create Volatile Files and Directories. >Mar 17 14:01:28 spectre systemd[1]: Started Security Auditing Service. >Mar 17 14:01:28 spectre systemd[1]: Starting Update UTMP about System Boot/Shutdown... >Mar 17 14:01:29 spectre systemd[1]: Started Update UTMP about System Boot/Shutdown. >Mar 17 14:01:29 spectre systemd[1]: Starting System Initialization. >Mar 17 14:01:29 spectre systemd[1]: Reached target System Initialization. >Mar 17 14:01:29 spectre systemd[1]: Starting Daily Cleanup of Temporary Directories. >Mar 17 14:01:29 spectre systemd[1]: Started Daily Cleanup of Temporary Directories. >Mar 17 14:01:29 spectre systemd[1]: Starting dnf makecache timer. >Mar 17 14:01:30 spectre auditctl[602]: No rules >Mar 17 14:01:30 spectre auditctl[602]: AUDIT_STATUS: enabled=0 flag=1 pid=0 rate_limit=0 backlog_limit=320 lost=0 backlog=0 >Mar 17 14:01:30 spectre rngd[623]: Unable to open file: /dev/tpm0 >Mar 17 14:01:30 spectre rngd[623]: can't open any entropy source >Mar 17 14:01:30 spectre rngd[623]: Maybe RNG device modules are not loaded >Mar 17 14:01:30 spectre chronyd[640]: chronyd version 1.29.1 starting >Mar 17 14:01:30 spectre chronyd[640]: Linux kernel major=3 minor=14 patch=0 >Mar 17 14:01:30 spectre chronyd[640]: hz=100 shift_hz=7 freq_scale=1.00000000 nominal_tick=10000 slew_delta_tick=833 max_tick_bias=1000 shift_pll=2 >Mar 17 14:01:30 spectre rpcbind[642]: Cannot open '/var/lib/rpcbind/rpcbind.xdr' file for reading, errno 2 (No such file or directory) >Mar 17 14:01:30 spectre rpcbind[642]: Cannot open '/var/lib/rpcbind/portmap.xdr' file for reading, errno 2 (No such file or directory) >Mar 17 14:01:31 spectre avahi-daemon[622]: Found user 'avahi' (UID 70) and group 'avahi' (GID 70). >Mar 17 14:01:31 spectre avahi-daemon[622]: Successfully dropped root privileges. >Mar 17 14:01:31 spectre avahi-daemon[622]: avahi-daemon 0.6.31 starting up. >Mar 17 14:01:31 spectre smartd[625]: smartd 6.2 2013-07-26 r3841 [x86_64-linux-3.14.0-0.rc6.git4.1.fc21.x86_64] (local build) >Mar 17 14:01:31 spectre smartd[625]: Copyright (C) 2002-13, Bruce Allen, Christian Franke, www.smartmontools.org >Mar 17 14:01:31 spectre smartd[625]: Opened configuration file /etc/smartmontools/smartd.conf >Mar 17 14:01:31 spectre smartd[625]: Configuration file /etc/smartmontools/smartd.conf was parsed, found DEVICESCAN, scanning devices >Mar 17 14:01:31 spectre smartd[625]: Problem creating device name scan list >Mar 17 14:01:31 spectre smartd[625]: In the system's table of devices NO devices found to scan >Mar 17 14:01:31 spectre smartd[625]: Monitoring 0 ATA and 0 SCSI devices >Mar 17 14:01:31 spectre ModemManager[634]: <info> ModemManager (version 1.2.0-1.fc21) starting... >Mar 17 14:01:34 spectre rtkit-daemon[620]: Successfully called chroot. >Mar 17 14:01:34 spectre rtkit-daemon[620]: Successfully dropped privileges. >Mar 17 14:01:34 spectre rtkit-daemon[620]: Successfully limited resources. >Mar 17 14:01:34 spectre rtkit-daemon[620]: Running. >Mar 17 14:01:34 spectre rtkit-daemon[620]: Canary thread running. >Mar 17 14:01:34 spectre rtkit-daemon[620]: Watchdog thread running. >Mar 17 14:01:34 spectre avahi-daemon[622]: Successfully called chroot(). >Mar 17 14:01:34 spectre avahi-daemon[622]: Successfully dropped remaining capabilities. >Mar 17 14:01:34 spectre systemd[1]: Started Avahi mDNS/DNS-SD Stack. >Mar 17 14:01:34 spectre systemd[1]: Started RealtimeKit Scheduling Policy Service. >Mar 17 14:01:34 spectre systemd[1]: Started System Logging Service. >Mar 17 14:01:34 spectre systemd[1]: Started RPC bind service. >Mar 17 14:01:34 spectre systemd[1]: rngd.service: main process exited, code=exited, status=1/FAILURE >Mar 17 14:01:34 spectre avahi-daemon[622]: No service file found in /etc/avahi/services. >Mar 17 14:01:34 spectre systemd[1]: Unit rngd.service entered failed state. >Mar 17 14:01:34 spectre systemd[1]: Started Machine Check Exception Logging Daemon. >Mar 17 14:01:34 spectre systemd[1]: Started Permit User Sessions. >Mar 17 14:01:34 spectre systemd[1]: Starting Command Scheduler... >Mar 17 14:01:34 spectre systemd-logind[635]: New seat seat0. >Mar 17 14:01:34 spectre systemd-logind[635]: Watching system buttons on /dev/input/event0 (Power Button) >Mar 17 14:01:34 spectre avahi-daemon[622]: Network interface enumeration completed. >Mar 17 14:01:34 spectre avahi-daemon[622]: Registering HINFO record with values 'X86_64'/'LINUX'. >Mar 17 14:01:34 spectre avahi-daemon[622]: Server startup complete. Host name is spectre.local. Local service cookie is 1469245592. >Mar 17 14:01:34 spectre avahi-daemon[622]: Failed to parse address 'fe80::5054:ff:fe69:ea87%ens3', ignoring. >Mar 17 14:01:34 spectre systemd[1]: Started Command Scheduler. >Mar 17 14:01:34 spectre systemd[1]: Starting Job spooling tools... >Mar 17 14:01:34 spectre crond[671]: (CRON) INFO (Syslog will be used instead of sendmail.) >Mar 17 14:01:34 spectre crond[671]: (CRON) INFO (RANDOM_DELAY will be scaled with factor 80% if used.) >Mar 17 14:01:34 spectre systemd[1]: Started Job spooling tools. >Mar 17 14:01:34 spectre systemd[1]: Starting Wait for Plymouth Boot Screen to Quit... >Mar 17 14:01:34 spectre systemd[1]: Starting GNOME Display Manager... >Mar 17 14:01:34 spectre systemd[1]: Started NTP client/server. >Mar 17 14:01:34 spectre systemd[1]: Started Login Service. >Mar 17 14:01:34 spectre systemd[1]: Started Agent daemon for Spice guests. >Mar 17 14:01:34 spectre systemd[1]: Starting Agent daemon for Spice guests. >Mar 17 14:01:34 spectre systemd[1]: Reached target Agent daemon for Spice guests. >Mar 17 14:01:34 spectre systemd[1]: Started GNOME Display Manager. >Mar 17 14:01:35 spectre dbus-daemon[637]: dbus[637]: [system] Rejected send message, 1 matched rules; type="method_call", sender=":1.6" (uid=0 pid=675 comm="/usr/sbin/gdm ") interface="org.freedesktop.DBus.Properties" member="GetAll" error name="(unset)" requested_reply="0" destination=":1.7" (uid=0 pid=679 comm="/usr/libexec/gdm-simple-slave --display-id /org/gn") >Mar 17 14:01:35 spectre dbus[637]: [system] Rejected send message, 1 matched rules; type="method_call", sender=":1.6" (uid=0 pid=675 comm="/usr/sbin/gdm ") interface="org.freedesktop.DBus.Properties" member="GetAll" error name="(unset)" requested_reply="0" destination=":1.7" (uid=0 pid=679 comm="/usr/libexec/gdm-simple-slave --display-id /org/gn") >Mar 17 14:01:35 spectre dbus-daemon[637]: dbus[637]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' >Mar 17 14:01:35 spectre dbus[637]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' >Mar 17 14:01:35 spectre crond[671]: (CRON) INFO (running with inotify support) >Mar 17 14:01:35 spectre systemd[1]: Starting Authorization Manager... >Mar 17 14:01:35 spectre systemd[1]: Started Modem Manager. >Mar 17 14:01:35 spectre polkitd[685]: Started polkitd version 0.112 >Mar 17 14:01:35 spectre dbus[637]: [system] Activating via systemd: service name='org.freedesktop.Accounts' unit='accounts-daemon.service' >Mar 17 14:01:35 spectre dbus-daemon[637]: dbus[637]: [system] Activating via systemd: service name='org.freedesktop.Accounts' unit='accounts-daemon.service' >Mar 17 14:01:35 spectre polkitd[685]: Loading rules from directory /etc/polkit-1/rules.d >Mar 17 14:01:35 spectre polkitd[685]: Loading rules from directory /usr/share/polkit-1/rules.d >Mar 17 14:01:36 spectre polkitd[685]: Finished loading, compiling and executing 5 rules >Mar 17 14:01:36 spectre dbus[637]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' >Mar 17 14:01:36 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' >Mar 17 14:01:36 spectre systemd[1]: Started Authorization Manager. >Mar 17 14:01:36 spectre polkitd[685]: Acquired the name org.freedesktop.PolicyKit1 on the system bus >Mar 17 14:01:36 spectre accounts-daemon[619]: started daemon version 0.6.35 >Mar 17 14:01:36 spectre dbus[637]: [system] Successfully activated service 'org.freedesktop.Accounts' >Mar 17 14:01:36 spectre systemd[1]: Started Accounts Service. >Mar 17 14:01:36 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.freedesktop.Accounts' >Mar 17 14:01:36 spectre gdm-Xorg-:0[689]: X.Org X Server 1.15.0 >Mar 17 14:01:36 spectre gdm-Xorg-:0[689]: Release Date: 2013-12-27 >Mar 17 14:01:36 spectre gdm-Xorg-:0[689]: X Protocol Version 11, Revision 0 >Mar 17 14:01:36 spectre gdm-Xorg-:0[689]: Build Operating System: 3.12.8-300.fc20.x86_64 >Mar 17 14:01:36 spectre gdm-Xorg-:0[689]: Current Operating System: Linux spectre 3.14.0-0.rc6.git4.1.fc21.x86_64 #1 SMP Fri Mar 14 20:07:37 UTC 2014 x86_64 >Mar 17 14:01:36 spectre gdm-Xorg-:0[689]: Kernel command line: BOOT_IMAGE=/vmlinuz-3.14.0-0.rc6.git4.1.fc21.x86_64 root=/dev/mapper/fedora-root ro rd.lvm.lv=fedora/swap vconsole.font=latarcyrheb-sun16 rd.lvm.lv=fedora/root vconsole.keymap=us rhgb quiet LANG=en_US.UTF-8 >Mar 17 14:01:36 spectre gdm-Xorg-:0[689]: Build Date: 28 February 2014 02:09:21AM >Mar 17 14:01:36 spectre gdm-Xorg-:0[689]: Build ID: xorg-x11-server 1.15.0-5.fc21 >Mar 17 14:01:36 spectre gdm-Xorg-:0[689]: Current version of pixman: 0.32.0 >Mar 17 14:01:36 spectre gdm-Xorg-:0[689]: Before reporting problems, check http://wiki.x.org >Mar 17 14:01:36 spectre gdm-Xorg-:0[689]: to make sure that you have the latest version. >Mar 17 14:01:36 spectre gdm-Xorg-:0[689]: Markers: (--) probed, (**) from config file, (==) default setting, >Mar 17 14:01:36 spectre gdm-Xorg-:0[689]: (++) from command line, (!!) notice, (II) informational, >Mar 17 14:01:36 spectre gdm-Xorg-:0[689]: (WW) warning, (EE) error, (NI) not implemented, (??) unknown. >Mar 17 14:01:36 spectre gdm-Xorg-:0[689]: (++) Log file: "/dev/null", Time: Mon Mar 17 14:01:36 2014 >Mar 17 14:01:36 spectre gdm-Xorg-:0[689]: (==) Using config directory: "/etc/X11/xorg.conf.d" >Mar 17 14:01:36 spectre gdm-Xorg-:0[689]: (==) Using system config directory "/usr/share/X11/xorg.conf.d" >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (==) No Layout section. Using the first Screen section. >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (==) No screen section available. Using defaults. >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (**) |-->Screen "Default Screen Section" (0) >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (**) | |-->Monitor "<default monitor>" >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (==) No monitor specified for screen "Default Screen Section". >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: Using a default monitor configuration. >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (==) Automatically adding devices >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (==) Automatically enabling devices >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (==) Automatically adding GPU devices >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (==) FontPath set to: >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: catalogue:/etc/X11/fontpath.d, >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: built-ins >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (==) ModulePath set to "/usr/lib64/xorg/modules" >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) The server relies on udev to provide the list of input devices. >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: If no devices become available, reconfigure udev or disable AutoAddDevices. >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) Loader magic: 0x813d60 >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) Module ABI versions: >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: X.Org ANSI C Emulation: 0.4 >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: X.Org Video Driver: 15.0 >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: X.Org XInput driver : 20.0 >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: X.Org Server Extension : 8.0 >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) xfree86: Adding drm device (/dev/dri/card0) >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (--) PCI:*(0:0:2:0) 1b36:0100:1af4:1100 rev 4, Mem @ 0xf4000000/67108864, 0xf8000000/67108864, 0xfc030000/8192, I/O @ 0x0000c060/32, BIOS @ 0x????????/65536 >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: Initializing built-in extension Generic Event Extension >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: Initializing built-in extension SHAPE >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: Initializing built-in extension MIT-SHM >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: Initializing built-in extension XInputExtension >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: Initializing built-in extension XTEST >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: Initializing built-in extension BIG-REQUESTS >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: Initializing built-in extension SYNC >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: Initializing built-in extension XKEYBOARD >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: Initializing built-in extension XC-MISC >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: Initializing built-in extension XINERAMA >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: Initializing built-in extension XFIXES >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: Initializing built-in extension RENDER >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: Initializing built-in extension RANDR >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: Initializing built-in extension COMPOSITE >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: Initializing built-in extension DAMAGE >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: Initializing built-in extension MIT-SCREEN-SAVER >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: Initializing built-in extension DOUBLE-BUFFER >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: Initializing built-in extension RECORD >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: Initializing built-in extension DPMS >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: Initializing built-in extension Present >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: Initializing built-in extension DRI3 >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: Initializing built-in extension X-Resource >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: Initializing built-in extension XVideo >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: Initializing built-in extension XVideo-MotionCompensation >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: Initializing built-in extension SELinux >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: Initializing built-in extension XFree86-VidModeExtension >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: Initializing built-in extension XFree86-DGA >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: Initializing built-in extension XFree86-DRI >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: Initializing built-in extension DRI2 >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) "glx" will be loaded by default. >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (WW) "xwayland" is not to be loaded by default. Skipping. >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) LoadModule: "dri2" >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) Module "dri2" already built-in >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) LoadModule: "glamoregl" >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) Loading /usr/lib64/xorg/modules/libglamoregl.so >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) Module glamoregl: vendor="X.Org Foundation" >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: compiled for 1.15.0, module version = 0.5.1 >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: ABI class: X.Org ANSI C Emulation, version 0.4 >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) LoadModule: "glx" >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) Loading /usr/lib64/xorg/modules/extensions/libglx.so >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) Module glx: vendor="X.Org Foundation" >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: compiled for 1.15.0, module version = 1.0.0 >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: ABI class: X.Org Server Extension, version 8.0 >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (==) AIGLX enabled >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: Loading extension GLX >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (==) Matched qxl as autoconfigured driver 0 >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (==) Matched qxl as autoconfigured driver 1 >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (==) Matched modesetting as autoconfigured driver 2 >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (==) Matched fbdev as autoconfigured driver 3 >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (==) Matched vesa as autoconfigured driver 4 >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (==) Assigned the driver to the xf86ConfigLayout >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) LoadModule: "qxl" >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) Loading /usr/lib64/xorg/modules/drivers/qxl_drv.so >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) Module qxl: vendor="X.Org Foundation" >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: compiled for 1.15.0, module version = 0.1.1 >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: Module class: X.Org Video Driver >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: ABI class: X.Org Video Driver, version 15.0 >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) LoadModule: "modesetting" >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) Loading /usr/lib64/xorg/modules/drivers/modesetting_drv.so >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) Module modesetting: vendor="X.Org Foundation" >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: compiled for 1.15.0, module version = 0.8.0 >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: Module class: X.Org Video Driver >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: ABI class: X.Org Video Driver, version 15.0 >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) LoadModule: "fbdev" >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) Loading /usr/lib64/xorg/modules/drivers/fbdev_drv.so >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) Module fbdev: vendor="X.Org Foundation" >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: compiled for 1.15.0, module version = 0.4.3 >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: Module class: X.Org Video Driver >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: ABI class: X.Org Video Driver, version 15.0 >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) LoadModule: "vesa" >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) Loading /usr/lib64/xorg/modules/drivers/vesa_drv.so >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) Module vesa: vendor="X.Org Foundation" >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: compiled for 1.15.0, module version = 2.3.2 >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: Module class: X.Org Video Driver >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: ABI class: X.Org Video Driver, version 15.0 >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) qxl: Driver for QXL virtual graphics: QXL 1 >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) modesetting: Driver for Modesetting Kernel Drivers: kms >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) FBDEV: driver for framebuffer: fbdev >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) VESA: driver for VESA chipsets: vesa >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (++) using VT number 1 >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) [KMS] Kernel modesetting enabled. >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (WW) Falling back to old probe method for modesetting >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (WW) Falling back to old probe method for fbdev >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) Loading sub module "fbdevhw" >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) LoadModule: "fbdevhw" >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) Loading /usr/lib64/xorg/modules/libfbdevhw.so >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) Module fbdevhw: vendor="X.Org Foundation" >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: compiled for 1.15.0, module version = 0.0.2 >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: ABI class: X.Org Video Driver, version 15.0 >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (WW) Falling back to old probe method for vesa >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) qxl(0): Creating default Display subsection in Screen section >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: "Default Screen Section" for depth/fbbpp 24/32 >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (==) qxl(0): Depth 24, (--) framebuffer bpp 32 >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (==) qxl(0): RGB weight 888 >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (==) qxl(0): Default visual is TrueColor >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (==) qxl(0): Using gamma correction (1.0, 1.0, 1.0) >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) qxl(0): Deferred Frames: Disabled >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) qxl(0): Offscreen Surfaces: Enabled >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) qxl(0): Image Cache: Enabled >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) qxl(0): Fallback Cache: Enabled >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (==) qxl(0): DPI set to (96, 96) >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) Loading sub module "fb" >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) LoadModule: "fb" >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) Loading /usr/lib64/xorg/modules/libfb.so >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) Module fb: vendor="X.Org Foundation" >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: compiled for 1.15.0, module version = 1.0.0 >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: ABI class: X.Org ANSI C Emulation, version 0.4 >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) Loading sub module "ramdac" >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) LoadModule: "ramdac" >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) Module "ramdac" already built-in >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) qxl(0): Output Virtual-0 has no monitor section >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) qxl(0): Output Virtual-1 has no monitor section >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) qxl(0): Output Virtual-2 has no monitor section >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) qxl(0): Output Virtual-3 has no monitor section >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) qxl(0): EDID for output Virtual-0 >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) qxl(0): Printing probed modes for output Virtual-0 >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) qxl(0): Modeline "1024x768"x59.9 63.50 1024 1072 1176 1328 768 771 775 798 -hsync +vsync (47.8 kHz P) >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) qxl(0): Modeline "1920x1200"x59.9 193.25 1920 2056 2256 2592 1200 1203 1209 1245 -hsync +vsync (74.6 kHz) >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) qxl(0): Modeline "1920x1080"x60.0 173.00 1920 2048 2248 2576 1080 1083 1088 1120 -hsync +vsync (67.2 kHz) >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) qxl(0): Modeline "1600x1200"x59.9 161.00 1600 1712 1880 2160 1200 1203 1207 1245 -hsync +vsync (74.5 kHz) >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) qxl(0): Modeline "1680x1050"x60.0 146.25 1680 1784 1960 2240 1050 1053 1059 1089 -hsync +vsync (65.3 kHz) >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) qxl(0): Modeline "1400x1050"x60.0 121.75 1400 1488 1632 1864 1050 1053 1057 1089 -hsync +vsync (65.3 kHz) >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) qxl(0): Modeline "1280x1024"x59.9 109.00 1280 1368 1496 1712 1024 1027 1034 1063 -hsync +vsync (63.7 kHz) >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) qxl(0): Modeline "1440x900"x59.9 106.50 1440 1528 1672 1904 900 903 909 934 -hsync +vsync (55.9 kHz) >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) qxl(0): Modeline "1280x960"x59.9 101.25 1280 1360 1488 1696 960 963 967 996 -hsync +vsync (59.7 kHz) >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) qxl(0): Modeline "1280x854"x59.9 89.25 1280 1352 1480 1680 854 857 867 887 -hsync +vsync (53.1 kHz) >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) qxl(0): Modeline "1280x800"x59.8 83.50 1280 1352 1480 1680 800 803 809 831 -hsync +vsync (49.7 kHz) >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) qxl(0): Modeline "1280x720"x59.9 74.50 1280 1344 1472 1664 720 723 728 748 -hsync +vsync (44.8 kHz) >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) qxl(0): Modeline "1152x768"x59.8 71.75 1152 1216 1328 1504 768 771 781 798 -hsync +vsync (47.7 kHz) >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) qxl(0): Modeline "800x600"x59.9 38.25 800 832 912 1024 600 603 607 624 -hsync +vsync (37.4 kHz) >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) qxl(0): Modeline "848x480"x59.7 31.50 848 872 952 1056 480 483 493 500 -hsync +vsync (29.8 kHz) >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) qxl(0): Modeline "720x480"x59.7 26.75 720 744 808 896 480 483 493 500 -hsync +vsync (29.9 kHz) >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) qxl(0): Modeline "640x480"x59.4 23.75 640 664 720 800 480 483 487 500 -hsync +vsync (29.7 kHz) >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) qxl(0): EDID for output Virtual-1 >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) qxl(0): EDID for output Virtual-2 >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) qxl(0): EDID for output Virtual-3 >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) qxl(0): Output Virtual-0 connected >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) qxl(0): Output Virtual-1 disconnected >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) qxl(0): Output Virtual-2 disconnected >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) qxl(0): Output Virtual-3 disconnected >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) qxl(0): Using exact sizes for initial modes >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) qxl(0): Output Virtual-0 using initial mode 1024x768 +0+0 >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) qxl(0): Using default gamma of (1.0, 1.0, 1.0) unless otherwise stated. >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) qxl(0): PreInit complete >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) UnloadModule: "modesetting" >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) Unloading modesetting >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) UnloadModule: "fbdev" >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) Unloading fbdev >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) UnloadSubModule: "fbdevhw" >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) Unloading fbdevhw >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) UnloadModule: "vesa" >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) Unloading vesa >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (--) Depth 24 pixmap format is 32 bpp >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) UXA(0): Driver registered support for the following operations: >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) solid >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) copy >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) composite (RENDER acceleration) >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) put_image >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) qxl(0): RandR 1.2 enabled, ignore the following RandR disabled message. >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: resizing primary to 1024x768 >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: primary is 0x22e3de0 >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (--) RandR disabled >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) SELinux: Disabled by boolean >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (II) AIGLX: Screen 0 is not DRI2 capable >Mar 17 14:01:37 spectre gdm-Xorg-:0[689]: (EE) AIGLX: reverting to software rendering >Mar 17 14:01:37 spectre ModemManager[634]: <warn> Couldn't find support for device at '/sys/devices/pci0000:00/0000:00:03.0': not supported by any plugin >Mar 17 14:01:39 spectre kernel: nf_conntrack version 0.5.0 (16384 buckets, 65536 max) >Mar 17 14:01:39 spectre kernel: ip6_tables: (C) 2000-2006 Netfilter Core Team >Mar 17 14:01:39 spectre kernel: Ebtables v2.0 registered >Mar 17 14:01:39 spectre gdm-Xorg-:0[689]: (II) AIGLX: Loaded and initialized swrast >Mar 17 14:01:39 spectre gdm-Xorg-:0[689]: (II) GLX: Initialized DRISWRAST GL provider for screen 0 >Mar 17 14:01:39 spectre gdm-Xorg-:0[689]: (II) qxl(0): Setting screen physical size to 270 x 203 >Mar 17 14:01:39 spectre kernel: Bridge firewalling registered >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (II) config/udev: Adding input device Power Button (/dev/input/event0) >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (**) Power Button: Applying InputClass "evdev keyboard catchall" >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (**) Power Button: Applying InputClass "system-keyboard" >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (II) LoadModule: "evdev" >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (II) Loading /usr/lib64/xorg/modules/input/evdev_drv.so >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (II) Module evdev: vendor="X.Org Foundation" >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: compiled for 1.15.0, module version = 2.8.2 >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: Module class: X.Org XInput Driver >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: ABI class: X.Org XInput driver, version 20.0 >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (II) Using input driver 'evdev' for 'Power Button' >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (**) Power Button: always reports core events >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (**) evdev: Power Button: Device: "/dev/input/event0" >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (--) evdev: Power Button: Vendor 0 Product 0x1 >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (--) evdev: Power Button: Found keys >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (II) evdev: Power Button: Configuring as keyboard >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (**) Option "config_info" "udev:/sys/devices/LNXSYSTM:00/LNXPWRBN:00/input/input0/event0" >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (II) XINPUT: Adding extended input device "Power Button" (type: KEYBOARD, id 6) >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (**) Option "xkb_rules" "evdev" >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (**) Option "xkb_model" "pc104" >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (**) Option "xkb_layout" "us" >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (II) config/udev: Adding input device QEMU QEMU USB Tablet (/dev/input/event2) >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (**) QEMU QEMU USB Tablet: Applying InputClass "evdev pointer catchall" >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (II) Using input driver 'evdev' for 'QEMU QEMU USB Tablet' >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (**) QEMU QEMU USB Tablet: always reports core events >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (**) evdev: QEMU QEMU USB Tablet: Device: "/dev/input/event2" >Mar 17 14:01:40 spectre systemd[1]: Started firewalld - dynamic firewall daemon. >Mar 17 14:01:40 spectre systemd[1]: Starting Network Manager... >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (--) evdev: QEMU QEMU USB Tablet: Vendor 0x627 Product 0x1 >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (--) evdev: QEMU QEMU USB Tablet: Found 3 mouse buttons >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (--) evdev: QEMU QEMU USB Tablet: Found scroll wheel(s) >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (--) evdev: QEMU QEMU USB Tablet: Found relative axes >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (--) evdev: QEMU QEMU USB Tablet: Found absolute axes >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (--) evdev: QEMU QEMU USB Tablet: Found x and y absolute axes >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (--) evdev: QEMU QEMU USB Tablet: Found absolute touchscreen >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (II) evdev: QEMU QEMU USB Tablet: Configuring as touchscreen >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (II) evdev: QEMU QEMU USB Tablet: Adding scrollwheel support >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (**) evdev: QEMU QEMU USB Tablet: YAxisMapping: buttons 4 and 5 >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (**) evdev: QEMU QEMU USB Tablet: EmulateWheelButton: 4, EmulateWheelInertia: 10, EmulateWheelTimeout: 200 >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (**) Option "config_info" "udev:/sys/devices/pci0000:00/0000:00:01.2/usb1/1-1/1-1:1.0/0003:0627:0001.0001/input/input4/event2" >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (II) XINPUT: Adding extended input device "QEMU QEMU USB Tablet" (type: TOUCHSCREEN, id 7) >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (WW) evdev: QEMU QEMU USB Tablet: touchpads, tablets and touchscreens ignore relative axes. >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (II) evdev: QEMU QEMU USB Tablet: initialized for absolute axes. >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (**) QEMU QEMU USB Tablet: (accel) keeping acceleration scheme 1 >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (**) QEMU QEMU USB Tablet: (accel) acceleration profile 0 >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (**) QEMU QEMU USB Tablet: (accel) acceleration factor: 2.000 >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (**) QEMU QEMU USB Tablet: (accel) acceleration threshold: 4 >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (II) config/udev: Adding input device QEMU QEMU USB Tablet (/dev/input/js0) >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (II) No input driver specified, ignoring this device. >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (II) This device may have been added with another device file. >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (II) config/udev: Adding input device QEMU QEMU USB Tablet (/dev/input/mouse0) >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (II) No input driver specified, ignoring this device. >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (II) This device may have been added with another device file. >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (II) config/udev: Adding drm device (/dev/dri/card0) >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (II) config/udev: Adding input device AT Translated Set 2 keyboard (/dev/input/event1) >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (**) AT Translated Set 2 keyboard: Applying InputClass "evdev keyboard catchall" >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (**) AT Translated Set 2 keyboard: Applying InputClass "system-keyboard" >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (II) Using input driver 'evdev' for 'AT Translated Set 2 keyboard' >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (**) AT Translated Set 2 keyboard: always reports core events >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (**) evdev: AT Translated Set 2 keyboard: Device: "/dev/input/event1" >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (--) evdev: AT Translated Set 2 keyboard: Vendor 0x1 Product 0x1 >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (--) evdev: AT Translated Set 2 keyboard: Found keys >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (II) evdev: AT Translated Set 2 keyboard: Configuring as keyboard >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (**) Option "config_info" "udev:/sys/devices/platform/i8042/serio0/input/input1/event1" >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (II) XINPUT: Adding extended input device "AT Translated Set 2 keyboard" (type: KEYBOARD, id 8) >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (**) Option "xkb_rules" "evdev" >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (**) Option "xkb_model" "pc104" >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (**) Option "xkb_layout" "us" >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (II) config/udev: Adding input device ImExPS/2 Generic Explorer Mouse (/dev/input/event3) >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (**) ImExPS/2 Generic Explorer Mouse: Applying InputClass "evdev pointer catchall" >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (**) ImExPS/2 Generic Explorer Mouse: Applying InputClass "vmmouse" >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (II) LoadModule: "vmmouse" >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (II) Loading /usr/lib64/xorg/modules/input/vmmouse_drv.so >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (II) Module vmmouse: vendor="X.Org Foundation" >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: compiled for 1.15.0, module version = 13.0.0 >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: Module class: X.Org XInput Driver >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: ABI class: X.Org XInput driver, version 20.0 >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (II) VMWARE(0): VMMOUSE module was loaded >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (II) Using input driver 'vmmouse' for 'ImExPS/2 Generic Explorer Mouse' >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (**) ImExPS/2 Generic Explorer Mouse: always reports core events >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (II) VMWARE(0): vmmouse is available >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (**) Option "Device" "/dev/input/event3" >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (**) ImExPS/2 Generic Explorer Mouse: ZAxisMapping: buttons 4 and 5 >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (**) Option "config_info" "udev:/sys/devices/platform/i8042/serio1/input/input3/event3" >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (II) XINPUT: Adding extended input device "ImExPS/2 Generic Explorer Mouse" (type: MOUSE, id 9) >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (II) VMWARE(0): VMMOUSE DEVICE_INIT >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (**) ImExPS/2 Generic Explorer Mouse: (accel) keeping acceleration scheme 1 >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (**) ImExPS/2 Generic Explorer Mouse: (accel) acceleration profile 0 >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (**) ImExPS/2 Generic Explorer Mouse: (accel) acceleration factor: 2.000 >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (**) ImExPS/2 Generic Explorer Mouse: (accel) acceleration threshold: 4 >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (II) VMWARE(0): VMMOUSE DEVICE_ON >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (II) VMWARE(0): vmmouse enabled >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (II) config/udev: Adding input device ImExPS/2 Generic Explorer Mouse (/dev/input/mouse1) >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (II) No input driver specified, ignoring this device. >Mar 17 14:01:40 spectre gdm-Xorg-:0[689]: (II) This device may have been added with another device file. >Mar 17 14:01:40 spectre systemd[1]: Received SIGRTMIN+21 from PID 249 (plymouthd). >Mar 17 14:01:40 spectre systemd[1]: Started Wait for Plymouth Boot Screen to Quit. >Mar 17 14:01:41 spectre NetworkManager[746]: <info> NetworkManager (version 0.9.9.1-2.git20140314.fc21) is starting... >Mar 17 14:01:41 spectre NetworkManager[746]: <info> Read config: /etc/NetworkManager/NetworkManager.conf >Mar 17 14:01:41 spectre NetworkManager[746]: <info> WEXT support is enabled >Mar 17 14:01:42 spectre kernel: cfg80211: Calling CRDA to update world regulatory domain >Mar 17 14:01:42 spectre NetworkManager[746]: <info> VPN: loaded org.freedesktop.NetworkManager.openconnect >Mar 17 14:01:42 spectre NetworkManager[746]: <info> VPN: loaded org.freedesktop.NetworkManager.openvpn >Mar 17 14:01:42 spectre NetworkManager[746]: <info> VPN: loaded org.freedesktop.NetworkManager.vpnc >Mar 17 14:01:42 spectre NetworkManager[746]: <info> VPN: loaded org.freedesktop.NetworkManager.l2tp >Mar 17 14:01:42 spectre kernel: cfg80211: World regulatory domain updated: >Mar 17 14:01:42 spectre kernel: cfg80211: DFS Master region: unset >Mar 17 14:01:42 spectre kernel: cfg80211: (start_freq - end_freq @ bandwidth), (max_antenna_gain, max_eirp) >Mar 17 14:01:42 spectre kernel: cfg80211: (2402000 KHz - 2472000 KHz @ 40000 KHz), (N/A, 2000 mBm) >Mar 17 14:01:42 spectre kernel: cfg80211: (2457000 KHz - 2482000 KHz @ 40000 KHz), (N/A, 2000 mBm) >Mar 17 14:01:42 spectre kernel: cfg80211: (2474000 KHz - 2494000 KHz @ 20000 KHz), (N/A, 2000 mBm) >Mar 17 14:01:42 spectre kernel: cfg80211: (5170000 KHz - 5250000 KHz @ 80000 KHz), (N/A, 2000 mBm) >Mar 17 14:01:42 spectre kernel: cfg80211: (5735000 KHz - 5835000 KHz @ 80000 KHz), (N/A, 2000 mBm) >Mar 17 14:01:42 spectre kernel: cfg80211: (57240000 KHz - 63720000 KHz @ 2160000 KHz), (N/A, 0 mBm) >Mar 17 14:01:42 spectre NetworkManager[746]: <info> VPN: loaded org.freedesktop.NetworkManager.pptp >Mar 17 14:01:42 spectre NetworkManager[746]: ifcfg-rh: Acquired D-Bus service com.redhat.ifcfgrh1 >Mar 17 14:01:42 spectre NetworkManager[746]: <info> Loaded plugin ifcfg-rh: (c) 2007 - 2013 Red Hat, Inc. To report bugs please use the NetworkManager mailing list. >Mar 17 14:01:42 spectre NetworkManager[746]: <info> Loaded plugin keyfile: (c) 2007 - 2013 Red Hat, Inc. To report bugs please use the NetworkManager mailing list. >Mar 17 14:01:42 spectre NetworkManager[746]: ifcfg-rh: parsing /etc/sysconfig/network-scripts/ifcfg-Wired_connection_1 ... >Mar 17 14:01:42 spectre NetworkManager[746]: ifcfg-rh: read connection 'Wired connection 1' >Mar 17 14:01:42 spectre NetworkManager[746]: ifcfg-rh: parsing /etc/sysconfig/network-scripts/ifcfg-lo ... >Mar 17 14:01:42 spectre NetworkManager[746]: ifcfg-rh: parsing /etc/sysconfig/network-scripts/ifcfg-eth0 ... >Mar 17 14:01:42 spectre NetworkManager[746]: ifcfg-rh: read connection 'eth0' >Mar 17 14:01:42 spectre NetworkManager[746]: <info> monitoring kernel firmware directory '/lib/firmware'. >Mar 17 14:01:42 spectre NetworkManager[746]: <info> WiFi hardware radio set enabled >Mar 17 14:01:42 spectre NetworkManager[746]: <info> Loaded device plugin: /usr/lib64/NetworkManager/libnm-device-plugin-atm.so >Mar 17 14:01:42 spectre NetworkManager[746]: <info> Loaded device plugin: /usr/lib64/NetworkManager/libnm-device-plugin-wwan.so >Mar 17 14:01:42 spectre NetworkManager[746]: <info> Loaded device plugin: /usr/lib64/NetworkManager/libnm-device-plugin-bt.so >Mar 17 14:01:42 spectre systemd[1]: Started Network Manager. >Mar 17 14:01:42 spectre systemd[1]: Starting Network. >Mar 17 14:01:42 spectre systemd[1]: Reached target Network. >Mar 17 14:01:42 spectre NetworkManager[746]: <info> WiFi enabled by radio killswitch; enabled by state file >Mar 17 14:01:42 spectre NetworkManager[746]: <info> WWAN enabled by radio killswitch; enabled by state file >Mar 17 14:01:42 spectre NetworkManager[746]: <info> WiMAX enabled by radio killswitch; enabled by state file >Mar 17 14:01:42 spectre NetworkManager[746]: <info> Networking is enabled by state file >Mar 17 14:01:42 spectre NetworkManager[746]: <info> (lo): link connected >Mar 17 14:01:42 spectre NetworkManager[746]: <info> (lo): carrier is ON >Mar 17 14:01:42 spectre NetworkManager[746]: <info> (lo): new Generic device (driver: 'unknown' ifindex: 1) >Mar 17 14:01:42 spectre NetworkManager[746]: <info> (lo): exported as /org/freedesktop/NetworkManager/Devices/0 >Mar 17 14:01:42 spectre NetworkManager[746]: <info> (ens3): carrier is OFF >Mar 17 14:01:42 spectre NetworkManager[746]: <info> (ens3): new Ethernet device (driver: 'virtio_net' ifindex: 2) >Mar 17 14:01:42 spectre NetworkManager[746]: <info> (ens3): exported as /org/freedesktop/NetworkManager/Devices/1 >Mar 17 14:01:42 spectre NetworkManager[746]: <info> (ens3): device state change: unmanaged -> unavailable (reason 'managed') [10 20 2] >Mar 17 14:01:42 spectre NetworkManager[746]: <info> (ens3): link connected >Mar 17 14:01:42 spectre NetworkManager[746]: <info> (ens3): deactivating device (reason 'managed') [2] >Mar 17 14:01:42 spectre NetworkManager[746]: <info> (ens3): device state change: unavailable -> disconnected (reason 'none') [20 30 0] >Mar 17 14:01:42 spectre NetworkManager[746]: <info> Auto-activating connection 'Wired connection 1'. >Mar 17 14:01:42 spectre NetworkManager[746]: <info> Activation (ens3) starting connection 'Wired connection 1' >Mar 17 14:01:42 spectre NetworkManager[746]: <info> Activation (ens3) Stage 1 of 5 (Device Prepare) scheduled... >Mar 17 14:01:42 spectre NetworkManager[746]: <info> Activation (ens3) Stage 1 of 5 (Device Prepare) started... >Mar 17 14:01:42 spectre NetworkManager[746]: <info> (ens3): device state change: disconnected -> prepare (reason 'none') [30 40 0] >Mar 17 14:01:42 spectre NetworkManager[746]: <info> NetworkManager state is now CONNECTING >Mar 17 14:01:42 spectre NetworkManager[746]: <info> Activation (ens3) Stage 2 of 5 (Device Configure) scheduled... >Mar 17 14:01:42 spectre NetworkManager[746]: <info> Activation (ens3) Stage 1 of 5 (Device Prepare) complete. >Mar 17 14:01:42 spectre NetworkManager[746]: <info> Activation (ens3) Stage 2 of 5 (Device Configure) starting... >Mar 17 14:01:42 spectre NetworkManager[746]: <info> (ens3): device state change: prepare -> config (reason 'none') [40 50 0] >Mar 17 14:01:42 spectre NetworkManager[746]: <info> Activation (ens3) Stage 2 of 5 (Device Configure) successful. >Mar 17 14:01:42 spectre NetworkManager[746]: <info> Activation (ens3) Stage 2 of 5 (Device Configure) complete. >Mar 17 14:01:42 spectre NetworkManager[746]: <info> ModemManager available in the bus >Mar 17 14:01:42 spectre systemd[1]: Started Login and scanning of iSCSI devices. >Mar 17 14:01:42 spectre systemd[1]: Starting OpenSSH server daemon... >Mar 17 14:01:42 spectre systemd[1]: Starting NFS file locking service.... >Mar 17 14:01:42 spectre systemd[1]: Starting Virtualization daemon... >Mar 17 14:01:42 spectre systemd[1]: Started OpenSSH server daemon. >Mar 17 14:01:43 spectre rpc.statd[998]: Version 1.2.9 starting >Mar 17 14:01:43 spectre sm-notify[999]: Version 1.2.9 starting >Mar 17 14:01:43 spectre systemd[1]: Started NFS file locking service.. >Mar 17 14:01:43 spectre systemd[1]: Starting Network File System Server. >Mar 17 14:01:43 spectre systemd[1]: Reached target Network File System Server. >Mar 17 14:01:43 spectre kernel: SELinux: initialized (dev tmpfs, type tmpfs), uses transition SIDs >Mar 17 14:01:43 spectre systemd[1]: Starting user-42.slice. >Mar 17 14:01:43 spectre systemd[1]: Created slice user-42.slice. >Mar 17 14:01:43 spectre NetworkManager[746]: <info> Activation (ens3) Stage 3 of 5 (IP Configure Start) scheduled. >Mar 17 14:01:43 spectre NetworkManager[746]: <info> Activation (ens3) Stage 3 of 5 (IP Configure Start) started... >Mar 17 14:01:43 spectre NetworkManager[746]: <info> (ens3): device state change: config -> ip-config (reason 'none') [50 70 0] >Mar 17 14:01:43 spectre NetworkManager[746]: <info> Activation (ens3) Stage 5 of 5 (IPv4 Configure Commit) scheduled... >Mar 17 14:01:43 spectre NetworkManager[746]: <info> Activation (ens3) Stage 3 of 5 (IP Configure Start) complete. >Mar 17 14:01:43 spectre NetworkManager[746]: <info> Activation (ens3) Stage 5 of 5 (IPv4 Commit) started... >Mar 17 14:01:43 spectre avahi-daemon[622]: Joining mDNS multicast group on interface ens3.IPv4 with address 192.168.100.40. >Mar 17 14:01:43 spectre NetworkManager[746]: <info> (ens3): device state change: ip-config -> ip-check (reason 'none') [70 80 0] >Mar 17 14:01:43 spectre NetworkManager[746]: <info> Activation (ens3) Stage 5 of 5 (IPv4 Commit) complete. >Mar 17 14:01:43 spectre avahi-daemon[622]: New relevant interface ens3.IPv4 for mDNS. >Mar 17 14:01:43 spectre avahi-daemon[622]: Registering new address record for 192.168.100.40 on ens3.IPv4. >Mar 17 14:01:43 spectre NetworkManager[746]: <info> (ens3): device state change: ip-check -> secondaries (reason 'none') [80 90 0] >Mar 17 14:01:43 spectre NetworkManager[746]: <info> (ens3): device state change: secondaries -> activated (reason 'none') [90 100 0] >Mar 17 14:01:43 spectre NetworkManager[746]: <info> NetworkManager state is now CONNECTED_LOCAL >Mar 17 14:01:43 spectre systemd[1]: Starting User Manager for UID 42... >Mar 17 14:01:43 spectre systemd[1]: Starting Session c1 of user gdm. >Mar 17 14:01:43 spectre systemd-logind[635]: New session c1 of user gdm. >Mar 17 14:01:43 spectre systemd[1]: Started Session c1 of user gdm. >Mar 17 14:01:43 spectre systemd[1088]: pam_unix(systemd-user:session): session opened for user gdm by (uid=0) >Mar 17 14:01:43 spectre NetworkManager[746]: <info> Policy set 'Wired connection 1' (ens3) as default for IPv4 routing and DNS. >Mar 17 14:01:43 spectre NetworkManager[746]: <info> Activation (ens3) successful, device activated. >Mar 17 14:01:43 spectre dbus-daemon[637]: dbus[637]: [system] Activating via systemd: service name='org.freedesktop.nm_dispatcher' unit='dbus-org.freedesktop.nm-dispatcher.service' >Mar 17 14:01:43 spectre dbus[637]: [system] Activating via systemd: service name='org.freedesktop.nm_dispatcher' unit='dbus-org.freedesktop.nm-dispatcher.service' >Mar 17 14:01:43 spectre sshd[982]: Server listening on 0.0.0.0 port 22. >Mar 17 14:01:43 spectre sshd[982]: Server listening on :: port 22. >Mar 17 14:01:43 spectre systemd[1]: Starting Network Manager Script Dispatcher Service... >Mar 17 14:01:43 spectre dbus[637]: [system] Successfully activated service 'org.freedesktop.nm_dispatcher' >Mar 17 14:01:43 spectre systemd[1]: Started Network Manager Script Dispatcher Service. >Mar 17 14:01:43 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.freedesktop.nm_dispatcher' >Mar 17 14:01:43 spectre systemd[1088]: Starting Paths. >Mar 17 14:01:43 spectre systemd[1088]: Reached target Paths. >Mar 17 14:01:43 spectre systemd[1088]: Starting Timers. >Mar 17 14:01:43 spectre systemd[1088]: Reached target Timers. >Mar 17 14:01:43 spectre systemd[1088]: Starting Sockets. >Mar 17 14:01:43 spectre systemd[1088]: Reached target Sockets. >Mar 17 14:01:43 spectre systemd[1088]: Starting Basic System. >Mar 17 14:01:43 spectre systemd[1088]: Reached target Basic System. >Mar 17 14:01:43 spectre systemd[1088]: Starting Default. >Mar 17 14:01:43 spectre systemd[1088]: Reached target Default. >Mar 17 14:01:43 spectre systemd[1088]: Startup finished in 212ms. >Mar 17 14:01:43 spectre systemd[1]: Started User Manager for UID 42. >Mar 17 14:01:44 spectre systemd[1]: Unit iscsi.service cannot be reloaded because it is inactive. >Mar 17 14:01:43 spectre gdm-launch-environment][820]: pam_unix(gdm-launch-environment:session): session opened for user gdm by (uid=0) >Mar 17 14:01:44 spectre nm-dispatcher.action[1092]: Job for iscsi.service failed. See 'systemctl status iscsi.service' and 'journalctl -xn' for details. >Mar 17 14:01:44 spectre avahi-daemon[622]: Registering new address record for fe80::5054:ff:fede:3d45 on ens3.*. >Mar 17 14:01:44 spectre NetworkManager[746]: <info> Activation (ens3) Stage 5 of 5 (IPv6 Commit) scheduled... >Mar 17 14:01:44 spectre NetworkManager[746]: <info> Policy set 'Wired connection 1' (ens3) as default for IPv6 routing and DNS. >Mar 17 14:01:44 spectre NetworkManager[746]: <info> Activation (ens3) Stage 5 of 5 (IPv6 Commit) started... >Mar 17 14:01:44 spectre NetworkManager[746]: <info> Activation (ens3) Stage 5 of 5 (IPv6 Commit) complete. >Mar 17 14:01:45 spectre libvirtd[969]: libvirt version: 1.2.2, package: 1.fc21 (Fedora Project, 2014-03-03-11:29:25, buildvm-21.phx2.fedoraproject.org) >Mar 17 14:01:45 spectre libvirtd[969]: Module /usr/lib64/libvirt/connection-driver/libvirt_driver_xen.so not accessible >Mar 17 14:01:45 spectre libvirtd[969]: Module /usr/lib64/libvirt/connection-driver/libvirt_driver_libxl.so not accessible >Mar 17 14:01:45 spectre libvirtd[969]: Module /usr/lib64/libvirt/connection-driver/libvirt_driver_lxc.so not accessible >Mar 17 14:01:45 spectre libvirtd[969]: Module /usr/lib64/libvirt/connection-driver/libvirt_driver_uml.so not accessible >Mar 17 14:01:45 spectre libvirtd[969]: Module /usr/lib64/libvirt/connection-driver/libvirt_driver_vbox.so not accessible >Mar 17 14:01:46 spectre systemd[1]: Started Virtualization daemon. >Mar 17 14:01:46 spectre systemd[1]: Starting Multi-User System. >Mar 17 14:01:46 spectre systemd[1]: Reached target Multi-User System. >Mar 17 14:01:46 spectre systemd[1]: Starting Graphical Interface. >Mar 17 14:01:46 spectre systemd[1]: Reached target Graphical Interface. >Mar 17 14:01:46 spectre systemd[1]: Started Stop Read-Ahead Data Collection 10s After Completed Startup. >Mar 17 14:01:46 spectre systemd[1]: Starting Update UTMP about System Runlevel Changes... >Mar 17 14:01:46 spectre systemd[1]: Started Update UTMP about System Runlevel Changes. >Mar 17 14:01:46 spectre systemd[1]: Startup finished in 696ms (kernel) + 8.414s (initrd) + 32.113s (userspace) = 41.224s. >Mar 17 14:01:46 spectre avahi-daemon[622]: Registering new address record for fd00:6c3b:e531:e956:5054:ff:fede:3d45 on ens3.*. >Mar 17 14:01:46 spectre avahi-daemon[622]: Withdrawing address record for fe80::5054:ff:fede:3d45 on ens3. >Mar 17 14:01:46 spectre /usr/bin/dbus-launch[1106]: gnome-session-is-accelerated: llvmpipe detected. >Mar 17 14:01:47 spectre dbus[637]: [system] Activating via systemd: service name='org.freedesktop.UPower' unit='upower.service' >Mar 17 14:01:47 spectre dbus-daemon[637]: dbus[637]: [system] Activating via systemd: service name='org.freedesktop.UPower' unit='upower.service' >Mar 17 14:01:47 spectre systemd[1]: Starting Daemon for power management... >Mar 17 14:01:47 spectre dbus[637]: [system] Successfully activated service 'org.freedesktop.UPower' >Mar 17 14:01:47 spectre systemd[1]: Started Daemon for power management. >Mar 17 14:01:47 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.freedesktop.UPower' >Mar 17 14:01:47 spectre NetworkManager[746]: <info> startup complete >Mar 17 14:01:48 spectre dbus[637]: [system] Activating via systemd: service name='org.freedesktop.ColorManager' unit='colord.service' >Mar 17 14:01:48 spectre dbus-daemon[637]: dbus[637]: [system] Activating via systemd: service name='org.freedesktop.ColorManager' unit='colord.service' >Mar 17 14:01:48 spectre systemd[1]: Starting Manage, Install and Generate Color Profiles... >Mar 17 14:01:48 spectre gnome-session[1106]: Entering running state >Mar 17 14:01:48 spectre colord[1230]: Using mapping database file /var/lib/colord/mapping.db >Mar 17 14:01:49 spectre colord[1230]: Using device database file /var/lib/colord/storage.db >Mar 17 14:01:49 spectre systemd[1]: Starting PC/SC Smart Card Daemon... >Mar 17 14:01:49 spectre systemd[1]: Started PC/SC Smart Card Daemon. >Mar 17 14:01:49 spectre pcscd[1239]: 00000000 utils.c:61:GetDaemonPid() Can't open /var/run/pcscd/pcscd.pid: No such file or directory >Mar 17 14:01:49 spectre colord[1230]: loaded plugin libcd_plugin_camera.so >Mar 17 14:01:49 spectre colord[1230]: loaded plugin libcd_plugin_scanner.so >Mar 17 14:01:49 spectre colord[1230]: Daemon ready for requests >Mar 17 14:01:49 spectre dbus[637]: [system] Successfully activated service 'org.freedesktop.ColorManager' >Mar 17 14:01:49 spectre systemd[1]: Started Manage, Install and Generate Color Profiles. >Mar 17 14:01:49 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.freedesktop.ColorManager' >Mar 17 14:01:49 spectre pcscd[1239]: 00100747 winscard.c:240:SCardConnect() Reader E-Gate 0 0 Not Found >Mar 17 14:01:49 spectre pcscd[1239]: 00024358 winscard.c:240:SCardConnect() Reader E-Gate 0 0 Not Found >Mar 17 14:01:49 spectre pcscd[1239]: 00017341 winscard.c:240:SCardConnect() Reader E-Gate 0 0 Not Found >Mar 17 14:01:49 spectre rtkit-daemon[620]: Successfully made thread 1258 of process 1258 (/usr/bin/pulseaudio) owned by '42' high priority at nice level -11. >Mar 17 14:01:49 spectre rtkit-daemon[620]: Supervising 1 threads of 1 processes of 1 users. >Mar 17 14:01:50 spectre dbus[637]: [system] Activating via systemd: service name='org.freedesktop.locale1' unit='dbus-org.freedesktop.locale1.service' >Mar 17 14:01:50 spectre dbus-daemon[637]: dbus[637]: [system] Activating via systemd: service name='org.freedesktop.locale1' unit='dbus-org.freedesktop.locale1.service' >Mar 17 14:01:50 spectre systemd[1]: Starting Locale Service... >Mar 17 14:01:50 spectre pcscd[1239]: 00842307 winscard.c:240:SCardConnect() Reader E-Gate 0 0 Not Found >Mar 17 14:01:50 spectre gnome-session[1106]: (gnome-settings-daemon:1169): smartcard-plugin-WARNING **: Got potentially spurious smartcard event error: ffffe098. >Mar 17 14:01:50 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.freedesktop.locale1' >Mar 17 14:01:50 spectre dbus[637]: [system] Successfully activated service 'org.freedesktop.locale1' >Mar 17 14:01:50 spectre systemd[1]: Started Locale Service. >Mar 17 14:01:50 spectre gnome-session[1106]: (gnome-settings-daemon:1169): GLib-GObject-CRITICAL **: g_object_unref: assertion 'G_IS_OBJECT (object)' failed >Mar 17 14:01:50 spectre gdm-Xorg-:0[689]: The XKEYBOARD keymap compiler (xkbcomp) reports: >Mar 17 14:01:50 spectre gdm-Xorg-:0[689]: > Warning: Compat map for group 2 redefined >Mar 17 14:01:50 spectre gdm-Xorg-:0[689]: > Using new definition >Mar 17 14:01:50 spectre gdm-Xorg-:0[689]: > Warning: Compat map for group 3 redefined >Mar 17 14:01:50 spectre gdm-Xorg-:0[689]: > Using new definition >Mar 17 14:01:50 spectre gdm-Xorg-:0[689]: > Warning: Compat map for group 4 redefined >Mar 17 14:01:50 spectre gdm-Xorg-:0[689]: > Using new definition >Mar 17 14:01:50 spectre gdm-Xorg-:0[689]: Errors from xkbcomp are not fatal to the X server >Mar 17 14:01:50 spectre gnome-session[1106]: (gnome-settings-daemon:1169): smartcard-plugin-WARNING **: Got potentially spurious smartcard event error: ffffe098. >Mar 17 14:01:51 spectre gnome-session[1106]: (gnome-settings-daemon:1169): smartcard-plugin-WARNING **: Got potentially spurious smartcard event error: ffffe098. >Mar 17 14:01:51 spectre gnome-session[1106]: (gnome-settings-daemon:1169): smartcard-plugin-WARNING **: Got potentially spurious smartcard event error: ffffe098. >Mar 17 14:01:52 spectre gnome-session[1106]: (gnome-settings-daemon:1169): smartcard-plugin-WARNING **: Got potentially spurious smartcard event error: ffffe098. >Mar 17 14:01:52 spectre dbus[637]: [system] Activating via systemd: service name='org.freedesktop.GeoClue2' unit='geoclue.service' >Mar 17 14:01:52 spectre dbus-daemon[637]: dbus[637]: [system] Activating via systemd: service name='org.freedesktop.GeoClue2' unit='geoclue.service' >Mar 17 14:01:52 spectre systemd[1]: Starting Location Lookup Service... >Mar 17 14:01:52 spectre gnome-session[1106]: (gnome-settings-daemon:1169): smartcard-plugin-WARNING **: Got potentially spurious smartcard event error: ffffe098. >Mar 17 14:01:52 spectre dbus[637]: [system] Successfully activated service 'org.freedesktop.GeoClue2' >Mar 17 14:01:52 spectre systemd[1]: Started Location Lookup Service. >Mar 17 14:01:52 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.freedesktop.GeoClue2' >Mar 17 14:01:52 spectre polkitd[685]: Registered Authentication Agent for unix-session:c1 (system bus name :1.32 [gnome-shell --mode=gdm], object path /org/freedesktop/PolicyKit1/AuthenticationAgent, locale en_US.UTF-8) >Mar 17 14:01:52 spectre gnome-session[1106]: Gjs-Message: JS LOG: GNOME Shell started at Mon Mar 17 2014 14:01:52 GMT-0400 (EDT) >Mar 17 14:01:52 spectre NetworkManager[746]: <info> NetworkManager state is now CONNECTED_GLOBAL >Mar 17 14:01:53 spectre gnome-session[1106]: (gnome-settings-daemon:1169): smartcard-plugin-WARNING **: Got potentially spurious smartcard event error: ffffe098. >Mar 17 14:01:53 spectre dbus[637]: [system] Activating via systemd: service name='net.reactivated.Fprint' unit='fprintd.service' >Mar 17 14:01:53 spectre dbus-daemon[637]: dbus[637]: [system] Activating via systemd: service name='net.reactivated.Fprint' unit='fprintd.service' >Mar 17 14:01:53 spectre systemd[1]: Starting Fingerprint Authentication Daemon... >Mar 17 14:01:53 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'net.reactivated.Fprint' >Mar 17 14:01:53 spectre dbus[637]: [system] Successfully activated service 'net.reactivated.Fprint' >Mar 17 14:01:53 spectre systemd[1]: Started Fingerprint Authentication Daemon. >Mar 17 14:01:53 spectre fprintd[1348]: Launching FprintObject >Mar 17 14:01:53 spectre fprintd[1348]: ** Message: D-Bus service launched with name: net.reactivated.Fprint >Mar 17 14:01:53 spectre fprintd[1348]: ** Message: entering main loop >Mar 17 14:01:53 spectre gdm-Xorg-:0[689]: The XKEYBOARD keymap compiler (xkbcomp) reports: >Mar 17 14:01:53 spectre gdm-Xorg-:0[689]: > Warning: Compat map for group 2 redefined >Mar 17 14:01:53 spectre gdm-Xorg-:0[689]: > Using new definition >Mar 17 14:01:53 spectre gdm-Xorg-:0[689]: > Warning: Compat map for group 3 redefined >Mar 17 14:01:53 spectre gdm-Xorg-:0[689]: > Using new definition >Mar 17 14:01:53 spectre gdm-Xorg-:0[689]: > Warning: Compat map for group 4 redefined >Mar 17 14:01:53 spectre gdm-Xorg-:0[689]: > Using new definition >Mar 17 14:01:53 spectre gdm-Xorg-:0[689]: Errors from xkbcomp are not fatal to the X server >Mar 17 14:01:53 spectre gdm-Xorg-:0[689]: The XKEYBOARD keymap compiler (xkbcomp) reports: >Mar 17 14:01:53 spectre gdm-Xorg-:0[689]: > Warning: Compat map for group 2 redefined >Mar 17 14:01:53 spectre gdm-Xorg-:0[689]: > Using new definition >Mar 17 14:01:53 spectre gdm-Xorg-:0[689]: > Warning: Compat map for group 3 redefined >Mar 17 14:01:53 spectre gdm-Xorg-:0[689]: > Using new definition >Mar 17 14:01:53 spectre gdm-Xorg-:0[689]: > Warning: Compat map for group 4 redefined >Mar 17 14:01:53 spectre gdm-Xorg-:0[689]: > Using new definition >Mar 17 14:01:53 spectre gdm-Xorg-:0[689]: Errors from xkbcomp are not fatal to the X server >Mar 17 14:01:53 spectre gdm-Xorg-:0[689]: The XKEYBOARD keymap compiler (xkbcomp) reports: >Mar 17 14:01:53 spectre gdm-Xorg-:0[689]: > Warning: Compat map for group 2 redefined >Mar 17 14:01:53 spectre gdm-Xorg-:0[689]: > Using new definition >Mar 17 14:01:53 spectre gdm-Xorg-:0[689]: > Warning: Compat map for group 3 redefined >Mar 17 14:01:53 spectre gdm-Xorg-:0[689]: > Using new definition >Mar 17 14:01:53 spectre gdm-Xorg-:0[689]: > Warning: Compat map for group 4 redefined >Mar 17 14:01:53 spectre gdm-Xorg-:0[689]: > Using new definition >Mar 17 14:01:53 spectre gdm-Xorg-:0[689]: Errors from xkbcomp are not fatal to the X server >Mar 17 14:01:53 spectre gdm-Xorg-:0[689]: The XKEYBOARD keymap compiler (xkbcomp) reports: >Mar 17 14:01:53 spectre gdm-Xorg-:0[689]: > Warning: Compat map for group 2 redefined >Mar 17 14:01:53 spectre gdm-Xorg-:0[689]: > Using new definition >Mar 17 14:01:53 spectre gdm-Xorg-:0[689]: > Warning: Compat map for group 3 redefined >Mar 17 14:01:53 spectre gdm-Xorg-:0[689]: > Using new definition >Mar 17 14:01:53 spectre gdm-Xorg-:0[689]: > Warning: Compat map for group 4 redefined >Mar 17 14:01:53 spectre gdm-Xorg-:0[689]: > Using new definition >Mar 17 14:01:53 spectre gdm-Xorg-:0[689]: Errors from xkbcomp are not fatal to the X server >Mar 17 14:01:53 spectre gnome-session[1106]: (gnome-settings-daemon:1169): power-plugin-WARNING **: failed to turn the panel on: Display is not DPMS capable >Mar 17 14:01:53 spectre gnome-session[1106]: (gnome-settings-daemon:1169): smartcard-plugin-WARNING **: Got potentially spurious smartcard event error: ffffe098. >Mar 17 14:01:53 spectre gdm-Xorg-:0[689]: The XKEYBOARD keymap compiler (xkbcomp) reports: >Mar 17 14:01:53 spectre gdm-Xorg-:0[689]: > Warning: Compat map for group 2 redefined >Mar 17 14:01:53 spectre gdm-Xorg-:0[689]: > Using new definition >Mar 17 14:01:53 spectre gdm-Xorg-:0[689]: > Warning: Compat map for group 3 redefined >Mar 17 14:01:53 spectre gdm-Xorg-:0[689]: > Using new definition >Mar 17 14:01:53 spectre gdm-Xorg-:0[689]: > Warning: Compat map for group 4 redefined >Mar 17 14:01:53 spectre gdm-Xorg-:0[689]: > Using new definition >Mar 17 14:01:53 spectre gdm-Xorg-:0[689]: Errors from xkbcomp are not fatal to the X server >Mar 17 14:01:54 spectre gnome-session[1106]: (gnome-settings-daemon:1169): smartcard-plugin-WARNING **: Got potentially spurious smartcard event error: ffffe098. >Mar 17 14:01:54 spectre gnome-session[1106]: (gnome-settings-daemon:1169): color-plugin-WARNING **: failed to get edid: unable to get EDID for output >Mar 17 14:01:54 spectre colord[1230]: Device added: xrandr-Virtual-0 >Mar 17 14:01:54 spectre gnome-session[1106]: (gnome-settings-daemon:1169): color-plugin-WARNING **: unable to get EDID for xrandr-Virtual-0: unable to get EDID for output >Mar 17 14:01:54 spectre gnome-session[1106]: (gnome-settings-daemon:1169): smartcard-plugin-WARNING **: Got potentially spurious smartcard event error: ffffe098. >Mar 17 14:01:55 spectre gnome-session[1106]: (gnome-settings-daemon:1169): smartcard-plugin-WARNING **: Got 11 consecutive smartcard errors, so giving up. >Mar 17 14:02:23 spectre fprintd[1348]: ** Message: No devices in use, exit >Mar 17 14:11:19 spectre systemd[1]: Starting dnf makecache... >Mar 17 14:11:21 spectre dnf[1418]: Config time: 0.193 >Mar 17 14:11:21 spectre dnf[1418]: cachedir: /var/cache/dnf/x86_64/21 >Mar 17 14:11:21 spectre dnf[1418]: dnf version: 0.4.17 >Mar 17 14:11:21 spectre dnf[1418]: Making cache files for all metadata files. >Mar 17 14:11:21 spectre dnf[1418]: Metadata cache refreshed recently. >Mar 17 14:11:21 spectre systemd[1]: Started dnf makecache. >Mar 17 14:16:19 spectre systemd[1]: Starting Cleanup of Temporary Directories... >Mar 17 14:16:20 spectre systemd[1]: Started Cleanup of Temporary Directories. >Mar 17 15:01:01 spectre kernel: SELinux: initialized (dev tmpfs, type tmpfs), uses transition SIDs >Mar 17 15:01:01 spectre systemd[1]: Starting user-0.slice. >Mar 17 15:01:01 spectre systemd[1]: Created slice user-0.slice. >Mar 17 15:01:01 spectre systemd[1]: Starting User Manager for UID 0... >Mar 17 15:01:01 spectre systemd[1]: Starting Session 1 of user root. >Mar 17 15:01:01 spectre systemd[1]: Started Session 1 of user root. >Mar 17 15:01:01 spectre systemd[1431]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 17 15:01:01 spectre systemd[1431]: Starting Paths. >Mar 17 15:01:01 spectre systemd[1431]: Reached target Paths. >Mar 17 15:01:01 spectre systemd[1431]: Starting Timers. >Mar 17 15:01:01 spectre systemd[1431]: Reached target Timers. >Mar 17 15:01:01 spectre systemd[1431]: Starting Sockets. >Mar 17 15:01:01 spectre systemd[1431]: Reached target Sockets. >Mar 17 15:01:01 spectre systemd[1431]: Starting Basic System. >Mar 17 15:01:01 spectre systemd[1431]: Reached target Basic System. >Mar 17 15:01:01 spectre systemd[1431]: Starting Default. >Mar 17 15:01:01 spectre systemd[1431]: Reached target Default. >Mar 17 15:01:01 spectre systemd[1431]: Startup finished in 19ms. >Mar 17 15:01:01 spectre systemd[1]: Started User Manager for UID 0. >Mar 17 15:01:01 spectre CROND[1443]: (root) CMD (run-parts /etc/cron.hourly) >Mar 17 15:01:01 spectre run-parts[1450]: (/etc/cron.hourly) starting 0anacron >Mar 17 15:01:01 spectre run-parts[1468]: (/etc/cron.hourly) finished 0anacron >Mar 17 15:01:01 spectre run-parts[1471]: (/etc/cron.hourly) starting mcelog.cron >Mar 17 15:01:01 spectre run-parts[1478]: (/etc/cron.hourly) finished mcelog.cron >Mar 17 15:01:01 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 17 15:01:01 spectre systemd[1431]: Stopping Default. >Mar 17 15:01:01 spectre systemd[1431]: Stopped target Default. >Mar 17 15:01:01 spectre systemd[1431]: Stopping Basic System. >Mar 17 15:01:01 spectre systemd[1431]: Stopped target Basic System. >Mar 17 15:01:01 spectre systemd[1431]: Stopping Paths. >Mar 17 15:01:01 spectre systemd[1431]: Stopped target Paths. >Mar 17 15:01:01 spectre systemd[1431]: Stopping Timers. >Mar 17 15:01:01 spectre systemd[1431]: Stopped target Timers. >Mar 17 15:01:01 spectre systemd[1431]: Stopping Sockets. >Mar 17 15:01:01 spectre systemd[1431]: Stopped target Sockets. >Mar 17 15:01:01 spectre systemd[1431]: Starting Shutdown. >Mar 17 15:01:01 spectre systemd[1431]: Reached target Shutdown. >Mar 17 15:01:01 spectre systemd[1431]: Starting Exit the Session... >Mar 17 15:01:01 spectre systemd[1431]: Received SIGRTMIN+24 from PID 1485 (kill). >Mar 17 15:01:01 spectre systemd[1437]: pam_unix(systemd-user:session): session closed for user root >Mar 17 15:01:01 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 17 15:01:01 spectre systemd[1]: Stopping user-0.slice. >Mar 17 15:01:01 spectre systemd[1]: Removed slice user-0.slice. >Mar 17 15:01:01 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 17 15:01:01 spectre systemd-logind[635]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 17 15:01:01 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 17 15:01:01 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 17 15:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 17 15:01:02 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 17 15:01:02 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 17 15:01:02 spectre setroubleshoot[1495]: RunFaultServer(10) >Mar 17 15:01:02 spectre setroubleshoot[1495]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 17 15:01:02 spectre setroubleshoot[1495]: database version 3.0 compatible with current 3.0 version >Mar 17 15:01:02 spectre setroubleshoot[1495]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 17 15:01:03 spectre setroubleshoot[1495]: Number of Plugins = 46 >Mar 17 15:01:03 spectre setroubleshoot[1495]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 17 15:01:03 spectre setroubleshoot[1495]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 17 15:01:03 spectre setroubleshoot[1495]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 17 15:01:03 spectre setroubleshoot[1495]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 17 15:01:03 spectre setroubleshoot[1495]: dbus avc(node=spectre type=AVC msg=audit(1395082861.590:369): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395082861.590:369): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528b510 a1=f0800 a2=0 a3=7fa912e81680 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395082861.590:369): >) called: 1 Connections >Mar 17 15:01:03 spectre setroubleshoot[1495]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395082861.590:369): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 17 15:01:03 spectre setroubleshoot[1495]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395082861.590:369): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528b510 a1=f0800 a2=0 a3=7fa912e81680 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 17 15:01:03 spectre setroubleshoot[1495]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395082861.590:369): >Mar 17 15:01:03 spectre setroubleshoot[1495]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 17 15:01:03 spectre setroubleshoot[1495]: dbus avc(node=spectre type=AVC msg=audit(1395082861.590:370): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395082861.590:370): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528b510 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395082861.590:370): >) called: 1 Connections >Mar 17 15:01:03 spectre setroubleshoot[1495]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395082861.590:370): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 17 15:01:03 spectre setroubleshoot[1495]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395082861.590:370): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528b510 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 17 15:01:03 spectre setroubleshoot[1495]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395082861.590:370): >Mar 17 15:01:03 spectre setroubleshoot[1495]: dbus avc(node=spectre type=AVC msg=audit(1395082861.591:371): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395082861.591:371): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528b510 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395082861.591:371): >) called: 1 Connections >Mar 17 15:01:03 spectre setroubleshoot[1495]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395082861.591:371): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 17 15:01:03 spectre setroubleshoot[1495]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395082861.591:371): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528b510 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 17 15:01:03 spectre setroubleshoot[1495]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395082861.591:371): >Mar 17 15:01:03 spectre setroubleshoot[1495]: Plugin Exception restorecon_source >Mar 17 15:01:03 spectre setroubleshoot[1495]: Plugin Exception restorecon >Mar 17 15:01:03 spectre setroubleshoot[1495]: lookup_signature: found 1 matches with scores 1.00 >Mar 17 15:01:03 spectre setroubleshoot[1495]: signature found in database >Mar 17 15:01:03 spectre setroubleshoot[1495]: sending alert to all clients >Mar 17 15:01:03 spectre setroubleshoot[1495]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.restorecon_source previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.rsync_data previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.kernel_modules previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.catchall_boolean previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.automount_exec_config previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.bind_ports previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.allow_execheap previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.cvs_data previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.mozplugger_remove previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.catchall previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.sandbox_connect previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.httpd_write_content previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.wine previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.catchall_labels previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.samba_share previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.sys_module previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.qemu_blk_image previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.allow_execmod previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.file previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.sys_resource previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.mmap_zero previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.openvpn previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.mozplugger previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.setenforce previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.disable_ipv6 previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.dac_override previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.public_content previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.allow_anon_write previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.selinuxpolicy previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.associate previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.xen_image previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.chrome previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.leaks previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.sshd_root previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.qemu_file_image previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.mounton previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.allow_execstack previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.filesystem_associate previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.restorecon previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.swapfile previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.connect_ports previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.vbetool previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.device previously imported >Mar 17 15:01:03 spectre python[1495]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 17 15:01:03 spectre setroubleshoot[1495]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 17 15:01:03 spectre setroubleshoot[1495]: lookup_signature: found 1 matches with scores 1.00 >Mar 17 15:01:03 spectre setroubleshoot[1495]: signature found in database >Mar 17 15:01:03 spectre setroubleshoot[1495]: sending alert to all clients >Mar 17 15:01:03 spectre setroubleshoot[1495]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.restorecon_source previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.rsync_data previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.kernel_modules previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.catchall_boolean previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.automount_exec_config previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.bind_ports previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.allow_execheap previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.cvs_data previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.mozplugger_remove previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.catchall previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.sandbox_connect previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.httpd_write_content previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.wine previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.catchall_labels previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.samba_share previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.sys_module previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.qemu_blk_image previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.allow_execmod previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.file previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.sys_resource previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.mmap_zero previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.openvpn previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.mozplugger previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.setenforce previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.disable_ipv6 previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.dac_override previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.public_content previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.allow_anon_write previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.selinuxpolicy previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.associate previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.xen_image previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.chrome previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.leaks previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.sshd_root previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.qemu_file_image previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.mounton previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.allow_execstack previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.filesystem_associate previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.restorecon previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.swapfile previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.connect_ports previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.vbetool previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.device previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 17 15:01:03 spectre python[1495]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 17 15:01:03 spectre setroubleshoot[1495]: lookup_signature: found 1 matches with scores 1.00 >Mar 17 15:01:03 spectre setroubleshoot[1495]: signature found in database >Mar 17 15:01:03 spectre setroubleshoot[1495]: sending alert to all clients >Mar 17 15:01:03 spectre setroubleshoot[1495]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.restorecon_source previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.rsync_data previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.kernel_modules previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.catchall_boolean previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.automount_exec_config previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.bind_ports previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.allow_execheap previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.cvs_data previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.mozplugger_remove previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.catchall previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.sandbox_connect previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.httpd_write_content previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.wine previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.catchall_labels previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.samba_share previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.sys_module previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.qemu_blk_image previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.allow_execmod previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.file previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.sys_resource previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.mmap_zero previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.openvpn previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.mozplugger previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.setenforce previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.disable_ipv6 previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.dac_override previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.public_content previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.allow_anon_write previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.selinuxpolicy previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.associate previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.xen_image previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.chrome previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.leaks previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.sshd_root previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.qemu_file_image previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.mounton previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.allow_execstack previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.filesystem_associate previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.restorecon previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.swapfile previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.connect_ports previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.vbetool previously imported >Mar 17 15:01:03 spectre setroubleshoot[1495]: load_plugins() plugins.device previously imported >Mar 17 15:01:03 spectre python[1495]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 17 15:01:13 spectre setroubleshoot[1495]: received signal=14 >Mar 17 15:01:13 spectre setroubleshoot[1495]: KeyboardInterrupt in RunFaultServer >Mar 17 15:01:13 spectre setroubleshoot[1495]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 17 15:01:13 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 17 15:01:13 spectre dbus-daemon[637]: string index out of range >Mar 17 15:11:21 spectre systemd[1]: Starting dnf makecache... >Mar 17 15:11:22 spectre dnf[1577]: Config time: 0.006 >Mar 17 15:11:22 spectre dnf[1577]: cachedir: /var/cache/dnf/x86_64/21 >Mar 17 15:11:22 spectre dnf[1577]: dnf version: 0.4.17 >Mar 17 15:11:22 spectre dnf[1577]: Making cache files for all metadata files. >Mar 17 15:11:22 spectre dnf[1577]: Metadata cache refreshed recently. >Mar 17 15:11:22 spectre systemd[1]: Started dnf makecache. >Mar 17 15:19:29 spectre sshd[1582]: Accepted publickey for dshea from 192.168.100.1 port 41465 ssh2: RSA 29:71:d3:be:dc:71:8e:0d:ef:a5:2f:ab:31:0c:82:d4 >Mar 17 15:19:29 spectre kernel: SELinux: initialized (dev tmpfs, type tmpfs), uses transition SIDs >Mar 17 15:19:29 spectre systemd[1]: Starting user-1000.slice. >Mar 17 15:19:29 spectre systemd[1]: Created slice user-1000.slice. >Mar 17 15:19:29 spectre systemd[1]: Starting User Manager for UID 1000... >Mar 17 15:19:29 spectre systemd[1]: Starting Session 2 of user dshea. >Mar 17 15:19:29 spectre systemd-logind[635]: New session 2 of user dshea. >Mar 17 15:19:29 spectre systemd[1]: Started Session 2 of user dshea. >Mar 17 15:19:29 spectre systemd[1585]: pam_unix(systemd-user:session): session opened for user dshea by (uid=0) >Mar 17 15:19:29 spectre systemd[1585]: Starting Paths. >Mar 17 15:19:29 spectre systemd[1585]: Reached target Paths. >Mar 17 15:19:29 spectre systemd[1585]: Starting Timers. >Mar 17 15:19:29 spectre systemd[1585]: Reached target Timers. >Mar 17 15:19:29 spectre systemd[1585]: Starting Sockets. >Mar 17 15:19:29 spectre systemd[1585]: Reached target Sockets. >Mar 17 15:19:29 spectre systemd[1585]: Starting Basic System. >Mar 17 15:19:29 spectre systemd[1585]: Reached target Basic System. >Mar 17 15:19:29 spectre systemd[1585]: Starting Default. >Mar 17 15:19:29 spectre systemd[1585]: Reached target Default. >Mar 17 15:19:29 spectre systemd[1585]: Startup finished in 38ms. >Mar 17 15:19:29 spectre systemd[1]: Started User Manager for UID 1000. >Mar 17 15:19:29 spectre sshd[1582]: pam_unix(sshd:session): session opened for user dshea by (uid=0) >Mar 17 15:20:55 spectre sshd[6603]: Accepted publickey for dshea from 192.168.100.1 port 41478 ssh2: RSA 29:71:d3:be:dc:71:8e:0d:ef:a5:2f:ab:31:0c:82:d4 >Mar 17 15:20:55 spectre systemd-logind[635]: New session 3 of user dshea. >Mar 17 15:20:55 spectre systemd[1]: Starting Session 3 of user dshea. >Mar 17 15:20:55 spectre systemd[1]: Started Session 3 of user dshea. >Mar 17 15:20:55 spectre sshd[6603]: pam_unix(sshd:session): session opened for user dshea by (uid=0) >Mar 17 15:20:55 spectre sshd[6607]: Received disconnect from 192.168.100.1: 11: disconnected by user >Mar 17 15:20:55 spectre sshd[6603]: pam_unix(sshd:session): session closed for user dshea >Mar 17 15:20:55 spectre systemd-logind[635]: Removed session 3. >Mar 17 15:47:30 spectre sshd[1604]: Received disconnect from 192.168.100.1: 11: disconnected by user >Mar 17 15:47:30 spectre sshd[1582]: pam_unix(sshd:session): session closed for user dshea >Mar 17 15:47:30 spectre systemd-logind[635]: Removed session 2. >Mar 17 15:47:30 spectre systemd[1]: Stopping User Manager for UID 1000... >Mar 17 15:47:30 spectre systemd[1585]: Stopping Default. >Mar 17 15:47:30 spectre systemd[1585]: Stopped target Default. >Mar 17 15:47:30 spectre systemd[1585]: Stopping Basic System. >Mar 17 15:47:30 spectre systemd[1585]: Stopped target Basic System. >Mar 17 15:47:30 spectre systemd[1585]: Stopping Paths. >Mar 17 15:47:30 spectre systemd[1585]: Stopped target Paths. >Mar 17 15:47:30 spectre systemd[1585]: Stopping Timers. >Mar 17 15:47:30 spectre systemd[1585]: Stopped target Timers. >Mar 17 15:47:30 spectre systemd[1585]: Stopping Sockets. >Mar 17 15:47:30 spectre systemd[1585]: Stopped target Sockets. >Mar 17 15:47:30 spectre systemd[1585]: Starting Shutdown. >Mar 17 15:47:30 spectre systemd[1585]: Reached target Shutdown. >Mar 17 15:47:30 spectre systemd[1585]: Starting Exit the Session... >Mar 17 15:47:30 spectre systemd[1585]: Received SIGRTMIN+24 from PID 18563 (kill). >Mar 17 15:47:30 spectre systemd[1593]: pam_unix(systemd-user:session): session closed for user dshea >Mar 17 15:47:30 spectre systemd[1]: Stopped User Manager for UID 1000. >Mar 17 15:47:30 spectre systemd[1]: Stopping user-1000.slice. >Mar 17 15:47:30 spectre systemd[1]: Removed slice user-1000.slice. >Mar 17 15:47:30 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/1000: Permission denied >Mar 17 15:47:30 spectre systemd-logind[635]: Failed to unmount user runtime directory /run/user/1000: Permission denied >Mar 17 15:47:30 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/1000: Permission denied >Mar 17 15:47:30 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 17 15:47:30 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 17 15:47:31 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 17 15:47:31 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 17 15:47:31 spectre setroubleshoot[18573]: RunFaultServer(10) >Mar 17 15:47:31 spectre setroubleshoot[18573]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 17 15:47:31 spectre setroubleshoot[18573]: database version 3.0 compatible with current 3.0 version >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 17 15:47:31 spectre setroubleshoot[18573]: Number of Plugins = 46 >Mar 17 15:47:31 spectre setroubleshoot[18573]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 17 15:47:31 spectre setroubleshoot[18573]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 17 15:47:31 spectre setroubleshoot[18573]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 17 15:47:31 spectre setroubleshoot[18573]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 17 15:47:31 spectre setroubleshoot[18573]: dbus avc(node=spectre type=AVC msg=audit(1395085650.723:430): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=29033 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395085650.723:430): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528b530 a1=f0800 a2=0 a3=fffffffffffffbe8 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395085650.723:430): >) called: 1 Connections >Mar 17 15:47:31 spectre setroubleshoot[18573]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395085650.723:430): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=29033 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 17 15:47:31 spectre setroubleshoot[18573]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395085650.723:430): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528b530 a1=f0800 a2=0 a3=fffffffffffffbe8 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 17 15:47:31 spectre setroubleshoot[18573]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395085650.723:430): >Mar 17 15:47:31 spectre setroubleshoot[18573]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 17 15:47:31 spectre setroubleshoot[18573]: dbus avc(node=spectre type=AVC msg=audit(1395085650.723:431): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395085650.723:431): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528b530 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395085650.723:431): >) called: 1 Connections >Mar 17 15:47:31 spectre setroubleshoot[18573]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395085650.723:431): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 17 15:47:31 spectre setroubleshoot[18573]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395085650.723:431): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528b530 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 17 15:47:31 spectre setroubleshoot[18573]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395085650.723:431): >Mar 17 15:47:31 spectre setroubleshoot[18573]: dbus avc(node=spectre type=AVC msg=audit(1395085650.723:432): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=29033 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395085650.723:432): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528b530 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395085650.723:432): >) called: 1 Connections >Mar 17 15:47:31 spectre setroubleshoot[18573]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395085650.723:432): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=29033 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 17 15:47:31 spectre setroubleshoot[18573]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395085650.723:432): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528b530 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 17 15:47:31 spectre setroubleshoot[18573]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395085650.723:432): >Mar 17 15:47:31 spectre setroubleshoot[18573]: Plugin Exception restorecon_source >Mar 17 15:47:31 spectre setroubleshoot[18573]: Plugin Exception restorecon >Mar 17 15:47:31 spectre setroubleshoot[18573]: lookup_signature: found 1 matches with scores 1.00 >Mar 17 15:47:31 spectre setroubleshoot[18573]: signature found in database >Mar 17 15:47:31 spectre setroubleshoot[18573]: sending alert to all clients >Mar 17 15:47:31 spectre setroubleshoot[18573]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.restorecon_source previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.rsync_data previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.kernel_modules previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.catchall_boolean previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.automount_exec_config previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.bind_ports previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.allow_execheap previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.cvs_data previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.mozplugger_remove previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.catchall previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.sandbox_connect previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.httpd_write_content previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.wine previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.catchall_labels previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.samba_share previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.sys_module previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.qemu_blk_image previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.allow_execmod previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.file previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.sys_resource previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.mmap_zero previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.openvpn previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.mozplugger previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.setenforce previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.disable_ipv6 previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.dac_override previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.public_content previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.allow_anon_write previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.selinuxpolicy previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.associate previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.xen_image previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.chrome previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.leaks previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.sshd_root previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.qemu_file_image previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.mounton previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.allow_execstack previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.filesystem_associate previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.restorecon previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.swapfile previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.connect_ports previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.vbetool previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.device previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 17 15:47:31 spectre python[18573]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 17 15:47:31 spectre setroubleshoot[18573]: lookup_signature: found 1 matches with scores 1.00 >Mar 17 15:47:31 spectre setroubleshoot[18573]: signature found in database >Mar 17 15:47:31 spectre setroubleshoot[18573]: sending alert to all clients >Mar 17 15:47:31 spectre setroubleshoot[18573]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.restorecon_source previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.rsync_data previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.kernel_modules previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.catchall_boolean previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.automount_exec_config previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.bind_ports previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.allow_execheap previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.cvs_data previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.mozplugger_remove previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.catchall previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.sandbox_connect previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.httpd_write_content previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.wine previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.catchall_labels previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.samba_share previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.sys_module previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.qemu_blk_image previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.allow_execmod previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.file previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.sys_resource previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.mmap_zero previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.openvpn previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.mozplugger previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.setenforce previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.disable_ipv6 previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.dac_override previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.public_content previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.allow_anon_write previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.selinuxpolicy previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.associate previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.xen_image previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.chrome previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.leaks previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.sshd_root previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.qemu_file_image previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.mounton previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.allow_execstack previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.filesystem_associate previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.restorecon previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.swapfile previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.connect_ports previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.vbetool previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.device previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 17 15:47:31 spectre python[18573]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 17 15:47:31 spectre setroubleshoot[18573]: lookup_signature: found 1 matches with scores 1.00 >Mar 17 15:47:31 spectre setroubleshoot[18573]: signature found in database >Mar 17 15:47:31 spectre setroubleshoot[18573]: sending alert to all clients >Mar 17 15:47:31 spectre setroubleshoot[18573]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.restorecon_source previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.rsync_data previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.kernel_modules previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.catchall_boolean previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.automount_exec_config previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.bind_ports previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.allow_execheap previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.cvs_data previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.mozplugger_remove previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.catchall previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.sandbox_connect previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.httpd_write_content previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.wine previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.catchall_labels previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.samba_share previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.sys_module previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.qemu_blk_image previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.allow_execmod previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.file previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.sys_resource previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.mmap_zero previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.openvpn previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.mozplugger previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.setenforce previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.disable_ipv6 previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.dac_override previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.public_content previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.allow_anon_write previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.selinuxpolicy previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.associate previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.xen_image previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.chrome previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.leaks previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.sshd_root previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.qemu_file_image previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.mounton previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.allow_execstack previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.filesystem_associate previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.restorecon previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.swapfile previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.connect_ports previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.vbetool previously imported >Mar 17 15:47:31 spectre setroubleshoot[18573]: load_plugins() plugins.device previously imported >Mar 17 15:47:31 spectre python[18573]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 17 15:47:41 spectre setroubleshoot[18573]: received signal=14 >Mar 17 15:47:41 spectre setroubleshoot[18573]: KeyboardInterrupt in RunFaultServer >Mar 17 15:47:41 spectre setroubleshoot[18573]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 17 15:47:41 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 17 15:47:41 spectre dbus-daemon[637]: string index out of range >Mar 17 16:01:01 spectre systemd[1]: Starting user-0.slice. >Mar 17 16:01:01 spectre systemd[1]: Created slice user-0.slice. >Mar 17 16:01:01 spectre systemd[1]: Starting Session 4 of user root. >Mar 17 16:01:01 spectre systemd[1]: Started Session 4 of user root. >Mar 17 16:01:01 spectre systemd[1]: Starting User Manager for UID 0... >Mar 17 16:01:01 spectre systemd[18678]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 17 16:01:01 spectre systemd[18678]: Starting Paths. >Mar 17 16:01:01 spectre systemd[18678]: Reached target Paths. >Mar 17 16:01:01 spectre systemd[18678]: Starting Timers. >Mar 17 16:01:01 spectre systemd[18678]: Reached target Timers. >Mar 17 16:01:01 spectre systemd[18678]: Starting Sockets. >Mar 17 16:01:01 spectre systemd[18678]: Reached target Sockets. >Mar 17 16:01:01 spectre systemd[18678]: Starting Basic System. >Mar 17 16:01:01 spectre systemd[18678]: Reached target Basic System. >Mar 17 16:01:01 spectre systemd[18678]: Starting Default. >Mar 17 16:01:01 spectre systemd[18678]: Reached target Default. >Mar 17 16:01:01 spectre systemd[18678]: Startup finished in 14ms. >Mar 17 16:01:01 spectre systemd[1]: Started User Manager for UID 0. >Mar 17 16:01:01 spectre CROND[18692]: (root) CMD (run-parts /etc/cron.hourly) >Mar 17 16:01:01 spectre run-parts[18696]: (/etc/cron.hourly) starting 0anacron >Mar 17 16:01:01 spectre run-parts[18705]: (/etc/cron.hourly) finished 0anacron >Mar 17 16:01:01 spectre run-parts[18707]: (/etc/cron.hourly) starting mcelog.cron >Mar 17 16:01:01 spectre run-parts[18712]: (/etc/cron.hourly) finished mcelog.cron >Mar 17 16:01:01 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 17 16:01:01 spectre systemd[18678]: Stopping Default. >Mar 17 16:01:01 spectre systemd[18678]: Stopped target Default. >Mar 17 16:01:01 spectre systemd[18678]: Stopping Basic System. >Mar 17 16:01:01 spectre systemd[18678]: Stopped target Basic System. >Mar 17 16:01:01 spectre systemd[18678]: Stopping Paths. >Mar 17 16:01:01 spectre systemd[18678]: Stopped target Paths. >Mar 17 16:01:01 spectre systemd[18678]: Stopping Timers. >Mar 17 16:01:01 spectre systemd[18678]: Stopped target Timers. >Mar 17 16:01:01 spectre systemd[18678]: Stopping Sockets. >Mar 17 16:01:01 spectre systemd[18678]: Stopped target Sockets. >Mar 17 16:01:01 spectre systemd[18678]: Starting Shutdown. >Mar 17 16:01:01 spectre systemd[18678]: Reached target Shutdown. >Mar 17 16:01:01 spectre systemd[18678]: Starting Exit the Session... >Mar 17 16:01:01 spectre systemd[18678]: Received SIGRTMIN+24 from PID 18718 (kill). >Mar 17 16:01:01 spectre systemd[18687]: pam_unix(systemd-user:session): session closed for user root >Mar 17 16:01:01 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 17 16:01:01 spectre systemd[1]: Stopping user-0.slice. >Mar 17 16:01:01 spectre systemd[1]: Removed slice user-0.slice. >Mar 17 16:01:01 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 17 16:01:01 spectre systemd-logind[635]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 17 16:01:01 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 17 16:01:01 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 17 16:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 17 16:01:02 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 17 16:01:02 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 17 16:01:02 spectre setroubleshoot[18726]: RunFaultServer(10) >Mar 17 16:01:02 spectre setroubleshoot[18726]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 17 16:01:02 spectre setroubleshoot[18726]: database version 3.0 compatible with current 3.0 version >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 17 16:01:02 spectre setroubleshoot[18726]: Number of Plugins = 46 >Mar 17 16:01:02 spectre setroubleshoot[18726]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 17 16:01:02 spectre setroubleshoot[18726]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 17 16:01:02 spectre setroubleshoot[18726]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 17 16:01:02 spectre setroubleshoot[18726]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 17 16:01:02 spectre setroubleshoot[18726]: dbus avc(node=spectre type=AVC msg=audit(1395086461.753:445): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395086461.753:445): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528b530 a1=f0800 a2=0 a3=fffffffffffffe78 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395086461.753:445): >) called: 1 Connections >Mar 17 16:01:02 spectre setroubleshoot[18726]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395086461.753:445): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 17 16:01:02 spectre setroubleshoot[18726]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395086461.753:445): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528b530 a1=f0800 a2=0 a3=fffffffffffffe78 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 17 16:01:02 spectre setroubleshoot[18726]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395086461.753:445): >Mar 17 16:01:02 spectre setroubleshoot[18726]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 17 16:01:02 spectre setroubleshoot[18726]: dbus avc(node=spectre type=AVC msg=audit(1395086461.754:446): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395086461.754:446): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528b530 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395086461.754:446): >) called: 1 Connections >Mar 17 16:01:02 spectre setroubleshoot[18726]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395086461.754:446): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 17 16:01:02 spectre setroubleshoot[18726]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395086461.754:446): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528b530 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 17 16:01:02 spectre setroubleshoot[18726]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395086461.754:446): >Mar 17 16:01:02 spectre setroubleshoot[18726]: dbus avc(node=spectre type=AVC msg=audit(1395086461.754:447): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395086461.754:447): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528b530 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395086461.754:447): >) called: 1 Connections >Mar 17 16:01:02 spectre setroubleshoot[18726]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395086461.754:447): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 17 16:01:02 spectre setroubleshoot[18726]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395086461.754:447): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528b530 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 17 16:01:02 spectre setroubleshoot[18726]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395086461.754:447): >Mar 17 16:01:02 spectre setroubleshoot[18726]: Plugin Exception restorecon_source >Mar 17 16:01:02 spectre setroubleshoot[18726]: Plugin Exception restorecon >Mar 17 16:01:02 spectre setroubleshoot[18726]: lookup_signature: found 1 matches with scores 1.00 >Mar 17 16:01:02 spectre setroubleshoot[18726]: signature found in database >Mar 17 16:01:02 spectre setroubleshoot[18726]: sending alert to all clients >Mar 17 16:01:02 spectre setroubleshoot[18726]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.restorecon_source previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.rsync_data previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.kernel_modules previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.catchall_boolean previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.automount_exec_config previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.bind_ports previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.allow_execheap previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.cvs_data previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.mozplugger_remove previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.catchall previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.sandbox_connect previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.httpd_write_content previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.wine previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.catchall_labels previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.samba_share previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.sys_module previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.qemu_blk_image previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.allow_execmod previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.file previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.sys_resource previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.mmap_zero previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.openvpn previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.mozplugger previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.setenforce previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.disable_ipv6 previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.dac_override previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.public_content previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.allow_anon_write previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.selinuxpolicy previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.associate previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.xen_image previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.chrome previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.leaks previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.sshd_root previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.qemu_file_image previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.mounton previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.allow_execstack previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.filesystem_associate previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.restorecon previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.swapfile previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.connect_ports previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.vbetool previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.device previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 17 16:01:02 spectre python[18726]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 17 16:01:02 spectre setroubleshoot[18726]: lookup_signature: found 1 matches with scores 1.00 >Mar 17 16:01:02 spectre setroubleshoot[18726]: signature found in database >Mar 17 16:01:02 spectre setroubleshoot[18726]: sending alert to all clients >Mar 17 16:01:02 spectre setroubleshoot[18726]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.restorecon_source previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.rsync_data previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.kernel_modules previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.catchall_boolean previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.automount_exec_config previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.bind_ports previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.allow_execheap previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.cvs_data previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.mozplugger_remove previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.catchall previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.sandbox_connect previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.httpd_write_content previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.wine previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.catchall_labels previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.samba_share previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.sys_module previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.qemu_blk_image previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.allow_execmod previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.file previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.sys_resource previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.mmap_zero previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.openvpn previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.mozplugger previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.setenforce previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.disable_ipv6 previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.dac_override previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.public_content previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.allow_anon_write previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.selinuxpolicy previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.associate previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.xen_image previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.chrome previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.leaks previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.sshd_root previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.qemu_file_image previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.mounton previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.allow_execstack previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.filesystem_associate previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.restorecon previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.swapfile previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.connect_ports previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.vbetool previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.device previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 17 16:01:02 spectre python[18726]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 17 16:01:02 spectre setroubleshoot[18726]: lookup_signature: found 1 matches with scores 1.00 >Mar 17 16:01:02 spectre setroubleshoot[18726]: signature found in database >Mar 17 16:01:02 spectre setroubleshoot[18726]: sending alert to all clients >Mar 17 16:01:02 spectre setroubleshoot[18726]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.restorecon_source previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.rsync_data previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.kernel_modules previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.catchall_boolean previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.automount_exec_config previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.bind_ports previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.allow_execheap previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.cvs_data previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.mozplugger_remove previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.catchall previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.sandbox_connect previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.httpd_write_content previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.wine previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.catchall_labels previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.samba_share previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.sys_module previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.qemu_blk_image previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.allow_execmod previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.file previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.sys_resource previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.mmap_zero previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.openvpn previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.mozplugger previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.setenforce previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.disable_ipv6 previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.dac_override previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.public_content previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.allow_anon_write previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.selinuxpolicy previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.associate previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.xen_image previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.chrome previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.leaks previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.sshd_root previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.qemu_file_image previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.mounton previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.allow_execstack previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.filesystem_associate previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.restorecon previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.swapfile previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.connect_ports previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.vbetool previously imported >Mar 17 16:01:02 spectre setroubleshoot[18726]: load_plugins() plugins.device previously imported >Mar 17 16:01:02 spectre python[18726]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 17 16:01:12 spectre setroubleshoot[18726]: received signal=14 >Mar 17 16:01:12 spectre setroubleshoot[18726]: KeyboardInterrupt in RunFaultServer >Mar 17 16:01:12 spectre setroubleshoot[18726]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 17 16:01:12 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 17 16:01:12 spectre dbus-daemon[637]: string index out of range >Mar 17 16:11:24 spectre systemd[1]: Starting dnf makecache... >Mar 17 16:11:24 spectre dnf[18822]: Config time: 0.006 >Mar 17 16:11:24 spectre dnf[18822]: cachedir: /var/cache/dnf/x86_64/21 >Mar 17 16:11:24 spectre dnf[18822]: dnf version: 0.4.17 >Mar 17 16:11:24 spectre dnf[18822]: Making cache files for all metadata files. >Mar 17 16:11:24 spectre dnf[18822]: rawhide: will expire after 29437 seconds. >Mar 17 16:11:24 spectre dnf[18822]: repo: using cache for: rawhide >Mar 17 16:11:24 spectre dnf[18822]: hawkey sack setup time: 0.776 >Mar 17 16:11:24 spectre dnf[18822]: Metadata cache created. >Mar 17 16:11:25 spectre systemd[1]: Started dnf makecache. >Mar 17 17:01:01 spectre systemd[1]: Starting user-0.slice. >Mar 17 17:01:01 spectre systemd[1]: Created slice user-0.slice. >Mar 17 17:01:01 spectre systemd[1]: Starting User Manager for UID 0... >Mar 17 17:01:01 spectre systemd[1]: Starting Session 5 of user root. >Mar 17 17:01:01 spectre systemd[1]: Started Session 5 of user root. >Mar 17 17:01:01 spectre systemd[18832]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 17 17:01:01 spectre systemd[18832]: Starting Paths. >Mar 17 17:01:01 spectre systemd[18832]: Reached target Paths. >Mar 17 17:01:01 spectre systemd[18832]: Starting Timers. >Mar 17 17:01:01 spectre systemd[18832]: Reached target Timers. >Mar 17 17:01:01 spectre systemd[18832]: Starting Sockets. >Mar 17 17:01:01 spectre systemd[18832]: Reached target Sockets. >Mar 17 17:01:01 spectre systemd[18832]: Starting Basic System. >Mar 17 17:01:01 spectre systemd[18832]: Reached target Basic System. >Mar 17 17:01:01 spectre systemd[18832]: Starting Default. >Mar 17 17:01:01 spectre systemd[18832]: Reached target Default. >Mar 17 17:01:01 spectre systemd[18832]: Startup finished in 10ms. >Mar 17 17:01:01 spectre systemd[1]: Started User Manager for UID 0. >Mar 17 17:01:01 spectre CROND[18847]: (root) CMD (run-parts /etc/cron.hourly) >Mar 17 17:01:01 spectre run-parts[18850]: (/etc/cron.hourly) starting 0anacron >Mar 17 17:01:01 spectre run-parts[18858]: (/etc/cron.hourly) finished 0anacron >Mar 17 17:01:01 spectre run-parts[18860]: (/etc/cron.hourly) starting mcelog.cron >Mar 17 17:01:01 spectre run-parts[18865]: (/etc/cron.hourly) finished mcelog.cron >Mar 17 17:01:01 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 17 17:01:01 spectre systemd[18832]: Stopping Default. >Mar 17 17:01:01 spectre systemd[18832]: Stopped target Default. >Mar 17 17:01:01 spectre systemd[18832]: Stopping Basic System. >Mar 17 17:01:01 spectre systemd[18832]: Stopped target Basic System. >Mar 17 17:01:01 spectre systemd[18832]: Stopping Paths. >Mar 17 17:01:01 spectre systemd[18832]: Stopped target Paths. >Mar 17 17:01:01 spectre systemd[18832]: Stopping Timers. >Mar 17 17:01:01 spectre systemd[18832]: Stopped target Timers. >Mar 17 17:01:01 spectre systemd[18832]: Stopping Sockets. >Mar 17 17:01:01 spectre systemd[18832]: Stopped target Sockets. >Mar 17 17:01:01 spectre systemd[18832]: Starting Shutdown. >Mar 17 17:01:01 spectre systemd[18832]: Reached target Shutdown. >Mar 17 17:01:01 spectre systemd[18832]: Starting Exit the Session... >Mar 17 17:01:01 spectre systemd[18832]: Received SIGRTMIN+24 from PID 18871 (kill). >Mar 17 17:01:01 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 17 17:01:01 spectre systemd[1]: Stopping user-0.slice. >Mar 17 17:01:01 spectre systemd[1]: Removed slice user-0.slice. >Mar 17 17:01:01 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 17 17:01:01 spectre systemd-logind[635]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 17 17:01:01 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 17 17:01:01 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 17 17:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 17 17:01:02 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 17 17:01:02 spectre setroubleshoot[18881]: RunFaultServer(10) >Mar 17 17:01:02 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 17 17:01:02 spectre setroubleshoot[18881]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 17 17:01:02 spectre setroubleshoot[18881]: database version 3.0 compatible with current 3.0 version >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 17 17:01:02 spectre setroubleshoot[18881]: Number of Plugins = 46 >Mar 17 17:01:02 spectre setroubleshoot[18881]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 17 17:01:02 spectre setroubleshoot[18881]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 17 17:01:02 spectre setroubleshoot[18881]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 17 17:01:02 spectre setroubleshoot[18881]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 17 17:01:02 spectre setroubleshoot[18881]: dbus avc(node=spectre type=AVC msg=audit(1395090061.922:461): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395090061.922:461): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528a840 a1=f0800 a2=0 a3=fffffffffffff7e8 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395090061.922:461): >) called: 1 Connections >Mar 17 17:01:02 spectre setroubleshoot[18881]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395090061.922:461): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 17 17:01:02 spectre setroubleshoot[18881]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395090061.922:461): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528a840 a1=f0800 a2=0 a3=fffffffffffff7e8 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 17 17:01:02 spectre setroubleshoot[18881]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395090061.922:461): >Mar 17 17:01:02 spectre setroubleshoot[18881]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 17 17:01:02 spectre setroubleshoot[18881]: dbus avc(node=spectre type=AVC msg=audit(1395090061.923:462): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395090061.923:462): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528a840 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395090061.923:462): >) called: 1 Connections >Mar 17 17:01:02 spectre setroubleshoot[18881]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395090061.923:462): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 17 17:01:02 spectre setroubleshoot[18881]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395090061.923:462): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528a840 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 17 17:01:02 spectre setroubleshoot[18881]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395090061.923:462): >Mar 17 17:01:02 spectre setroubleshoot[18881]: dbus avc(node=spectre type=AVC msg=audit(1395090061.923:463): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395090061.923:463): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528a840 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395090061.923:463): >) called: 1 Connections >Mar 17 17:01:02 spectre setroubleshoot[18881]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395090061.923:463): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 17 17:01:02 spectre setroubleshoot[18881]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395090061.923:463): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528a840 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 17 17:01:02 spectre setroubleshoot[18881]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395090061.923:463): >Mar 17 17:01:02 spectre setroubleshoot[18881]: Plugin Exception restorecon_source >Mar 17 17:01:02 spectre setroubleshoot[18881]: Plugin Exception restorecon >Mar 17 17:01:02 spectre setroubleshoot[18881]: lookup_signature: found 1 matches with scores 1.00 >Mar 17 17:01:02 spectre setroubleshoot[18881]: signature found in database >Mar 17 17:01:02 spectre setroubleshoot[18881]: sending alert to all clients >Mar 17 17:01:02 spectre setroubleshoot[18881]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.restorecon_source previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.rsync_data previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.kernel_modules previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.catchall_boolean previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.automount_exec_config previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.bind_ports previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.allow_execheap previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.cvs_data previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.mozplugger_remove previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.catchall previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.sandbox_connect previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.httpd_write_content previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.wine previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.catchall_labels previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.samba_share previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.sys_module previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.qemu_blk_image previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.allow_execmod previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.file previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.sys_resource previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.mmap_zero previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.openvpn previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.mozplugger previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.setenforce previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.disable_ipv6 previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.dac_override previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.public_content previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.allow_anon_write previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.selinuxpolicy previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.associate previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.xen_image previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.chrome previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.leaks previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.sshd_root previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.qemu_file_image previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.mounton previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.allow_execstack previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.filesystem_associate previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.restorecon previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.swapfile previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.connect_ports previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.vbetool previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.device previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 17 17:01:02 spectre python[18881]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 17 17:01:02 spectre setroubleshoot[18881]: lookup_signature: found 1 matches with scores 1.00 >Mar 17 17:01:02 spectre setroubleshoot[18881]: signature found in database >Mar 17 17:01:02 spectre setroubleshoot[18881]: sending alert to all clients >Mar 17 17:01:02 spectre setroubleshoot[18881]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.restorecon_source previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.rsync_data previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.kernel_modules previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.catchall_boolean previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.automount_exec_config previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.bind_ports previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.allow_execheap previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.cvs_data previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.mozplugger_remove previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.catchall previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.sandbox_connect previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.httpd_write_content previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.wine previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.catchall_labels previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.samba_share previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.sys_module previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.qemu_blk_image previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.allow_execmod previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.file previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.sys_resource previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.mmap_zero previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.openvpn previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.mozplugger previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.setenforce previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.disable_ipv6 previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.dac_override previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.public_content previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.allow_anon_write previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.selinuxpolicy previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.associate previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.xen_image previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.chrome previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.leaks previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.sshd_root previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.qemu_file_image previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.mounton previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.allow_execstack previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.filesystem_associate previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.restorecon previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.swapfile previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.connect_ports previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.vbetool previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.device previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 17 17:01:02 spectre python[18881]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 17 17:01:02 spectre setroubleshoot[18881]: lookup_signature: found 1 matches with scores 1.00 >Mar 17 17:01:02 spectre setroubleshoot[18881]: signature found in database >Mar 17 17:01:02 spectre setroubleshoot[18881]: sending alert to all clients >Mar 17 17:01:02 spectre setroubleshoot[18881]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.restorecon_source previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.rsync_data previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.kernel_modules previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.catchall_boolean previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.automount_exec_config previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.bind_ports previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.allow_execheap previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.cvs_data previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.mozplugger_remove previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.catchall previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.sandbox_connect previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.httpd_write_content previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.wine previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.catchall_labels previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.samba_share previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.sys_module previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.qemu_blk_image previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.allow_execmod previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.file previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.sys_resource previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.mmap_zero previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.openvpn previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.mozplugger previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.setenforce previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.disable_ipv6 previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.dac_override previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.public_content previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.allow_anon_write previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.selinuxpolicy previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.associate previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.xen_image previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.chrome previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.leaks previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.sshd_root previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.qemu_file_image previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.mounton previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.allow_execstack previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.filesystem_associate previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.restorecon previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.swapfile previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.connect_ports previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.vbetool previously imported >Mar 17 17:01:02 spectre setroubleshoot[18881]: load_plugins() plugins.device previously imported >Mar 17 17:01:02 spectre python[18881]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 17 17:01:12 spectre setroubleshoot[18881]: received signal=14 >Mar 17 17:01:12 spectre setroubleshoot[18881]: KeyboardInterrupt in RunFaultServer >Mar 17 17:01:12 spectre setroubleshoot[18881]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 17 17:01:12 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 17 17:01:12 spectre dbus-daemon[637]: string index out of range >Mar 17 17:11:25 spectre systemd[1]: Starting dnf makecache... >Mar 17 17:11:25 spectre dnf[18979]: Config time: 0.005 >Mar 17 17:11:25 spectre dnf[18979]: cachedir: /var/cache/dnf/x86_64/21 >Mar 17 17:11:25 spectre dnf[18979]: dnf version: 0.4.17 >Mar 17 17:11:25 spectre dnf[18979]: Making cache files for all metadata files. >Mar 17 17:11:25 spectre dnf[18979]: Metadata cache refreshed recently. >Mar 17 17:11:25 spectre systemd[1]: Started dnf makecache. >Mar 17 18:01:01 spectre systemd[1]: Starting user-0.slice. >Mar 17 18:01:01 spectre systemd[1]: Created slice user-0.slice. >Mar 17 18:01:01 spectre systemd[1]: Starting Session 6 of user root. >Mar 17 18:01:01 spectre systemd[1]: Started Session 6 of user root. >Mar 17 18:01:01 spectre systemd[1]: Starting User Manager for UID 0... >Mar 17 18:01:01 spectre systemd[18988]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 17 18:01:02 spectre systemd[18988]: Starting Paths. >Mar 17 18:01:02 spectre systemd[18988]: Reached target Paths. >Mar 17 18:01:02 spectre systemd[18988]: Starting Timers. >Mar 17 18:01:02 spectre systemd[18988]: Reached target Timers. >Mar 17 18:01:02 spectre systemd[18988]: Starting Sockets. >Mar 17 18:01:02 spectre systemd[18988]: Reached target Sockets. >Mar 17 18:01:02 spectre systemd[18988]: Starting Basic System. >Mar 17 18:01:02 spectre systemd[18988]: Reached target Basic System. >Mar 17 18:01:02 spectre systemd[18988]: Starting Default. >Mar 17 18:01:02 spectre systemd[18988]: Reached target Default. >Mar 17 18:01:02 spectre systemd[18988]: Startup finished in 10ms. >Mar 17 18:01:02 spectre systemd[1]: Started User Manager for UID 0. >Mar 17 18:01:02 spectre CROND[19001]: (root) CMD (run-parts /etc/cron.hourly) >Mar 17 18:01:02 spectre run-parts[19005]: (/etc/cron.hourly) starting 0anacron >Mar 17 18:01:02 spectre run-parts[19013]: (/etc/cron.hourly) finished 0anacron >Mar 17 18:01:02 spectre run-parts[19015]: (/etc/cron.hourly) starting mcelog.cron >Mar 17 18:01:02 spectre run-parts[19020]: (/etc/cron.hourly) finished mcelog.cron >Mar 17 18:01:02 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 17 18:01:02 spectre systemd[18988]: Stopping Default. >Mar 17 18:01:02 spectre systemd[18988]: Stopped target Default. >Mar 17 18:01:02 spectre systemd[18988]: Stopping Basic System. >Mar 17 18:01:02 spectre systemd[18988]: Stopped target Basic System. >Mar 17 18:01:02 spectre systemd[18988]: Stopping Paths. >Mar 17 18:01:02 spectre systemd[18988]: Stopped target Paths. >Mar 17 18:01:02 spectre systemd[18988]: Stopping Timers. >Mar 17 18:01:02 spectre systemd[18988]: Stopped target Timers. >Mar 17 18:01:02 spectre systemd[18988]: Stopping Sockets. >Mar 17 18:01:02 spectre systemd[18988]: Stopped target Sockets. >Mar 17 18:01:02 spectre systemd[18988]: Starting Shutdown. >Mar 17 18:01:02 spectre systemd[18988]: Reached target Shutdown. >Mar 17 18:01:02 spectre systemd[18988]: Starting Exit the Session... >Mar 17 18:01:02 spectre systemd[18988]: Received SIGRTMIN+24 from PID 19028 (kill). >Mar 17 18:01:02 spectre systemd[18997]: pam_unix(systemd-user:session): session closed for user root >Mar 17 18:01:02 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 17 18:01:02 spectre systemd[1]: Stopping user-0.slice. >Mar 17 18:01:02 spectre systemd[1]: Removed slice user-0.slice. >Mar 17 18:01:02 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 17 18:01:02 spectre systemd-logind[635]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 17 18:01:02 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 17 18:01:02 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 17 18:01:02 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 17 18:01:02 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 17 18:01:02 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 17 18:01:02 spectre setroubleshoot[19038]: RunFaultServer(10) >Mar 17 18:01:02 spectre setroubleshoot[19038]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 17 18:01:02 spectre setroubleshoot[19038]: database version 3.0 compatible with current 3.0 version >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 17 18:01:02 spectre setroubleshoot[19038]: Number of Plugins = 46 >Mar 17 18:01:02 spectre setroubleshoot[19038]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 17 18:01:02 spectre setroubleshoot[19038]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 17 18:01:02 spectre setroubleshoot[19038]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 17 18:01:02 spectre setroubleshoot[19038]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 17 18:01:02 spectre setroubleshoot[19038]: dbus avc(node=spectre type=AVC msg=audit(1395093662.097:478): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395093662.097:478): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528b510 a1=f0800 a2=0 a3=fffffffffffffbe8 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395093662.097:478): >) called: 1 Connections >Mar 17 18:01:02 spectre setroubleshoot[19038]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395093662.97:478): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 17 18:01:02 spectre setroubleshoot[19038]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395093662.97:478): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528b510 a1=f0800 a2=0 a3=fffffffffffffbe8 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 17 18:01:02 spectre setroubleshoot[19038]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395093662.97:478): >Mar 17 18:01:02 spectre setroubleshoot[19038]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 17 18:01:02 spectre setroubleshoot[19038]: dbus avc(node=spectre type=AVC msg=audit(1395093662.097:479): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395093662.097:479): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528b510 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395093662.097:479): >) called: 1 Connections >Mar 17 18:01:02 spectre setroubleshoot[19038]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395093662.97:479): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 17 18:01:02 spectre setroubleshoot[19038]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395093662.97:479): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528b510 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 17 18:01:02 spectre setroubleshoot[19038]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395093662.97:479): >Mar 17 18:01:02 spectre setroubleshoot[19038]: dbus avc(node=spectre type=AVC msg=audit(1395093662.097:480): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395093662.097:480): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528b510 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395093662.097:480): >) called: 1 Connections >Mar 17 18:01:02 spectre setroubleshoot[19038]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395093662.97:480): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 17 18:01:02 spectre setroubleshoot[19038]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395093662.97:480): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528b510 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 17 18:01:02 spectre setroubleshoot[19038]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395093662.97:480): >Mar 17 18:01:02 spectre setroubleshoot[19038]: Plugin Exception restorecon_source >Mar 17 18:01:02 spectre setroubleshoot[19038]: Plugin Exception restorecon >Mar 17 18:01:02 spectre setroubleshoot[19038]: lookup_signature: found 1 matches with scores 1.00 >Mar 17 18:01:02 spectre setroubleshoot[19038]: signature found in database >Mar 17 18:01:02 spectre setroubleshoot[19038]: sending alert to all clients >Mar 17 18:01:02 spectre setroubleshoot[19038]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.restorecon_source previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.rsync_data previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.kernel_modules previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.catchall_boolean previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.automount_exec_config previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.bind_ports previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.allow_execheap previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.cvs_data previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.mozplugger_remove previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.catchall previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.sandbox_connect previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.httpd_write_content previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.wine previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.catchall_labels previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.samba_share previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.sys_module previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.qemu_blk_image previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.allow_execmod previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.file previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.sys_resource previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.mmap_zero previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.openvpn previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.mozplugger previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.setenforce previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.disable_ipv6 previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.dac_override previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.public_content previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.allow_anon_write previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.selinuxpolicy previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.associate previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.xen_image previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.chrome previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.leaks previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.sshd_root previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.qemu_file_image previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.mounton previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.allow_execstack previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.filesystem_associate previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.restorecon previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.swapfile previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.connect_ports previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.vbetool previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.device previously imported >Mar 17 18:01:02 spectre python[19038]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 17 18:01:02 spectre setroubleshoot[19038]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 17 18:01:02 spectre setroubleshoot[19038]: lookup_signature: found 1 matches with scores 1.00 >Mar 17 18:01:02 spectre setroubleshoot[19038]: signature found in database >Mar 17 18:01:02 spectre setroubleshoot[19038]: sending alert to all clients >Mar 17 18:01:02 spectre setroubleshoot[19038]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.restorecon_source previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.rsync_data previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.kernel_modules previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.catchall_boolean previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.automount_exec_config previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.bind_ports previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.allow_execheap previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.cvs_data previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.mozplugger_remove previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.catchall previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.sandbox_connect previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.httpd_write_content previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.wine previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.catchall_labels previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.samba_share previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.sys_module previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.qemu_blk_image previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.allow_execmod previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.file previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.sys_resource previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.mmap_zero previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.openvpn previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.mozplugger previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.setenforce previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.disable_ipv6 previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.dac_override previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.public_content previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.allow_anon_write previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.selinuxpolicy previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.associate previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.xen_image previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.chrome previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.leaks previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.sshd_root previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.qemu_file_image previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.mounton previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.allow_execstack previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.filesystem_associate previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.restorecon previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.swapfile previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.connect_ports previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.vbetool previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.device previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 17 18:01:02 spectre python[19038]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 17 18:01:02 spectre setroubleshoot[19038]: lookup_signature: found 1 matches with scores 1.00 >Mar 17 18:01:02 spectre setroubleshoot[19038]: signature found in database >Mar 17 18:01:02 spectre setroubleshoot[19038]: sending alert to all clients >Mar 17 18:01:02 spectre setroubleshoot[19038]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.restorecon_source previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.rsync_data previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.kernel_modules previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.catchall_boolean previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.automount_exec_config previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.bind_ports previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.allow_execheap previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.cvs_data previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.mozplugger_remove previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.catchall previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.sandbox_connect previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.httpd_write_content previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.wine previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.catchall_labels previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.samba_share previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.sys_module previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.qemu_blk_image previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.allow_execmod previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.file previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.sys_resource previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.mmap_zero previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.openvpn previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.mozplugger previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.setenforce previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.disable_ipv6 previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.dac_override previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.public_content previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.allow_anon_write previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.selinuxpolicy previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.associate previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.xen_image previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.chrome previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.leaks previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.sshd_root previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.qemu_file_image previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.mounton previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.allow_execstack previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.filesystem_associate previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.restorecon previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.swapfile previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.connect_ports previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.vbetool previously imported >Mar 17 18:01:02 spectre setroubleshoot[19038]: load_plugins() plugins.device previously imported >Mar 17 18:01:02 spectre python[19038]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 17 18:01:12 spectre setroubleshoot[19038]: received signal=14 >Mar 17 18:01:12 spectre setroubleshoot[19038]: KeyboardInterrupt in RunFaultServer >Mar 17 18:01:12 spectre setroubleshoot[19038]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 17 18:01:12 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 17 18:01:12 spectre dbus-daemon[637]: string index out of range >Mar 17 18:11:26 spectre systemd[1]: Starting dnf makecache... >Mar 17 18:11:27 spectre dnf[19135]: Config time: 0.005 >Mar 17 18:11:27 spectre dnf[19135]: cachedir: /var/cache/dnf/x86_64/21 >Mar 17 18:11:27 spectre dnf[19135]: dnf version: 0.4.17 >Mar 17 18:11:27 spectre dnf[19135]: Making cache files for all metadata files. >Mar 17 18:11:27 spectre dnf[19135]: Metadata cache refreshed recently. >Mar 17 18:11:27 spectre systemd[1]: Started dnf makecache. >Mar 17 19:01:01 spectre systemd[1]: Starting user-0.slice. >Mar 17 19:01:01 spectre systemd[1]: Created slice user-0.slice. >Mar 17 19:01:01 spectre systemd[1]: Starting User Manager for UID 0... >Mar 17 19:01:01 spectre systemd[1]: Starting Session 7 of user root. >Mar 17 19:01:01 spectre systemd[1]: Started Session 7 of user root. >Mar 17 19:01:01 spectre systemd[19143]: Starting Paths. >Mar 17 19:01:01 spectre systemd[19143]: Reached target Paths. >Mar 17 19:01:01 spectre systemd[19143]: Starting Timers. >Mar 17 19:01:01 spectre systemd[19143]: Reached target Timers. >Mar 17 19:01:01 spectre systemd[19143]: Starting Sockets. >Mar 17 19:01:01 spectre systemd[19143]: Reached target Sockets. >Mar 17 19:01:01 spectre systemd[19143]: Starting Basic System. >Mar 17 19:01:01 spectre systemd[19143]: Reached target Basic System. >Mar 17 19:01:01 spectre systemd[19143]: Starting Default. >Mar 17 19:01:01 spectre systemd[19143]: Reached target Default. >Mar 17 19:01:01 spectre systemd[19143]: Startup finished in 30ms. >Mar 17 19:01:01 spectre systemd[1]: Started User Manager for UID 0. >Mar 17 19:01:01 spectre systemd[19143]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 17 19:01:01 spectre CROND[19157]: (root) CMD (run-parts /etc/cron.hourly) >Mar 17 19:01:01 spectre run-parts[19162]: (/etc/cron.hourly) starting 0anacron >Mar 17 19:01:01 spectre run-parts[19169]: (/etc/cron.hourly) finished 0anacron >Mar 17 19:01:01 spectre run-parts[19172]: (/etc/cron.hourly) starting mcelog.cron >Mar 17 19:01:01 spectre run-parts[19177]: (/etc/cron.hourly) finished mcelog.cron >Mar 17 19:01:01 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 17 19:01:01 spectre systemd[19143]: Stopping Default. >Mar 17 19:01:01 spectre systemd[19143]: Stopped target Default. >Mar 17 19:01:01 spectre systemd[19143]: Stopping Basic System. >Mar 17 19:01:01 spectre systemd[19143]: Stopped target Basic System. >Mar 17 19:01:01 spectre systemd[19143]: Stopping Paths. >Mar 17 19:01:01 spectre systemd[19143]: Stopped target Paths. >Mar 17 19:01:01 spectre systemd[19143]: Stopping Timers. >Mar 17 19:01:01 spectre systemd[19143]: Stopped target Timers. >Mar 17 19:01:01 spectre systemd[19143]: Stopping Sockets. >Mar 17 19:01:01 spectre systemd[19143]: Stopped target Sockets. >Mar 17 19:01:01 spectre systemd[19143]: Starting Shutdown. >Mar 17 19:01:01 spectre systemd[19143]: Reached target Shutdown. >Mar 17 19:01:01 spectre systemd[19143]: Starting Exit the Session... >Mar 17 19:01:01 spectre systemd[19143]: Received SIGRTMIN+24 from PID 19183 (kill). >Mar 17 19:01:01 spectre systemd[19150]: pam_unix(systemd-user:session): session closed for user root >Mar 17 19:01:01 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 17 19:01:01 spectre systemd[1]: Stopping user-0.slice. >Mar 17 19:01:01 spectre systemd[1]: Removed slice user-0.slice. >Mar 17 19:01:01 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 17 19:01:01 spectre systemd-logind[635]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 17 19:01:01 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 17 19:01:01 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 17 19:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 17 19:01:01 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 17 19:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 17 19:01:01 spectre setroubleshoot[19192]: RunFaultServer(10) >Mar 17 19:01:01 spectre setroubleshoot[19192]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 17 19:01:01 spectre setroubleshoot[19192]: database version 3.0 compatible with current 3.0 version >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 17 19:01:01 spectre setroubleshoot[19192]: Number of Plugins = 46 >Mar 17 19:01:01 spectre setroubleshoot[19192]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 17 19:01:01 spectre setroubleshoot[19192]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 17 19:01:01 spectre setroubleshoot[19192]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 17 19:01:01 spectre setroubleshoot[19192]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 17 19:01:01 spectre setroubleshoot[19192]: dbus avc(node=spectre type=AVC msg=audit(1395097261.271:495): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395097261.271:495): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528d4a0 a1=f0800 a2=0 a3=fffffffffffffbe8 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395097261.271:495): >) called: 1 Connections >Mar 17 19:01:01 spectre setroubleshoot[19192]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395097261.271:495): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 17 19:01:01 spectre setroubleshoot[19192]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395097261.271:495): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528d4a0 a1=f0800 a2=0 a3=fffffffffffffbe8 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 17 19:01:01 spectre setroubleshoot[19192]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395097261.271:495): >Mar 17 19:01:01 spectre setroubleshoot[19192]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 17 19:01:01 spectre setroubleshoot[19192]: dbus avc(node=spectre type=AVC msg=audit(1395097261.271:496): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395097261.271:496): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528d4a0 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395097261.271:496): >) called: 1 Connections >Mar 17 19:01:01 spectre setroubleshoot[19192]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395097261.271:496): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 17 19:01:01 spectre setroubleshoot[19192]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395097261.271:496): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528d4a0 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 17 19:01:01 spectre setroubleshoot[19192]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395097261.271:496): >Mar 17 19:01:01 spectre setroubleshoot[19192]: dbus avc(node=spectre type=AVC msg=audit(1395097261.271:497): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395097261.271:497): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528d4a0 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395097261.271:497): >) called: 1 Connections >Mar 17 19:01:01 spectre setroubleshoot[19192]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395097261.271:497): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 17 19:01:01 spectre setroubleshoot[19192]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395097261.271:497): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528d4a0 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 17 19:01:01 spectre setroubleshoot[19192]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395097261.271:497): >Mar 17 19:01:01 spectre setroubleshoot[19192]: Plugin Exception restorecon_source >Mar 17 19:01:01 spectre setroubleshoot[19192]: Plugin Exception restorecon >Mar 17 19:01:01 spectre setroubleshoot[19192]: lookup_signature: found 1 matches with scores 1.00 >Mar 17 19:01:01 spectre setroubleshoot[19192]: signature found in database >Mar 17 19:01:01 spectre setroubleshoot[19192]: sending alert to all clients >Mar 17 19:01:01 spectre setroubleshoot[19192]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.restorecon_source previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.rsync_data previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.kernel_modules previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.catchall_boolean previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.automount_exec_config previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.bind_ports previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.allow_execheap previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.cvs_data previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.mozplugger_remove previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.catchall previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.sandbox_connect previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.httpd_write_content previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.wine previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.catchall_labels previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.samba_share previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.sys_module previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.qemu_blk_image previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.allow_execmod previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.file previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.sys_resource previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.mmap_zero previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.openvpn previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.mozplugger previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.setenforce previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.disable_ipv6 previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.dac_override previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.public_content previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.allow_anon_write previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.selinuxpolicy previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.associate previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.xen_image previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.chrome previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.leaks previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.sshd_root previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.qemu_file_image previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.mounton previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.allow_execstack previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.filesystem_associate previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.restorecon previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.swapfile previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.connect_ports previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.vbetool previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.device previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 17 19:01:01 spectre python[19192]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 17 19:01:01 spectre setroubleshoot[19192]: lookup_signature: found 1 matches with scores 1.00 >Mar 17 19:01:01 spectre setroubleshoot[19192]: signature found in database >Mar 17 19:01:01 spectre setroubleshoot[19192]: sending alert to all clients >Mar 17 19:01:01 spectre setroubleshoot[19192]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.restorecon_source previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.rsync_data previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.kernel_modules previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.catchall_boolean previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.automount_exec_config previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.bind_ports previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.allow_execheap previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.cvs_data previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.mozplugger_remove previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.catchall previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.sandbox_connect previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.httpd_write_content previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.wine previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.catchall_labels previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.samba_share previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.sys_module previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.qemu_blk_image previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.allow_execmod previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.file previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.sys_resource previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.mmap_zero previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.openvpn previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.mozplugger previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.setenforce previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.disable_ipv6 previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.dac_override previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.public_content previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.allow_anon_write previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.selinuxpolicy previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.associate previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.xen_image previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.chrome previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.leaks previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.sshd_root previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.qemu_file_image previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.mounton previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.allow_execstack previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.filesystem_associate previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.restorecon previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.swapfile previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.connect_ports previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.vbetool previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: load_plugins() plugins.device previously imported >Mar 17 19:01:01 spectre setroubleshoot[19192]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 17 19:01:01 spectre python[19192]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 17 19:01:02 spectre setroubleshoot[19192]: lookup_signature: found 1 matches with scores 1.00 >Mar 17 19:01:02 spectre setroubleshoot[19192]: signature found in database >Mar 17 19:01:02 spectre setroubleshoot[19192]: sending alert to all clients >Mar 17 19:01:02 spectre setroubleshoot[19192]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 17 19:01:02 spectre setroubleshoot[19192]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 17 19:01:02 spectre setroubleshoot[19192]: load_plugins() plugins.restorecon_source previously imported >Mar 17 19:01:02 spectre setroubleshoot[19192]: load_plugins() plugins.rsync_data previously imported >Mar 17 19:01:02 spectre setroubleshoot[19192]: load_plugins() plugins.kernel_modules previously imported >Mar 17 19:01:02 spectre setroubleshoot[19192]: load_plugins() plugins.catchall_boolean previously imported >Mar 17 19:01:02 spectre setroubleshoot[19192]: load_plugins() plugins.automount_exec_config previously imported >Mar 17 19:01:02 spectre setroubleshoot[19192]: load_plugins() plugins.bind_ports previously imported >Mar 17 19:01:02 spectre setroubleshoot[19192]: load_plugins() plugins.allow_execheap previously imported >Mar 17 19:01:02 spectre setroubleshoot[19192]: load_plugins() plugins.cvs_data previously imported >Mar 17 19:01:02 spectre setroubleshoot[19192]: load_plugins() plugins.mozplugger_remove previously imported >Mar 17 19:01:02 spectre setroubleshoot[19192]: load_plugins() plugins.catchall previously imported >Mar 17 19:01:02 spectre setroubleshoot[19192]: load_plugins() plugins.sandbox_connect previously imported >Mar 17 19:01:02 spectre setroubleshoot[19192]: load_plugins() plugins.httpd_write_content previously imported >Mar 17 19:01:02 spectre setroubleshoot[19192]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 17 19:01:02 spectre setroubleshoot[19192]: load_plugins() plugins.wine previously imported >Mar 17 19:01:02 spectre setroubleshoot[19192]: load_plugins() plugins.catchall_labels previously imported >Mar 17 19:01:02 spectre setroubleshoot[19192]: load_plugins() plugins.samba_share previously imported >Mar 17 19:01:02 spectre setroubleshoot[19192]: load_plugins() plugins.sys_module previously imported >Mar 17 19:01:02 spectre setroubleshoot[19192]: load_plugins() plugins.qemu_blk_image previously imported >Mar 17 19:01:02 spectre setroubleshoot[19192]: load_plugins() plugins.allow_execmod previously imported >Mar 17 19:01:02 spectre setroubleshoot[19192]: load_plugins() plugins.file previously imported >Mar 17 19:01:02 spectre setroubleshoot[19192]: load_plugins() plugins.sys_resource previously imported >Mar 17 19:01:02 spectre setroubleshoot[19192]: load_plugins() plugins.mmap_zero previously imported >Mar 17 19:01:02 spectre setroubleshoot[19192]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 17 19:01:02 spectre setroubleshoot[19192]: load_plugins() plugins.openvpn previously imported >Mar 17 19:01:02 spectre setroubleshoot[19192]: load_plugins() plugins.mozplugger previously imported >Mar 17 19:01:02 spectre setroubleshoot[19192]: load_plugins() plugins.setenforce previously imported >Mar 17 19:01:02 spectre setroubleshoot[19192]: load_plugins() plugins.disable_ipv6 previously imported >Mar 17 19:01:02 spectre setroubleshoot[19192]: load_plugins() plugins.dac_override previously imported >Mar 17 19:01:02 spectre setroubleshoot[19192]: load_plugins() plugins.public_content previously imported >Mar 17 19:01:02 spectre setroubleshoot[19192]: load_plugins() plugins.allow_anon_write previously imported >Mar 17 19:01:02 spectre setroubleshoot[19192]: load_plugins() plugins.selinuxpolicy previously imported >Mar 17 19:01:02 spectre setroubleshoot[19192]: load_plugins() plugins.associate previously imported >Mar 17 19:01:02 spectre setroubleshoot[19192]: load_plugins() plugins.xen_image previously imported >Mar 17 19:01:02 spectre setroubleshoot[19192]: load_plugins() plugins.chrome previously imported >Mar 17 19:01:02 spectre setroubleshoot[19192]: load_plugins() plugins.leaks previously imported >Mar 17 19:01:02 spectre setroubleshoot[19192]: load_plugins() plugins.sshd_root previously imported >Mar 17 19:01:02 spectre setroubleshoot[19192]: load_plugins() plugins.qemu_file_image previously imported >Mar 17 19:01:02 spectre setroubleshoot[19192]: load_plugins() plugins.mounton previously imported >Mar 17 19:01:02 spectre setroubleshoot[19192]: load_plugins() plugins.allow_execstack previously imported >Mar 17 19:01:02 spectre setroubleshoot[19192]: load_plugins() plugins.filesystem_associate previously imported >Mar 17 19:01:02 spectre setroubleshoot[19192]: load_plugins() plugins.restorecon previously imported >Mar 17 19:01:02 spectre setroubleshoot[19192]: load_plugins() plugins.swapfile previously imported >Mar 17 19:01:02 spectre setroubleshoot[19192]: load_plugins() plugins.connect_ports previously imported >Mar 17 19:01:02 spectre setroubleshoot[19192]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 17 19:01:02 spectre setroubleshoot[19192]: load_plugins() plugins.vbetool previously imported >Mar 17 19:01:02 spectre setroubleshoot[19192]: load_plugins() plugins.device previously imported >Mar 17 19:01:02 spectre python[19192]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 17 19:01:11 spectre setroubleshoot[19192]: received signal=14 >Mar 17 19:01:11 spectre setroubleshoot[19192]: KeyboardInterrupt in RunFaultServer >Mar 17 19:01:11 spectre setroubleshoot[19192]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 17 19:01:11 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 17 19:01:11 spectre dbus-daemon[637]: string index out of range >Mar 17 19:11:28 spectre systemd[1]: Starting dnf makecache... >Mar 17 19:11:28 spectre dnf[19268]: Config time: 0.006 >Mar 17 19:11:28 spectre dnf[19268]: cachedir: /var/cache/dnf/x86_64/21 >Mar 17 19:11:28 spectre dnf[19268]: dnf version: 0.4.17 >Mar 17 19:11:28 spectre dnf[19268]: Making cache files for all metadata files. >Mar 17 19:11:28 spectre dnf[19268]: rawhide: will expire after 18633 seconds. >Mar 17 19:11:28 spectre dnf[19268]: repo: using cache for: rawhide >Mar 17 19:11:28 spectre dnf[19268]: hawkey sack setup time: 0.127 >Mar 17 19:11:28 spectre dnf[19268]: Metadata cache created. >Mar 17 19:11:28 spectre systemd[1]: Started dnf makecache. >Mar 17 20:01:01 spectre systemd[1]: Starting user-0.slice. >Mar 17 20:01:01 spectre systemd[1]: Created slice user-0.slice. >Mar 17 20:01:01 spectre systemd[1]: Starting User Manager for UID 0... >Mar 17 20:01:01 spectre systemd[1]: Starting Session 8 of user root. >Mar 17 20:01:01 spectre systemd[1]: Started Session 8 of user root. >Mar 17 20:01:01 spectre systemd[19279]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 17 20:01:01 spectre systemd[19279]: Starting Paths. >Mar 17 20:01:01 spectre systemd[19279]: Reached target Paths. >Mar 17 20:01:01 spectre systemd[19279]: Starting Timers. >Mar 17 20:01:01 spectre systemd[19279]: Reached target Timers. >Mar 17 20:01:01 spectre systemd[19279]: Starting Sockets. >Mar 17 20:01:01 spectre systemd[19279]: Reached target Sockets. >Mar 17 20:01:01 spectre systemd[19279]: Starting Basic System. >Mar 17 20:01:01 spectre systemd[19279]: Reached target Basic System. >Mar 17 20:01:01 spectre systemd[19279]: Starting Default. >Mar 17 20:01:01 spectre systemd[19279]: Reached target Default. >Mar 17 20:01:01 spectre systemd[19279]: Startup finished in 14ms. >Mar 17 20:01:01 spectre systemd[1]: Started User Manager for UID 0. >Mar 17 20:01:01 spectre CROND[19292]: (root) CMD (run-parts /etc/cron.hourly) >Mar 17 20:01:01 spectre run-parts[19296]: (/etc/cron.hourly) starting 0anacron >Mar 17 20:01:01 spectre run-parts[19304]: (/etc/cron.hourly) finished 0anacron >Mar 17 20:01:01 spectre run-parts[19307]: (/etc/cron.hourly) starting mcelog.cron >Mar 17 20:01:01 spectre run-parts[19312]: (/etc/cron.hourly) finished mcelog.cron >Mar 17 20:01:01 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 17 20:01:01 spectre systemd[19279]: Stopping Default. >Mar 17 20:01:01 spectre systemd[19279]: Stopped target Default. >Mar 17 20:01:01 spectre systemd[19279]: Stopping Basic System. >Mar 17 20:01:01 spectre systemd[19279]: Stopped target Basic System. >Mar 17 20:01:01 spectre systemd[19279]: Stopping Paths. >Mar 17 20:01:01 spectre systemd[19279]: Stopped target Paths. >Mar 17 20:01:01 spectre systemd[19279]: Stopping Timers. >Mar 17 20:01:01 spectre systemd[19279]: Stopped target Timers. >Mar 17 20:01:01 spectre systemd[19279]: Stopping Sockets. >Mar 17 20:01:01 spectre systemd[19279]: Stopped target Sockets. >Mar 17 20:01:01 spectre systemd[19279]: Starting Shutdown. >Mar 17 20:01:01 spectre systemd[19279]: Reached target Shutdown. >Mar 17 20:01:01 spectre systemd[19279]: Starting Exit the Session... >Mar 17 20:01:01 spectre systemd[19279]: Received SIGRTMIN+24 from PID 19317 (kill). >Mar 17 20:01:01 spectre systemd[19287]: pam_unix(systemd-user:session): session closed for user root >Mar 17 20:01:01 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 17 20:01:01 spectre systemd[1]: Stopping user-0.slice. >Mar 17 20:01:01 spectre systemd[1]: Removed slice user-0.slice. >Mar 17 20:01:01 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 17 20:01:01 spectre systemd-logind[635]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 17 20:01:01 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 17 20:01:01 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 17 20:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 17 20:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 17 20:01:01 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 17 20:01:01 spectre setroubleshoot[19328]: RunFaultServer(10) >Mar 17 20:01:01 spectre setroubleshoot[19328]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 17 20:01:01 spectre setroubleshoot[19328]: database version 3.0 compatible with current 3.0 version >Mar 17 20:01:01 spectre setroubleshoot[19328]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 17 20:01:01 spectre setroubleshoot[19328]: Number of Plugins = 46 >Mar 17 20:01:01 spectre setroubleshoot[19328]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 17 20:01:01 spectre setroubleshoot[19328]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 17 20:01:01 spectre setroubleshoot[19328]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 17 20:01:01 spectre setroubleshoot[19328]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 17 20:01:01 spectre setroubleshoot[19328]: dbus avc(node=spectre type=AVC msg=audit(1395100861.438:511): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395100861.438:511): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528a840 a1=f0800 a2=0 a3=fffffffffffffbe8 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395100861.438:511): >) called: 1 Connections >Mar 17 20:01:01 spectre setroubleshoot[19328]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395100861.438:511): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 17 20:01:01 spectre setroubleshoot[19328]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395100861.438:511): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528a840 a1=f0800 a2=0 a3=fffffffffffffbe8 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 17 20:01:01 spectre setroubleshoot[19328]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395100861.438:511): >Mar 17 20:01:01 spectre setroubleshoot[19328]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 17 20:01:01 spectre setroubleshoot[19328]: dbus avc(node=spectre type=AVC msg=audit(1395100861.438:512): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395100861.438:512): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528a840 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395100861.438:512): >) called: 1 Connections >Mar 17 20:01:01 spectre setroubleshoot[19328]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395100861.438:512): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 17 20:01:01 spectre setroubleshoot[19328]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395100861.438:512): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528a840 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 17 20:01:01 spectre setroubleshoot[19328]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395100861.438:512): >Mar 17 20:01:01 spectre setroubleshoot[19328]: dbus avc(node=spectre type=AVC msg=audit(1395100861.438:513): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395100861.438:513): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528a840 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395100861.438:513): >) called: 1 Connections >Mar 17 20:01:01 spectre setroubleshoot[19328]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395100861.438:513): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 17 20:01:01 spectre setroubleshoot[19328]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395100861.438:513): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528a840 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 17 20:01:01 spectre setroubleshoot[19328]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395100861.438:513): >Mar 17 20:01:02 spectre setroubleshoot[19328]: Plugin Exception restorecon_source >Mar 17 20:01:02 spectre setroubleshoot[19328]: Plugin Exception restorecon >Mar 17 20:01:02 spectre setroubleshoot[19328]: lookup_signature: found 1 matches with scores 1.00 >Mar 17 20:01:02 spectre setroubleshoot[19328]: signature found in database >Mar 17 20:01:02 spectre setroubleshoot[19328]: sending alert to all clients >Mar 17 20:01:02 spectre setroubleshoot[19328]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.restorecon_source previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.rsync_data previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.kernel_modules previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.catchall_boolean previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.automount_exec_config previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.bind_ports previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.allow_execheap previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.cvs_data previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.mozplugger_remove previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.catchall previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.sandbox_connect previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.httpd_write_content previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.wine previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.catchall_labels previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.samba_share previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.sys_module previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.qemu_blk_image previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.allow_execmod previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.file previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.sys_resource previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.mmap_zero previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.openvpn previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.mozplugger previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.setenforce previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.disable_ipv6 previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.dac_override previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.public_content previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.allow_anon_write previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.selinuxpolicy previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.associate previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.xen_image previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.chrome previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.leaks previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.sshd_root previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.qemu_file_image previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.mounton previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.allow_execstack previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.filesystem_associate previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.restorecon previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.swapfile previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.connect_ports previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.vbetool previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.device previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 17 20:01:02 spectre python[19328]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 17 20:01:02 spectre setroubleshoot[19328]: lookup_signature: found 1 matches with scores 1.00 >Mar 17 20:01:02 spectre setroubleshoot[19328]: signature found in database >Mar 17 20:01:02 spectre setroubleshoot[19328]: sending alert to all clients >Mar 17 20:01:02 spectre setroubleshoot[19328]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.restorecon_source previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.rsync_data previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.kernel_modules previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.catchall_boolean previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.automount_exec_config previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.bind_ports previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.allow_execheap previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.cvs_data previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.mozplugger_remove previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.catchall previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.sandbox_connect previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.httpd_write_content previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.wine previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.catchall_labels previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.samba_share previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.sys_module previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.qemu_blk_image previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.allow_execmod previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.file previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.sys_resource previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.mmap_zero previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.openvpn previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.mozplugger previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.setenforce previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.disable_ipv6 previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.dac_override previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.public_content previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.allow_anon_write previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.selinuxpolicy previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.associate previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.xen_image previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.chrome previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.leaks previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.sshd_root previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.qemu_file_image previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.mounton previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.allow_execstack previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.filesystem_associate previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.restorecon previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.swapfile previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.connect_ports previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.vbetool previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.device previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 17 20:01:02 spectre python[19328]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 17 20:01:02 spectre setroubleshoot[19328]: lookup_signature: found 1 matches with scores 1.00 >Mar 17 20:01:02 spectre setroubleshoot[19328]: signature found in database >Mar 17 20:01:02 spectre setroubleshoot[19328]: sending alert to all clients >Mar 17 20:01:02 spectre setroubleshoot[19328]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.restorecon_source previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.rsync_data previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.kernel_modules previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.catchall_boolean previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.automount_exec_config previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.bind_ports previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.allow_execheap previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.cvs_data previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.mozplugger_remove previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.catchall previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.sandbox_connect previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.httpd_write_content previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.wine previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.catchall_labels previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.samba_share previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.sys_module previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.qemu_blk_image previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.allow_execmod previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.file previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.sys_resource previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.mmap_zero previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.openvpn previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.mozplugger previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.setenforce previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.disable_ipv6 previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.dac_override previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.public_content previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.allow_anon_write previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.selinuxpolicy previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.associate previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.xen_image previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.chrome previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.leaks previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.sshd_root previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.qemu_file_image previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.mounton previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.allow_execstack previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.filesystem_associate previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.restorecon previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.swapfile previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.connect_ports previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.vbetool previously imported >Mar 17 20:01:02 spectre setroubleshoot[19328]: load_plugins() plugins.device previously imported >Mar 17 20:01:02 spectre python[19328]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 17 20:01:12 spectre setroubleshoot[19328]: received signal=14 >Mar 17 20:01:12 spectre setroubleshoot[19328]: KeyboardInterrupt in RunFaultServer >Mar 17 20:01:12 spectre setroubleshoot[19328]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 17 20:01:12 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 17 20:01:12 spectre dbus-daemon[637]: string index out of range >Mar 17 20:11:29 spectre systemd[1]: Starting dnf makecache... >Mar 17 20:11:30 spectre dnf[19427]: Config time: 0.006 >Mar 17 20:11:30 spectre dnf[19427]: cachedir: /var/cache/dnf/x86_64/21 >Mar 17 20:11:30 spectre dnf[19427]: dnf version: 0.4.17 >Mar 17 20:11:30 spectre dnf[19427]: Making cache files for all metadata files. >Mar 17 20:11:30 spectre dnf[19427]: Metadata cache refreshed recently. >Mar 17 20:11:30 spectre systemd[1]: Started dnf makecache. >Mar 17 21:01:01 spectre systemd[1]: Starting user-0.slice. >Mar 17 21:01:01 spectre systemd[1]: Created slice user-0.slice. >Mar 17 21:01:01 spectre systemd[1]: Starting User Manager for UID 0... >Mar 17 21:01:01 spectre systemd[1]: Starting Session 9 of user root. >Mar 17 21:01:01 spectre systemd[1]: Started Session 9 of user root. >Mar 17 21:01:01 spectre systemd[19437]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 17 21:01:01 spectre systemd[19437]: Starting Paths. >Mar 17 21:01:01 spectre systemd[19437]: Reached target Paths. >Mar 17 21:01:01 spectre systemd[19437]: Starting Timers. >Mar 17 21:01:01 spectre systemd[19437]: Reached target Timers. >Mar 17 21:01:01 spectre systemd[19437]: Starting Sockets. >Mar 17 21:01:01 spectre systemd[19437]: Reached target Sockets. >Mar 17 21:01:01 spectre systemd[19437]: Starting Basic System. >Mar 17 21:01:01 spectre systemd[19437]: Reached target Basic System. >Mar 17 21:01:01 spectre systemd[19437]: Starting Default. >Mar 17 21:01:01 spectre systemd[19437]: Reached target Default. >Mar 17 21:01:01 spectre systemd[19437]: Startup finished in 10ms. >Mar 17 21:01:01 spectre systemd[1]: Started User Manager for UID 0. >Mar 17 21:01:01 spectre CROND[19450]: (root) CMD (run-parts /etc/cron.hourly) >Mar 17 21:01:01 spectre run-parts[19455]: (/etc/cron.hourly) starting 0anacron >Mar 17 21:01:01 spectre run-parts[19462]: (/etc/cron.hourly) finished 0anacron >Mar 17 21:01:01 spectre run-parts[19465]: (/etc/cron.hourly) starting mcelog.cron >Mar 17 21:01:01 spectre run-parts[19471]: (/etc/cron.hourly) finished mcelog.cron >Mar 17 21:01:01 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 17 21:01:01 spectre systemd[19437]: Stopping Default. >Mar 17 21:01:01 spectre systemd[19437]: Stopped target Default. >Mar 17 21:01:01 spectre systemd[19437]: Stopping Basic System. >Mar 17 21:01:01 spectre systemd[19437]: Stopped target Basic System. >Mar 17 21:01:01 spectre systemd[19437]: Stopping Paths. >Mar 17 21:01:01 spectre systemd[19437]: Stopped target Paths. >Mar 17 21:01:01 spectre systemd[19437]: Stopping Timers. >Mar 17 21:01:01 spectre systemd[19437]: Stopped target Timers. >Mar 17 21:01:01 spectre systemd[19437]: Stopping Sockets. >Mar 17 21:01:01 spectre systemd[19437]: Stopped target Sockets. >Mar 17 21:01:01 spectre systemd[19437]: Starting Shutdown. >Mar 17 21:01:01 spectre systemd[19437]: Reached target Shutdown. >Mar 17 21:01:01 spectre systemd[19437]: Starting Exit the Session... >Mar 17 21:01:01 spectre systemd[19437]: Received SIGRTMIN+24 from PID 19477 (kill). >Mar 17 21:01:01 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 17 21:01:01 spectre systemd[1]: Stopping user-0.slice. >Mar 17 21:01:01 spectre systemd[1]: Removed slice user-0.slice. >Mar 17 21:01:01 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 17 21:01:01 spectre systemd-logind[635]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 17 21:01:01 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 17 21:01:01 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 17 21:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 17 21:01:02 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 17 21:01:02 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 17 21:01:02 spectre setroubleshoot[19486]: RunFaultServer(10) >Mar 17 21:01:02 spectre setroubleshoot[19486]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 17 21:01:02 spectre setroubleshoot[19486]: database version 3.0 compatible with current 3.0 version >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 17 21:01:02 spectre setroubleshoot[19486]: Number of Plugins = 46 >Mar 17 21:01:02 spectre setroubleshoot[19486]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 17 21:01:02 spectre setroubleshoot[19486]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 17 21:01:02 spectre setroubleshoot[19486]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 17 21:01:02 spectre setroubleshoot[19486]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 17 21:01:02 spectre setroubleshoot[19486]: dbus avc(node=spectre type=AVC msg=audit(1395104461.629:527): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395104461.629:527): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528b510 a1=f0800 a2=0 a3=7fa912e81680 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395104461.629:527): >) called: 1 Connections >Mar 17 21:01:02 spectre setroubleshoot[19486]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395104461.629:527): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 17 21:01:02 spectre setroubleshoot[19486]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395104461.629:527): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528b510 a1=f0800 a2=0 a3=7fa912e81680 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 17 21:01:02 spectre setroubleshoot[19486]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395104461.629:527): >Mar 17 21:01:02 spectre setroubleshoot[19486]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 17 21:01:02 spectre setroubleshoot[19486]: dbus avc(node=spectre type=AVC msg=audit(1395104461.630:528): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395104461.630:528): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528b510 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395104461.630:528): >) called: 1 Connections >Mar 17 21:01:02 spectre setroubleshoot[19486]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395104461.630:528): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 17 21:01:02 spectre setroubleshoot[19486]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395104461.630:528): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528b510 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 17 21:01:02 spectre setroubleshoot[19486]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395104461.630:528): >Mar 17 21:01:02 spectre setroubleshoot[19486]: dbus avc(node=spectre type=AVC msg=audit(1395104461.630:529): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395104461.630:529): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528b510 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395104461.630:529): >) called: 1 Connections >Mar 17 21:01:02 spectre setroubleshoot[19486]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395104461.630:529): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 17 21:01:02 spectre setroubleshoot[19486]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395104461.630:529): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528b510 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 17 21:01:02 spectre setroubleshoot[19486]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395104461.630:529): >Mar 17 21:01:02 spectre setroubleshoot[19486]: Plugin Exception restorecon_source >Mar 17 21:01:02 spectre setroubleshoot[19486]: Plugin Exception restorecon >Mar 17 21:01:02 spectre setroubleshoot[19486]: lookup_signature: found 1 matches with scores 1.00 >Mar 17 21:01:02 spectre setroubleshoot[19486]: signature found in database >Mar 17 21:01:02 spectre setroubleshoot[19486]: sending alert to all clients >Mar 17 21:01:02 spectre setroubleshoot[19486]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.restorecon_source previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.rsync_data previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.kernel_modules previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.catchall_boolean previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.automount_exec_config previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.bind_ports previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.allow_execheap previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.cvs_data previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.mozplugger_remove previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.catchall previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.sandbox_connect previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.httpd_write_content previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.wine previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.catchall_labels previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.samba_share previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.sys_module previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.qemu_blk_image previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.allow_execmod previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.file previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.sys_resource previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.mmap_zero previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.openvpn previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.mozplugger previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.setenforce previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.disable_ipv6 previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.dac_override previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.public_content previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.allow_anon_write previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.selinuxpolicy previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.associate previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.xen_image previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.chrome previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.leaks previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.sshd_root previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.qemu_file_image previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.mounton previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.allow_execstack previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.filesystem_associate previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.restorecon previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.swapfile previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.connect_ports previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.vbetool previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.device previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 17 21:01:02 spectre python[19486]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 17 21:01:02 spectre setroubleshoot[19486]: lookup_signature: found 1 matches with scores 1.00 >Mar 17 21:01:02 spectre setroubleshoot[19486]: signature found in database >Mar 17 21:01:02 spectre setroubleshoot[19486]: sending alert to all clients >Mar 17 21:01:02 spectre setroubleshoot[19486]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.restorecon_source previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.rsync_data previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.kernel_modules previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.catchall_boolean previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.automount_exec_config previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.bind_ports previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.allow_execheap previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.cvs_data previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.mozplugger_remove previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.catchall previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.sandbox_connect previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.httpd_write_content previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.wine previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.catchall_labels previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.samba_share previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.sys_module previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.qemu_blk_image previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.allow_execmod previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.file previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.sys_resource previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.mmap_zero previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.openvpn previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.mozplugger previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.setenforce previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.disable_ipv6 previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.dac_override previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.public_content previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.allow_anon_write previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.selinuxpolicy previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.associate previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.xen_image previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.chrome previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.leaks previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.sshd_root previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.qemu_file_image previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.mounton previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.allow_execstack previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.filesystem_associate previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.restorecon previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.swapfile previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.connect_ports previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.vbetool previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.device previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 17 21:01:02 spectre python[19486]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 17 21:01:02 spectre setroubleshoot[19486]: lookup_signature: found 1 matches with scores 1.00 >Mar 17 21:01:02 spectre setroubleshoot[19486]: signature found in database >Mar 17 21:01:02 spectre setroubleshoot[19486]: sending alert to all clients >Mar 17 21:01:02 spectre setroubleshoot[19486]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.restorecon_source previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.rsync_data previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.kernel_modules previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.catchall_boolean previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.automount_exec_config previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.bind_ports previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.allow_execheap previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.cvs_data previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.mozplugger_remove previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.catchall previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.sandbox_connect previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.httpd_write_content previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.wine previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.catchall_labels previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.samba_share previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.sys_module previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.qemu_blk_image previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.allow_execmod previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.file previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.sys_resource previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.mmap_zero previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.openvpn previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.mozplugger previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.setenforce previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.disable_ipv6 previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.dac_override previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.public_content previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.allow_anon_write previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.selinuxpolicy previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.associate previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.xen_image previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.chrome previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.leaks previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.sshd_root previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.qemu_file_image previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.mounton previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.allow_execstack previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.filesystem_associate previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.restorecon previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.swapfile previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.connect_ports previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.vbetool previously imported >Mar 17 21:01:02 spectre setroubleshoot[19486]: load_plugins() plugins.device previously imported >Mar 17 21:01:02 spectre python[19486]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 17 21:01:12 spectre setroubleshoot[19486]: received signal=14 >Mar 17 21:01:12 spectre setroubleshoot[19486]: KeyboardInterrupt in RunFaultServer >Mar 17 21:01:12 spectre setroubleshoot[19486]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 17 21:01:12 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 17 21:01:12 spectre dbus-daemon[637]: string index out of range >Mar 17 21:11:30 spectre systemd[1]: Starting dnf makecache... >Mar 17 21:11:30 spectre dnf[19562]: Config time: 0.006 >Mar 17 21:11:30 spectre dnf[19562]: cachedir: /var/cache/dnf/x86_64/21 >Mar 17 21:11:30 spectre dnf[19562]: dnf version: 0.4.17 >Mar 17 21:11:30 spectre dnf[19562]: Making cache files for all metadata files. >Mar 17 21:11:30 spectre dnf[19562]: Metadata cache refreshed recently. >Mar 17 21:11:30 spectre systemd[1]: Started dnf makecache. >Mar 17 22:01:01 spectre systemd[1]: Starting user-0.slice. >Mar 17 22:01:01 spectre systemd[1]: Created slice user-0.slice. >Mar 17 22:01:01 spectre systemd[1]: Starting User Manager for UID 0... >Mar 17 22:01:01 spectre systemd[1]: Starting Session 10 of user root. >Mar 17 22:01:01 spectre systemd[1]: Started Session 10 of user root. >Mar 17 22:01:01 spectre systemd[19572]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 17 22:01:01 spectre systemd[19572]: Starting Paths. >Mar 17 22:01:01 spectre systemd[19572]: Reached target Paths. >Mar 17 22:01:01 spectre systemd[19572]: Starting Timers. >Mar 17 22:01:01 spectre systemd[19572]: Reached target Timers. >Mar 17 22:01:01 spectre systemd[19572]: Starting Sockets. >Mar 17 22:01:01 spectre systemd[19572]: Reached target Sockets. >Mar 17 22:01:01 spectre systemd[19572]: Starting Basic System. >Mar 17 22:01:01 spectre systemd[19572]: Reached target Basic System. >Mar 17 22:01:01 spectre systemd[19572]: Starting Default. >Mar 17 22:01:01 spectre systemd[19572]: Reached target Default. >Mar 17 22:01:01 spectre systemd[19572]: Startup finished in 10ms. >Mar 17 22:01:01 spectre systemd[1]: Started User Manager for UID 0. >Mar 17 22:01:01 spectre CROND[19585]: (root) CMD (run-parts /etc/cron.hourly) >Mar 17 22:01:01 spectre run-parts[19590]: (/etc/cron.hourly) starting 0anacron >Mar 17 22:01:01 spectre run-parts[19597]: (/etc/cron.hourly) finished 0anacron >Mar 17 22:01:01 spectre run-parts[19600]: (/etc/cron.hourly) starting mcelog.cron >Mar 17 22:01:01 spectre run-parts[19604]: (/etc/cron.hourly) finished mcelog.cron >Mar 17 22:01:01 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 17 22:01:01 spectre systemd[19572]: Stopping Default. >Mar 17 22:01:01 spectre systemd[19572]: Stopped target Default. >Mar 17 22:01:01 spectre systemd[19572]: Stopping Basic System. >Mar 17 22:01:01 spectre systemd[19572]: Stopped target Basic System. >Mar 17 22:01:01 spectre systemd[19572]: Stopping Paths. >Mar 17 22:01:01 spectre systemd[19572]: Stopped target Paths. >Mar 17 22:01:01 spectre systemd[19572]: Stopping Timers. >Mar 17 22:01:01 spectre systemd[19572]: Stopped target Timers. >Mar 17 22:01:01 spectre systemd[19572]: Stopping Sockets. >Mar 17 22:01:01 spectre systemd[19572]: Stopped target Sockets. >Mar 17 22:01:01 spectre systemd[19572]: Starting Shutdown. >Mar 17 22:01:01 spectre systemd[19572]: Reached target Shutdown. >Mar 17 22:01:01 spectre systemd[19572]: Starting Exit the Session... >Mar 17 22:01:01 spectre systemd[19572]: Received SIGRTMIN+24 from PID 19611 (kill). >Mar 17 22:01:01 spectre systemd[19581]: pam_unix(systemd-user:session): session closed for user root >Mar 17 22:01:01 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 17 22:01:01 spectre systemd[1]: Stopping user-0.slice. >Mar 17 22:01:01 spectre systemd[1]: Removed slice user-0.slice. >Mar 17 22:01:01 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 17 22:01:01 spectre systemd-logind[635]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 17 22:01:01 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 17 22:01:01 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 17 22:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 17 22:01:02 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 17 22:01:02 spectre setroubleshoot[19621]: RunFaultServer(10) >Mar 17 22:01:02 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 17 22:01:02 spectre setroubleshoot[19621]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 17 22:01:02 spectre setroubleshoot[19621]: database version 3.0 compatible with current 3.0 version >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 17 22:01:02 spectre setroubleshoot[19621]: Number of Plugins = 46 >Mar 17 22:01:02 spectre setroubleshoot[19621]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 17 22:01:02 spectre setroubleshoot[19621]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 17 22:01:02 spectre setroubleshoot[19621]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 17 22:01:02 spectre setroubleshoot[19621]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 17 22:01:02 spectre setroubleshoot[19621]: dbus avc(node=spectre type=AVC msg=audit(1395108061.800:544): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395108061.800:544): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528b4f0 a1=f0800 a2=0 a3=7fa912e81680 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395108061.800:544): >) called: 1 Connections >Mar 17 22:01:02 spectre setroubleshoot[19621]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395108061.800:544): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 17 22:01:02 spectre setroubleshoot[19621]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395108061.800:544): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528b4f0 a1=f0800 a2=0 a3=7fa912e81680 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 17 22:01:02 spectre setroubleshoot[19621]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395108061.800:544): >Mar 17 22:01:02 spectre setroubleshoot[19621]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 17 22:01:02 spectre setroubleshoot[19621]: dbus avc(node=spectre type=AVC msg=audit(1395108061.801:545): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395108061.801:545): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528b4f0 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395108061.801:545): >) called: 1 Connections >Mar 17 22:01:02 spectre setroubleshoot[19621]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395108061.801:545): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 17 22:01:02 spectre setroubleshoot[19621]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395108061.801:545): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528b4f0 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 17 22:01:02 spectre setroubleshoot[19621]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395108061.801:545): >Mar 17 22:01:02 spectre setroubleshoot[19621]: dbus avc(node=spectre type=AVC msg=audit(1395108061.801:546): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395108061.801:546): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528b4f0 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395108061.801:546): >) called: 1 Connections >Mar 17 22:01:02 spectre setroubleshoot[19621]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395108061.801:546): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 17 22:01:02 spectre setroubleshoot[19621]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395108061.801:546): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528b4f0 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 17 22:01:02 spectre setroubleshoot[19621]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395108061.801:546): >Mar 17 22:01:02 spectre setroubleshoot[19621]: Plugin Exception restorecon_source >Mar 17 22:01:02 spectre setroubleshoot[19621]: Plugin Exception restorecon >Mar 17 22:01:02 spectre setroubleshoot[19621]: lookup_signature: found 1 matches with scores 1.00 >Mar 17 22:01:02 spectre setroubleshoot[19621]: signature found in database >Mar 17 22:01:02 spectre setroubleshoot[19621]: sending alert to all clients >Mar 17 22:01:02 spectre setroubleshoot[19621]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.restorecon_source previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.rsync_data previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.kernel_modules previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.catchall_boolean previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.automount_exec_config previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.bind_ports previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.allow_execheap previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.cvs_data previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.mozplugger_remove previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.catchall previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.sandbox_connect previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.httpd_write_content previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.wine previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.catchall_labels previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.samba_share previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.sys_module previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.qemu_blk_image previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.allow_execmod previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.file previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.sys_resource previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.mmap_zero previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.openvpn previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.mozplugger previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.setenforce previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.disable_ipv6 previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.dac_override previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.public_content previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.allow_anon_write previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.selinuxpolicy previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.associate previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.xen_image previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.chrome previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.leaks previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.sshd_root previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.qemu_file_image previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.mounton previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.allow_execstack previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.filesystem_associate previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.restorecon previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.swapfile previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.connect_ports previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.vbetool previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.device previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 17 22:01:02 spectre python[19621]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 17 22:01:02 spectre setroubleshoot[19621]: lookup_signature: found 1 matches with scores 1.00 >Mar 17 22:01:02 spectre setroubleshoot[19621]: signature found in database >Mar 17 22:01:02 spectre setroubleshoot[19621]: sending alert to all clients >Mar 17 22:01:02 spectre setroubleshoot[19621]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.restorecon_source previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.rsync_data previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.kernel_modules previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.catchall_boolean previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.automount_exec_config previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.bind_ports previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.allow_execheap previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.cvs_data previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.mozplugger_remove previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.catchall previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.sandbox_connect previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.httpd_write_content previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.wine previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.catchall_labels previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.samba_share previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.sys_module previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.qemu_blk_image previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.allow_execmod previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.file previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.sys_resource previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.mmap_zero previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.openvpn previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.mozplugger previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.setenforce previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.disable_ipv6 previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.dac_override previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.public_content previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.allow_anon_write previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.selinuxpolicy previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.associate previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.xen_image previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.chrome previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.leaks previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.sshd_root previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.qemu_file_image previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.mounton previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.allow_execstack previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.filesystem_associate previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.restorecon previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.swapfile previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.connect_ports previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.vbetool previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.device previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 17 22:01:02 spectre python[19621]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 17 22:01:02 spectre setroubleshoot[19621]: lookup_signature: found 1 matches with scores 1.00 >Mar 17 22:01:02 spectre setroubleshoot[19621]: signature found in database >Mar 17 22:01:02 spectre setroubleshoot[19621]: sending alert to all clients >Mar 17 22:01:02 spectre setroubleshoot[19621]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.restorecon_source previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.rsync_data previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.kernel_modules previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.catchall_boolean previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.automount_exec_config previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.bind_ports previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.allow_execheap previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.cvs_data previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.mozplugger_remove previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.catchall previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.sandbox_connect previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.httpd_write_content previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.wine previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.catchall_labels previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.samba_share previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.sys_module previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.qemu_blk_image previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.allow_execmod previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.file previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.sys_resource previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.mmap_zero previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.openvpn previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.mozplugger previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.setenforce previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.disable_ipv6 previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.dac_override previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.public_content previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.allow_anon_write previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.selinuxpolicy previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.associate previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.xen_image previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.chrome previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.leaks previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.sshd_root previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.qemu_file_image previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.mounton previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.allow_execstack previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.filesystem_associate previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.restorecon previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.swapfile previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.connect_ports previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.vbetool previously imported >Mar 17 22:01:02 spectre setroubleshoot[19621]: load_plugins() plugins.device previously imported >Mar 17 22:01:02 spectre python[19621]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 17 22:01:12 spectre setroubleshoot[19621]: received signal=14 >Mar 17 22:01:12 spectre setroubleshoot[19621]: KeyboardInterrupt in RunFaultServer >Mar 17 22:01:12 spectre setroubleshoot[19621]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 17 22:01:12 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 17 22:01:12 spectre dbus-daemon[637]: string index out of range >Mar 17 22:11:30 spectre systemd[1]: Starting dnf makecache... >Mar 17 22:11:31 spectre dnf[19718]: Config time: 0.005 >Mar 17 22:11:31 spectre dnf[19718]: cachedir: /var/cache/dnf/x86_64/21 >Mar 17 22:11:31 spectre dnf[19718]: dnf version: 0.4.17 >Mar 17 22:11:31 spectre dnf[19718]: Making cache files for all metadata files. >Mar 17 22:11:31 spectre dnf[19718]: rawhide: metadata will expire after 7830 seconds and will be refreshed now >Mar 17 22:11:31 spectre dnf[19718]: reviving: failed for 'rawhide', mismatched sha256 sum. >Mar 17 22:11:31 spectre dnf[19718]: repo: downloading from remote: rawhide >Mar 17 22:11:42 spectre dnf[19718]: hawkey sack setup time: 11.113 >Mar 17 22:11:42 spectre dnf[19718]: Metadata cache created. >Mar 17 22:11:42 spectre systemd[1]: Started dnf makecache. >Mar 17 23:01:01 spectre systemd[1]: Starting user-0.slice. >Mar 17 23:01:01 spectre systemd[1]: Created slice user-0.slice. >Mar 17 23:01:01 spectre systemd[1]: Starting User Manager for UID 0... >Mar 17 23:01:01 spectre systemd[1]: Starting Session 11 of user root. >Mar 17 23:01:01 spectre systemd[1]: Started Session 11 of user root. >Mar 17 23:01:01 spectre systemd[19731]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 17 23:01:01 spectre systemd[19731]: Starting Paths. >Mar 17 23:01:01 spectre systemd[19731]: Reached target Paths. >Mar 17 23:01:01 spectre systemd[19731]: Starting Timers. >Mar 17 23:01:01 spectre systemd[19731]: Reached target Timers. >Mar 17 23:01:01 spectre systemd[19731]: Starting Sockets. >Mar 17 23:01:01 spectre systemd[19731]: Reached target Sockets. >Mar 17 23:01:01 spectre systemd[19731]: Starting Basic System. >Mar 17 23:01:01 spectre systemd[19731]: Reached target Basic System. >Mar 17 23:01:01 spectre systemd[19731]: Starting Default. >Mar 17 23:01:01 spectre systemd[19731]: Reached target Default. >Mar 17 23:01:01 spectre systemd[19731]: Startup finished in 10ms. >Mar 17 23:01:01 spectre systemd[1]: Started User Manager for UID 0. >Mar 17 23:01:01 spectre CROND[19745]: (root) CMD (run-parts /etc/cron.hourly) >Mar 17 23:01:01 spectre run-parts[19749]: (/etc/cron.hourly) starting 0anacron >Mar 17 23:01:01 spectre run-parts[19757]: (/etc/cron.hourly) finished 0anacron >Mar 17 23:01:01 spectre run-parts[19760]: (/etc/cron.hourly) starting mcelog.cron >Mar 17 23:01:01 spectre run-parts[19765]: (/etc/cron.hourly) finished mcelog.cron >Mar 17 23:01:01 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 17 23:01:01 spectre systemd[19731]: Stopping Default. >Mar 17 23:01:01 spectre systemd[19731]: Stopped target Default. >Mar 17 23:01:01 spectre systemd[19731]: Stopping Basic System. >Mar 17 23:01:01 spectre systemd[19731]: Stopped target Basic System. >Mar 17 23:01:01 spectre systemd[19731]: Stopping Paths. >Mar 17 23:01:01 spectre systemd[19731]: Stopped target Paths. >Mar 17 23:01:01 spectre systemd[19731]: Stopping Timers. >Mar 17 23:01:01 spectre systemd[19731]: Stopped target Timers. >Mar 17 23:01:01 spectre systemd[19731]: Stopping Sockets. >Mar 17 23:01:01 spectre systemd[19731]: Stopped target Sockets. >Mar 17 23:01:01 spectre systemd[19731]: Starting Shutdown. >Mar 17 23:01:01 spectre systemd[19731]: Reached target Shutdown. >Mar 17 23:01:01 spectre systemd[19731]: Starting Exit the Session... >Mar 17 23:01:01 spectre systemd[19731]: Received SIGRTMIN+24 from PID 19770 (kill). >Mar 17 23:01:01 spectre systemd[19740]: pam_unix(systemd-user:session): session closed for user root >Mar 17 23:01:01 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 17 23:01:01 spectre systemd[1]: Stopping user-0.slice. >Mar 17 23:01:01 spectre systemd[1]: Removed slice user-0.slice. >Mar 17 23:01:01 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 17 23:01:01 spectre systemd-logind[635]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 17 23:01:01 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 17 23:01:01 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 17 23:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 17 23:01:02 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 17 23:01:02 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 17 23:01:02 spectre setroubleshoot[19781]: RunFaultServer(10) >Mar 17 23:01:02 spectre setroubleshoot[19781]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 17 23:01:02 spectre setroubleshoot[19781]: database version 3.0 compatible with current 3.0 version >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 17 23:01:02 spectre setroubleshoot[19781]: Number of Plugins = 46 >Mar 17 23:01:02 spectre setroubleshoot[19781]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 17 23:01:02 spectre setroubleshoot[19781]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 17 23:01:02 spectre setroubleshoot[19781]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 17 23:01:02 spectre setroubleshoot[19781]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 17 23:01:02 spectre setroubleshoot[19781]: dbus avc(node=spectre type=AVC msg=audit(1395111661.963:561): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395111661.963:561): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528b4f0 a1=f0800 a2=0 a3=fffffffffffffbe8 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395111661.963:561): >) called: 1 Connections >Mar 17 23:01:02 spectre setroubleshoot[19781]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395111661.963:561): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 17 23:01:02 spectre setroubleshoot[19781]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395111661.963:561): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528b4f0 a1=f0800 a2=0 a3=fffffffffffffbe8 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 17 23:01:02 spectre setroubleshoot[19781]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395111661.963:561): >Mar 17 23:01:02 spectre setroubleshoot[19781]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 17 23:01:02 spectre setroubleshoot[19781]: dbus avc(node=spectre type=AVC msg=audit(1395111661.963:562): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395111661.963:562): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528b4f0 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395111661.963:562): >) called: 1 Connections >Mar 17 23:01:02 spectre setroubleshoot[19781]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395111661.963:562): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 17 23:01:02 spectre setroubleshoot[19781]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395111661.963:562): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528b4f0 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 17 23:01:02 spectre setroubleshoot[19781]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395111661.963:562): >Mar 17 23:01:02 spectre setroubleshoot[19781]: dbus avc(node=spectre type=AVC msg=audit(1395111661.963:563): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395111661.963:563): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528b4f0 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395111661.963:563): >) called: 1 Connections >Mar 17 23:01:02 spectre setroubleshoot[19781]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395111661.963:563): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 17 23:01:02 spectre setroubleshoot[19781]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395111661.963:563): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528b4f0 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 17 23:01:02 spectre setroubleshoot[19781]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395111661.963:563): >Mar 17 23:01:02 spectre setroubleshoot[19781]: Plugin Exception restorecon_source >Mar 17 23:01:02 spectre setroubleshoot[19781]: Plugin Exception restorecon >Mar 17 23:01:02 spectre setroubleshoot[19781]: lookup_signature: found 1 matches with scores 1.00 >Mar 17 23:01:02 spectre setroubleshoot[19781]: signature found in database >Mar 17 23:01:02 spectre setroubleshoot[19781]: sending alert to all clients >Mar 17 23:01:02 spectre setroubleshoot[19781]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.restorecon_source previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.rsync_data previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.kernel_modules previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.catchall_boolean previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.automount_exec_config previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.bind_ports previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.allow_execheap previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.cvs_data previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.mozplugger_remove previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.catchall previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.sandbox_connect previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.httpd_write_content previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.wine previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.catchall_labels previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.samba_share previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.sys_module previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.qemu_blk_image previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.allow_execmod previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.file previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.sys_resource previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.mmap_zero previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.openvpn previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.mozplugger previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.setenforce previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.disable_ipv6 previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.dac_override previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.public_content previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.allow_anon_write previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.selinuxpolicy previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.associate previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.xen_image previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.chrome previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.leaks previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.sshd_root previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.qemu_file_image previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.mounton previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.allow_execstack previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.filesystem_associate previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.restorecon previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.swapfile previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.connect_ports previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.vbetool previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.device previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 17 23:01:02 spectre python[19781]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 17 23:01:02 spectre setroubleshoot[19781]: lookup_signature: found 1 matches with scores 1.00 >Mar 17 23:01:02 spectre setroubleshoot[19781]: signature found in database >Mar 17 23:01:02 spectre setroubleshoot[19781]: sending alert to all clients >Mar 17 23:01:02 spectre setroubleshoot[19781]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.restorecon_source previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.rsync_data previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.kernel_modules previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.catchall_boolean previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.automount_exec_config previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.bind_ports previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.allow_execheap previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.cvs_data previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.mozplugger_remove previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.catchall previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.sandbox_connect previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.httpd_write_content previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.wine previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.catchall_labels previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.samba_share previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.sys_module previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.qemu_blk_image previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.allow_execmod previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.file previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.sys_resource previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.mmap_zero previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.openvpn previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.mozplugger previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.setenforce previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.disable_ipv6 previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.dac_override previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.public_content previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.allow_anon_write previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.selinuxpolicy previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.associate previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.xen_image previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.chrome previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.leaks previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.sshd_root previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.qemu_file_image previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.mounton previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.allow_execstack previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.filesystem_associate previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.restorecon previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.swapfile previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.connect_ports previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.vbetool previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.device previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 17 23:01:02 spectre python[19781]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 17 23:01:02 spectre setroubleshoot[19781]: lookup_signature: found 1 matches with scores 1.00 >Mar 17 23:01:02 spectre setroubleshoot[19781]: signature found in database >Mar 17 23:01:02 spectre setroubleshoot[19781]: sending alert to all clients >Mar 17 23:01:02 spectre setroubleshoot[19781]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.restorecon_source previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.rsync_data previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.kernel_modules previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.catchall_boolean previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.automount_exec_config previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.bind_ports previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.allow_execheap previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.cvs_data previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.mozplugger_remove previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.catchall previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.sandbox_connect previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.httpd_write_content previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.wine previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.catchall_labels previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.samba_share previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.sys_module previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.qemu_blk_image previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.allow_execmod previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.file previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.sys_resource previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.mmap_zero previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.openvpn previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.mozplugger previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.setenforce previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.disable_ipv6 previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.dac_override previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.public_content previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.allow_anon_write previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.selinuxpolicy previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.associate previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.xen_image previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.chrome previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.leaks previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.sshd_root previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.qemu_file_image previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.mounton previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.allow_execstack previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.filesystem_associate previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.restorecon previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.swapfile previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.connect_ports previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.vbetool previously imported >Mar 17 23:01:02 spectre setroubleshoot[19781]: load_plugins() plugins.device previously imported >Mar 17 23:01:02 spectre python[19781]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 17 23:01:12 spectre setroubleshoot[19781]: received signal=14 >Mar 17 23:01:12 spectre setroubleshoot[19781]: KeyboardInterrupt in RunFaultServer >Mar 17 23:01:12 spectre setroubleshoot[19781]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 17 23:01:12 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 17 23:01:12 spectre dbus-daemon[637]: string index out of range >Mar 17 23:11:49 spectre systemd[1]: Starting dnf makecache... >Mar 17 23:11:49 spectre dnf[19832]: Config time: 0.006 >Mar 17 23:11:49 spectre dnf[19832]: cachedir: /var/cache/dnf/x86_64/21 >Mar 17 23:11:49 spectre dnf[19832]: dnf version: 0.4.17 >Mar 17 23:11:49 spectre dnf[19832]: Making cache files for all metadata files. >Mar 17 23:11:49 spectre dnf[19832]: Metadata cache refreshed recently. >Mar 17 23:11:49 spectre systemd[1]: Started dnf makecache. >Mar 18 00:01:01 spectre systemd[1]: Starting user-0.slice. >Mar 18 00:01:01 spectre systemd[1]: Created slice user-0.slice. >Mar 18 00:01:01 spectre systemd[1]: Starting User Manager for UID 0... >Mar 18 00:01:01 spectre systemd[1]: Starting Session 12 of user root. >Mar 18 00:01:01 spectre systemd[1]: Started Session 12 of user root. >Mar 18 00:01:02 spectre systemd[19839]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 18 00:01:02 spectre systemd[19839]: Starting Paths. >Mar 18 00:01:02 spectre systemd[19839]: Reached target Paths. >Mar 18 00:01:02 spectre systemd[19839]: Starting Timers. >Mar 18 00:01:02 spectre systemd[19839]: Reached target Timers. >Mar 18 00:01:02 spectre systemd[19839]: Starting Sockets. >Mar 18 00:01:02 spectre systemd[19839]: Reached target Sockets. >Mar 18 00:01:02 spectre systemd[19839]: Starting Basic System. >Mar 18 00:01:02 spectre systemd[19839]: Reached target Basic System. >Mar 18 00:01:02 spectre systemd[19839]: Starting Default. >Mar 18 00:01:02 spectre systemd[19839]: Reached target Default. >Mar 18 00:01:02 spectre systemd[19839]: Startup finished in 13ms. >Mar 18 00:01:02 spectre systemd[1]: Started User Manager for UID 0. >Mar 18 00:01:02 spectre CROND[19852]: (root) CMD (run-parts /etc/cron.hourly) >Mar 18 00:01:02 spectre run-parts[19857]: (/etc/cron.hourly) starting 0anacron >Mar 18 00:01:02 spectre anacron[19867]: Anacron started on 2014-03-18 >Mar 18 00:01:02 spectre run-parts[19870]: (/etc/cron.hourly) finished 0anacron >Mar 18 00:01:02 spectre run-parts[19872]: (/etc/cron.hourly) starting mcelog.cron >Mar 18 00:01:02 spectre anacron[19867]: Normal exit (0 jobs run) >Mar 18 00:01:02 spectre run-parts[19878]: (/etc/cron.hourly) finished mcelog.cron >Mar 18 00:01:02 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 18 00:01:02 spectre systemd[19839]: Stopping Default. >Mar 18 00:01:02 spectre systemd[19839]: Stopped target Default. >Mar 18 00:01:02 spectre systemd[19839]: Stopping Basic System. >Mar 18 00:01:02 spectre systemd[19839]: Stopped target Basic System. >Mar 18 00:01:02 spectre systemd[19839]: Stopping Paths. >Mar 18 00:01:02 spectre systemd[19839]: Stopped target Paths. >Mar 18 00:01:02 spectre systemd[19839]: Stopping Timers. >Mar 18 00:01:02 spectre systemd[19839]: Stopped target Timers. >Mar 18 00:01:02 spectre systemd[19839]: Stopping Sockets. >Mar 18 00:01:02 spectre systemd[19839]: Stopped target Sockets. >Mar 18 00:01:02 spectre systemd[19839]: Starting Shutdown. >Mar 18 00:01:02 spectre systemd[19839]: Reached target Shutdown. >Mar 18 00:01:02 spectre systemd[19839]: Starting Exit the Session... >Mar 18 00:01:02 spectre systemd[19839]: Received SIGRTMIN+24 from PID 19885 (kill). >Mar 18 00:01:02 spectre systemd[19848]: pam_unix(systemd-user:session): session closed for user root >Mar 18 00:01:02 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 18 00:01:02 spectre systemd[1]: Stopping user-0.slice. >Mar 18 00:01:02 spectre systemd[1]: Removed slice user-0.slice. >Mar 18 00:01:02 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 18 00:01:02 spectre systemd-logind[635]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 18 00:01:02 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 18 00:01:02 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 18 00:01:02 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 18 00:01:02 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 18 00:01:02 spectre setroubleshoot[19893]: RunFaultServer(10) >Mar 18 00:01:02 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 18 00:01:02 spectre setroubleshoot[19893]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 18 00:01:02 spectre setroubleshoot[19893]: database version 3.0 compatible with current 3.0 version >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 00:01:02 spectre setroubleshoot[19893]: Number of Plugins = 46 >Mar 18 00:01:02 spectre setroubleshoot[19893]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 18 00:01:02 spectre setroubleshoot[19893]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 18 00:01:02 spectre setroubleshoot[19893]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 18 00:01:02 spectre setroubleshoot[19893]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 18 00:01:02 spectre setroubleshoot[19893]: dbus avc(node=spectre type=AVC msg=audit(1395115262.168:577): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395115262.168:577): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528a820 a1=f0800 a2=0 a3=fffffffffffff7f8 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395115262.168:577): >) called: 1 Connections >Mar 18 00:01:02 spectre setroubleshoot[19893]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395115262.168:577): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 18 00:01:02 spectre setroubleshoot[19893]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395115262.168:577): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528a820 a1=f0800 a2=0 a3=fffffffffffff7f8 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 00:01:02 spectre setroubleshoot[19893]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395115262.168:577): >Mar 18 00:01:02 spectre setroubleshoot[19893]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 18 00:01:02 spectre setroubleshoot[19893]: dbus avc(node=spectre type=AVC msg=audit(1395115262.168:578): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395115262.168:578): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528a820 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395115262.168:578): >) called: 1 Connections >Mar 18 00:01:02 spectre setroubleshoot[19893]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395115262.168:578): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 18 00:01:02 spectre setroubleshoot[19893]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395115262.168:578): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528a820 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 00:01:02 spectre setroubleshoot[19893]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395115262.168:578): >Mar 18 00:01:02 spectre setroubleshoot[19893]: dbus avc(node=spectre type=AVC msg=audit(1395115262.168:579): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395115262.168:579): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528a820 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395115262.168:579): >) called: 1 Connections >Mar 18 00:01:02 spectre setroubleshoot[19893]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395115262.168:579): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 18 00:01:02 spectre setroubleshoot[19893]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395115262.168:579): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528a820 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 00:01:02 spectre setroubleshoot[19893]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395115262.168:579): >Mar 18 00:01:02 spectre setroubleshoot[19893]: Plugin Exception restorecon_source >Mar 18 00:01:02 spectre setroubleshoot[19893]: Plugin Exception restorecon >Mar 18 00:01:02 spectre setroubleshoot[19893]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 00:01:02 spectre setroubleshoot[19893]: signature found in database >Mar 18 00:01:02 spectre setroubleshoot[19893]: sending alert to all clients >Mar 18 00:01:02 spectre setroubleshoot[19893]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.restorecon_source previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.rsync_data previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.kernel_modules previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.bind_ports previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.allow_execheap previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.cvs_data previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.catchall previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.wine previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.catchall_labels previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.samba_share previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.sys_module previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.allow_execmod previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.file previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.sys_resource previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.mmap_zero previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.openvpn previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.mozplugger previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.setenforce previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.dac_override previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.public_content previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.associate previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.xen_image previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.chrome previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.leaks previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.sshd_root previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.mounton previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.allow_execstack previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.restorecon previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.swapfile previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.connect_ports previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.vbetool previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.device previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 18 00:01:02 spectre python[19893]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 00:01:02 spectre setroubleshoot[19893]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 00:01:02 spectre setroubleshoot[19893]: signature found in database >Mar 18 00:01:02 spectre setroubleshoot[19893]: sending alert to all clients >Mar 18 00:01:02 spectre setroubleshoot[19893]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.restorecon_source previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.rsync_data previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.kernel_modules previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.bind_ports previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.allow_execheap previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.cvs_data previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.catchall previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.wine previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.catchall_labels previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.samba_share previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.sys_module previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.allow_execmod previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.file previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.sys_resource previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.mmap_zero previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.openvpn previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.mozplugger previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.setenforce previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.dac_override previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.public_content previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.associate previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.xen_image previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.chrome previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.leaks previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.sshd_root previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.mounton previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.allow_execstack previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.restorecon previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.swapfile previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.connect_ports previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.vbetool previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.device previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 18 00:01:02 spectre python[19893]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 00:01:02 spectre setroubleshoot[19893]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 00:01:02 spectre setroubleshoot[19893]: signature found in database >Mar 18 00:01:02 spectre setroubleshoot[19893]: sending alert to all clients >Mar 18 00:01:02 spectre setroubleshoot[19893]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.restorecon_source previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.rsync_data previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.kernel_modules previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.bind_ports previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.allow_execheap previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.cvs_data previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.catchall previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.wine previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.catchall_labels previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.samba_share previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.sys_module previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.allow_execmod previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.file previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.sys_resource previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.mmap_zero previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.openvpn previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.mozplugger previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.setenforce previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.dac_override previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.public_content previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.associate previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.xen_image previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.chrome previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.leaks previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.sshd_root previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.mounton previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.allow_execstack previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.restorecon previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.swapfile previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.connect_ports previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.vbetool previously imported >Mar 18 00:01:02 spectre setroubleshoot[19893]: load_plugins() plugins.device previously imported >Mar 18 00:01:02 spectre python[19893]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 00:01:12 spectre setroubleshoot[19893]: received signal=14 >Mar 18 00:01:12 spectre setroubleshoot[19893]: KeyboardInterrupt in RunFaultServer >Mar 18 00:01:12 spectre setroubleshoot[19893]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 18 00:01:12 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 18 00:01:12 spectre dbus-daemon[637]: string index out of range >Mar 18 00:11:59 spectre systemd[1]: Starting dnf makecache... >Mar 18 00:11:59 spectre dnf[19988]: Config time: 0.006 >Mar 18 00:11:59 spectre dnf[19988]: cachedir: /var/cache/dnf/x86_64/21 >Mar 18 00:11:59 spectre dnf[19988]: dnf version: 0.4.17 >Mar 18 00:11:59 spectre dnf[19988]: Making cache files for all metadata files. >Mar 18 00:11:59 spectre dnf[19988]: Metadata cache refreshed recently. >Mar 18 00:11:59 spectre systemd[1]: Started dnf makecache. >Mar 18 01:01:01 spectre systemd[1]: Starting user-0.slice. >Mar 18 01:01:01 spectre systemd[1]: Created slice user-0.slice. >Mar 18 01:01:01 spectre systemd[1]: Starting User Manager for UID 0... >Mar 18 01:01:01 spectre systemd[1]: Starting Session 13 of user root. >Mar 18 01:01:01 spectre systemd[1]: Started Session 13 of user root. >Mar 18 01:01:01 spectre systemd[19998]: Starting Paths. >Mar 18 01:01:01 spectre systemd[19998]: Reached target Paths. >Mar 18 01:01:01 spectre systemd[19998]: Starting Timers. >Mar 18 01:01:01 spectre systemd[19998]: Reached target Timers. >Mar 18 01:01:01 spectre systemd[19998]: Starting Sockets. >Mar 18 01:01:01 spectre systemd[19998]: Reached target Sockets. >Mar 18 01:01:01 spectre systemd[19998]: Starting Basic System. >Mar 18 01:01:01 spectre systemd[19998]: Reached target Basic System. >Mar 18 01:01:01 spectre systemd[19998]: Starting Default. >Mar 18 01:01:01 spectre systemd[19998]: Reached target Default. >Mar 18 01:01:01 spectre systemd[19998]: Startup finished in 26ms. >Mar 18 01:01:01 spectre systemd[1]: Started User Manager for UID 0. >Mar 18 01:01:01 spectre systemd[19998]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 18 01:01:01 spectre CROND[20013]: (root) CMD (run-parts /etc/cron.hourly) >Mar 18 01:01:01 spectre run-parts[20018]: (/etc/cron.hourly) starting 0anacron >Mar 18 01:01:01 spectre anacron[20027]: Anacron started on 2014-03-18 >Mar 18 01:01:01 spectre anacron[20027]: Normal exit (0 jobs run) >Mar 18 01:01:01 spectre run-parts[20030]: (/etc/cron.hourly) finished 0anacron >Mar 18 01:01:01 spectre run-parts[20032]: (/etc/cron.hourly) starting mcelog.cron >Mar 18 01:01:01 spectre run-parts[20037]: (/etc/cron.hourly) finished mcelog.cron >Mar 18 01:01:01 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 18 01:01:01 spectre systemd[19998]: Stopping Default. >Mar 18 01:01:01 spectre systemd[19998]: Stopped target Default. >Mar 18 01:01:01 spectre systemd[19998]: Stopping Basic System. >Mar 18 01:01:01 spectre systemd[19998]: Stopped target Basic System. >Mar 18 01:01:01 spectre systemd[19998]: Stopping Paths. >Mar 18 01:01:01 spectre systemd[19998]: Stopped target Paths. >Mar 18 01:01:01 spectre systemd[19998]: Stopping Timers. >Mar 18 01:01:01 spectre systemd[19998]: Stopped target Timers. >Mar 18 01:01:01 spectre systemd[19998]: Stopping Sockets. >Mar 18 01:01:01 spectre systemd[19998]: Stopped target Sockets. >Mar 18 01:01:01 spectre systemd[19998]: Starting Shutdown. >Mar 18 01:01:01 spectre systemd[19998]: Reached target Shutdown. >Mar 18 01:01:01 spectre systemd[19998]: Starting Exit the Session... >Mar 18 01:01:01 spectre systemd[19998]: Received SIGRTMIN+24 from PID 20044 (kill). >Mar 18 01:01:01 spectre systemd[20006]: pam_unix(systemd-user:session): session closed for user root >Mar 18 01:01:01 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 18 01:01:01 spectre systemd[1]: Stopping user-0.slice. >Mar 18 01:01:01 spectre systemd[1]: Removed slice user-0.slice. >Mar 18 01:01:01 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 18 01:01:01 spectre systemd-logind[635]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 18 01:01:01 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 18 01:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 18 01:01:01 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 18 01:01:01 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 18 01:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 18 01:01:01 spectre setroubleshoot[20052]: RunFaultServer(10) >Mar 18 01:01:01 spectre setroubleshoot[20052]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 18 01:01:01 spectre setroubleshoot[20052]: database version 3.0 compatible with current 3.0 version >Mar 18 01:01:01 spectre setroubleshoot[20052]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 01:01:01 spectre setroubleshoot[20052]: Number of Plugins = 46 >Mar 18 01:01:01 spectre setroubleshoot[20052]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 18 01:01:01 spectre setroubleshoot[20052]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 18 01:01:01 spectre setroubleshoot[20052]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 18 01:01:01 spectre setroubleshoot[20052]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 18 01:01:01 spectre setroubleshoot[20052]: dbus avc(node=spectre type=AVC msg=audit(1395118861.349:593): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395118861.349:593): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528b4f0 a1=f0800 a2=0 a3=fffffffffffffbe8 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395118861.349:593): >) called: 1 Connections >Mar 18 01:01:01 spectre setroubleshoot[20052]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395118861.349:593): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 18 01:01:01 spectre setroubleshoot[20052]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395118861.349:593): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528b4f0 a1=f0800 a2=0 a3=fffffffffffffbe8 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 01:01:01 spectre setroubleshoot[20052]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395118861.349:593): >Mar 18 01:01:01 spectre setroubleshoot[20052]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 18 01:01:01 spectre setroubleshoot[20052]: dbus avc(node=spectre type=AVC msg=audit(1395118861.349:594): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395118861.349:594): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528b4f0 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395118861.349:594): >) called: 1 Connections >Mar 18 01:01:01 spectre setroubleshoot[20052]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395118861.349:594): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 18 01:01:01 spectre setroubleshoot[20052]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395118861.349:594): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528b4f0 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 01:01:01 spectre setroubleshoot[20052]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395118861.349:594): >Mar 18 01:01:01 spectre setroubleshoot[20052]: dbus avc(node=spectre type=AVC msg=audit(1395118861.350:595): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395118861.350:595): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528b4f0 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395118861.350:595): >) called: 1 Connections >Mar 18 01:01:01 spectre setroubleshoot[20052]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395118861.350:595): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 18 01:01:01 spectre setroubleshoot[20052]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395118861.350:595): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528b4f0 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 01:01:01 spectre setroubleshoot[20052]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395118861.350:595): >Mar 18 01:01:01 spectre setroubleshoot[20052]: Plugin Exception restorecon_source >Mar 18 01:01:01 spectre setroubleshoot[20052]: Plugin Exception restorecon >Mar 18 01:01:01 spectre setroubleshoot[20052]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 01:01:01 spectre setroubleshoot[20052]: signature found in database >Mar 18 01:01:01 spectre setroubleshoot[20052]: sending alert to all clients >Mar 18 01:01:01 spectre setroubleshoot[20052]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 18 01:01:01 spectre setroubleshoot[20052]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 01:01:01 spectre setroubleshoot[20052]: load_plugins() plugins.restorecon_source previously imported >Mar 18 01:01:01 spectre setroubleshoot[20052]: load_plugins() plugins.rsync_data previously imported >Mar 18 01:01:01 spectre setroubleshoot[20052]: load_plugins() plugins.kernel_modules previously imported >Mar 18 01:01:01 spectre setroubleshoot[20052]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 01:01:01 spectre setroubleshoot[20052]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 01:01:01 spectre setroubleshoot[20052]: load_plugins() plugins.bind_ports previously imported >Mar 18 01:01:01 spectre setroubleshoot[20052]: load_plugins() plugins.allow_execheap previously imported >Mar 18 01:01:01 spectre setroubleshoot[20052]: load_plugins() plugins.cvs_data previously imported >Mar 18 01:01:01 spectre setroubleshoot[20052]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 01:01:01 spectre setroubleshoot[20052]: load_plugins() plugins.catchall previously imported >Mar 18 01:01:01 spectre setroubleshoot[20052]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 01:01:01 spectre setroubleshoot[20052]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 01:01:01 spectre setroubleshoot[20052]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 01:01:01 spectre setroubleshoot[20052]: load_plugins() plugins.wine previously imported >Mar 18 01:01:01 spectre setroubleshoot[20052]: load_plugins() plugins.catchall_labels previously imported >Mar 18 01:01:01 spectre setroubleshoot[20052]: load_plugins() plugins.samba_share previously imported >Mar 18 01:01:01 spectre setroubleshoot[20052]: load_plugins() plugins.sys_module previously imported >Mar 18 01:01:01 spectre setroubleshoot[20052]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 01:01:01 spectre setroubleshoot[20052]: load_plugins() plugins.allow_execmod previously imported >Mar 18 01:01:01 spectre setroubleshoot[20052]: load_plugins() plugins.file previously imported >Mar 18 01:01:01 spectre setroubleshoot[20052]: load_plugins() plugins.sys_resource previously imported >Mar 18 01:01:01 spectre setroubleshoot[20052]: load_plugins() plugins.mmap_zero previously imported >Mar 18 01:01:01 spectre setroubleshoot[20052]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 01:01:01 spectre setroubleshoot[20052]: load_plugins() plugins.openvpn previously imported >Mar 18 01:01:01 spectre setroubleshoot[20052]: load_plugins() plugins.mozplugger previously imported >Mar 18 01:01:01 spectre setroubleshoot[20052]: load_plugins() plugins.setenforce previously imported >Mar 18 01:01:01 spectre setroubleshoot[20052]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 01:01:01 spectre setroubleshoot[20052]: load_plugins() plugins.dac_override previously imported >Mar 18 01:01:01 spectre setroubleshoot[20052]: load_plugins() plugins.public_content previously imported >Mar 18 01:01:01 spectre setroubleshoot[20052]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 01:01:01 spectre setroubleshoot[20052]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 01:01:01 spectre setroubleshoot[20052]: load_plugins() plugins.associate previously imported >Mar 18 01:01:01 spectre setroubleshoot[20052]: load_plugins() plugins.xen_image previously imported >Mar 18 01:01:01 spectre setroubleshoot[20052]: load_plugins() plugins.chrome previously imported >Mar 18 01:01:01 spectre setroubleshoot[20052]: load_plugins() plugins.leaks previously imported >Mar 18 01:01:01 spectre setroubleshoot[20052]: load_plugins() plugins.sshd_root previously imported >Mar 18 01:01:01 spectre setroubleshoot[20052]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 01:01:01 spectre setroubleshoot[20052]: load_plugins() plugins.mounton previously imported >Mar 18 01:01:01 spectre setroubleshoot[20052]: load_plugins() plugins.allow_execstack previously imported >Mar 18 01:01:01 spectre setroubleshoot[20052]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 01:01:01 spectre setroubleshoot[20052]: load_plugins() plugins.restorecon previously imported >Mar 18 01:01:01 spectre setroubleshoot[20052]: load_plugins() plugins.swapfile previously imported >Mar 18 01:01:01 spectre setroubleshoot[20052]: load_plugins() plugins.connect_ports previously imported >Mar 18 01:01:01 spectre setroubleshoot[20052]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 01:01:01 spectre setroubleshoot[20052]: load_plugins() plugins.vbetool previously imported >Mar 18 01:01:01 spectre setroubleshoot[20052]: load_plugins() plugins.device previously imported >Mar 18 01:01:01 spectre python[20052]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 01:01:01 spectre setroubleshoot[20052]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 18 01:01:02 spectre setroubleshoot[20052]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 01:01:02 spectre setroubleshoot[20052]: signature found in database >Mar 18 01:01:02 spectre setroubleshoot[20052]: sending alert to all clients >Mar 18 01:01:02 spectre setroubleshoot[20052]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.restorecon_source previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.rsync_data previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.kernel_modules previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.bind_ports previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.allow_execheap previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.cvs_data previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.catchall previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.wine previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.catchall_labels previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.samba_share previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.sys_module previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.allow_execmod previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.file previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.sys_resource previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.mmap_zero previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.openvpn previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.mozplugger previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.setenforce previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.dac_override previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.public_content previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.associate previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.xen_image previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.chrome previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.leaks previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.sshd_root previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.mounton previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.allow_execstack previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.restorecon previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.swapfile previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.connect_ports previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.vbetool previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.device previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 18 01:01:02 spectre python[20052]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 01:01:02 spectre setroubleshoot[20052]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 01:01:02 spectre setroubleshoot[20052]: signature found in database >Mar 18 01:01:02 spectre setroubleshoot[20052]: sending alert to all clients >Mar 18 01:01:02 spectre setroubleshoot[20052]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.restorecon_source previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.rsync_data previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.kernel_modules previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.bind_ports previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.allow_execheap previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.cvs_data previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.catchall previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.wine previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.catchall_labels previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.samba_share previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.sys_module previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.allow_execmod previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.file previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.sys_resource previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.mmap_zero previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.openvpn previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.mozplugger previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.setenforce previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.dac_override previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.public_content previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.associate previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.xen_image previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.chrome previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.leaks previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.sshd_root previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.mounton previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.allow_execstack previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.restorecon previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.swapfile previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.connect_ports previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.vbetool previously imported >Mar 18 01:01:02 spectre setroubleshoot[20052]: load_plugins() plugins.device previously imported >Mar 18 01:01:02 spectre python[20052]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 01:01:11 spectre setroubleshoot[20052]: received signal=14 >Mar 18 01:01:11 spectre setroubleshoot[20052]: KeyboardInterrupt in RunFaultServer >Mar 18 01:01:11 spectre setroubleshoot[20052]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 18 01:01:11 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 18 01:01:11 spectre dbus-daemon[637]: string index out of range >Mar 18 01:12:05 spectre systemd[1]: Starting dnf makecache... >Mar 18 01:12:05 spectre dnf[20126]: Config time: 0.005 >Mar 18 01:12:05 spectre dnf[20126]: cachedir: /var/cache/dnf/x86_64/21 >Mar 18 01:12:05 spectre dnf[20126]: dnf version: 0.4.17 >Mar 18 01:12:05 spectre dnf[20126]: Making cache files for all metadata files. >Mar 18 01:12:05 spectre dnf[20126]: rawhide: will expire after 32370 seconds. >Mar 18 01:12:05 spectre dnf[20126]: repo: using cache for: rawhide >Mar 18 01:12:05 spectre dnf[20126]: hawkey sack setup time: 0.123 >Mar 18 01:12:05 spectre dnf[20126]: Metadata cache created. >Mar 18 01:12:05 spectre systemd[1]: Started dnf makecache. >Mar 18 02:01:01 spectre systemd[1]: Starting user-0.slice. >Mar 18 02:01:01 spectre systemd[1]: Created slice user-0.slice. >Mar 18 02:01:01 spectre systemd[1]: Starting User Manager for UID 0... >Mar 18 02:01:01 spectre systemd[1]: Starting Session 14 of user root. >Mar 18 02:01:01 spectre systemd[1]: Started Session 14 of user root. >Mar 18 02:01:01 spectre systemd[20135]: Starting Paths. >Mar 18 02:01:01 spectre systemd[20135]: Reached target Paths. >Mar 18 02:01:01 spectre systemd[20135]: Starting Timers. >Mar 18 02:01:01 spectre systemd[20135]: Reached target Timers. >Mar 18 02:01:01 spectre systemd[20135]: Starting Sockets. >Mar 18 02:01:01 spectre systemd[20135]: Reached target Sockets. >Mar 18 02:01:01 spectre systemd[20135]: Starting Basic System. >Mar 18 02:01:01 spectre systemd[20135]: Reached target Basic System. >Mar 18 02:01:01 spectre systemd[20135]: Starting Default. >Mar 18 02:01:01 spectre systemd[20135]: Reached target Default. >Mar 18 02:01:01 spectre systemd[20135]: Startup finished in 39ms. >Mar 18 02:01:01 spectre systemd[1]: Started User Manager for UID 0. >Mar 18 02:01:01 spectre systemd[20135]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 18 02:01:01 spectre CROND[20153]: (root) CMD (run-parts /etc/cron.hourly) >Mar 18 02:01:01 spectre run-parts[20158]: (/etc/cron.hourly) starting 0anacron >Mar 18 02:01:01 spectre anacron[20167]: Anacron started on 2014-03-18 >Mar 18 02:01:01 spectre anacron[20167]: Normal exit (0 jobs run) >Mar 18 02:01:01 spectre run-parts[20169]: (/etc/cron.hourly) finished 0anacron >Mar 18 02:01:01 spectre run-parts[20172]: (/etc/cron.hourly) starting mcelog.cron >Mar 18 02:01:01 spectre run-parts[20177]: (/etc/cron.hourly) finished mcelog.cron >Mar 18 02:01:01 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 18 02:01:01 spectre systemd[20135]: Stopping Default. >Mar 18 02:01:01 spectre systemd[20135]: Stopped target Default. >Mar 18 02:01:01 spectre systemd[20135]: Stopping Basic System. >Mar 18 02:01:01 spectre systemd[20135]: Stopped target Basic System. >Mar 18 02:01:01 spectre systemd[20135]: Stopping Paths. >Mar 18 02:01:01 spectre systemd[20135]: Stopped target Paths. >Mar 18 02:01:01 spectre systemd[20135]: Stopping Timers. >Mar 18 02:01:01 spectre systemd[20135]: Stopped target Timers. >Mar 18 02:01:01 spectre systemd[20135]: Stopping Sockets. >Mar 18 02:01:01 spectre systemd[20135]: Stopped target Sockets. >Mar 18 02:01:01 spectre systemd[20135]: Starting Shutdown. >Mar 18 02:01:01 spectre systemd[20135]: Reached target Shutdown. >Mar 18 02:01:01 spectre systemd[20135]: Starting Exit the Session... >Mar 18 02:01:01 spectre systemd[20135]: Received SIGRTMIN+24 from PID 20182 (kill). >Mar 18 02:01:01 spectre systemd[20144]: pam_unix(systemd-user:session): session closed for user root >Mar 18 02:01:01 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 18 02:01:01 spectre systemd[1]: Stopping user-0.slice. >Mar 18 02:01:01 spectre systemd[1]: Removed slice user-0.slice. >Mar 18 02:01:01 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 18 02:01:01 spectre systemd-logind[635]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 18 02:01:01 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 18 02:01:01 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 18 02:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 18 02:01:01 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 18 02:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 18 02:01:01 spectre setroubleshoot[20192]: RunFaultServer(10) >Mar 18 02:01:02 spectre setroubleshoot[20192]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 18 02:01:02 spectre setroubleshoot[20192]: database version 3.0 compatible with current 3.0 version >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 02:01:02 spectre setroubleshoot[20192]: Number of Plugins = 46 >Mar 18 02:01:02 spectre setroubleshoot[20192]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 18 02:01:02 spectre setroubleshoot[20192]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 18 02:01:02 spectre setroubleshoot[20192]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 18 02:01:02 spectre setroubleshoot[20192]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 18 02:01:02 spectre setroubleshoot[20192]: dbus avc(node=spectre type=AVC msg=audit(1395122461.550:610): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395122461.550:610): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528a820 a1=f0800 a2=0 a3=fffffffffffffbe8 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395122461.550:610): >) called: 1 Connections >Mar 18 02:01:02 spectre setroubleshoot[20192]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395122461.550:610): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 18 02:01:02 spectre setroubleshoot[20192]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395122461.550:610): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528a820 a1=f0800 a2=0 a3=fffffffffffffbe8 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 02:01:02 spectre setroubleshoot[20192]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395122461.550:610): >Mar 18 02:01:02 spectre setroubleshoot[20192]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 18 02:01:02 spectre setroubleshoot[20192]: dbus avc(node=spectre type=AVC msg=audit(1395122461.550:611): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395122461.550:611): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528a820 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395122461.550:611): >) called: 1 Connections >Mar 18 02:01:02 spectre setroubleshoot[20192]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395122461.550:611): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 18 02:01:02 spectre setroubleshoot[20192]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395122461.550:611): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528a820 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 02:01:02 spectre setroubleshoot[20192]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395122461.550:611): >Mar 18 02:01:02 spectre setroubleshoot[20192]: dbus avc(node=spectre type=AVC msg=audit(1395122461.550:612): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395122461.550:612): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528a820 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395122461.550:612): >) called: 1 Connections >Mar 18 02:01:02 spectre setroubleshoot[20192]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395122461.550:612): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 18 02:01:02 spectre setroubleshoot[20192]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395122461.550:612): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528a820 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 02:01:02 spectre setroubleshoot[20192]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395122461.550:612): >Mar 18 02:01:02 spectre setroubleshoot[20192]: Plugin Exception restorecon_source >Mar 18 02:01:02 spectre setroubleshoot[20192]: Plugin Exception restorecon >Mar 18 02:01:02 spectre setroubleshoot[20192]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 02:01:02 spectre setroubleshoot[20192]: signature found in database >Mar 18 02:01:02 spectre setroubleshoot[20192]: sending alert to all clients >Mar 18 02:01:02 spectre setroubleshoot[20192]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.restorecon_source previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.rsync_data previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.kernel_modules previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.bind_ports previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.allow_execheap previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.cvs_data previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.catchall previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.wine previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.catchall_labels previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.samba_share previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.sys_module previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.allow_execmod previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.file previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.sys_resource previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.mmap_zero previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.openvpn previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.mozplugger previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.setenforce previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.dac_override previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.public_content previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.associate previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.xen_image previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.chrome previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.leaks previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.sshd_root previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.mounton previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.allow_execstack previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.restorecon previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.swapfile previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.connect_ports previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.vbetool previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.device previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 18 02:01:02 spectre python[20192]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 02:01:02 spectre setroubleshoot[20192]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 02:01:02 spectre setroubleshoot[20192]: signature found in database >Mar 18 02:01:02 spectre setroubleshoot[20192]: sending alert to all clients >Mar 18 02:01:02 spectre setroubleshoot[20192]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.restorecon_source previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.rsync_data previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.kernel_modules previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.bind_ports previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.allow_execheap previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.cvs_data previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.catchall previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.wine previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.catchall_labels previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.samba_share previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.sys_module previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.allow_execmod previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.file previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.sys_resource previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.mmap_zero previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.openvpn previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.mozplugger previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.setenforce previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.dac_override previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.public_content previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.associate previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.xen_image previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.chrome previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.leaks previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.sshd_root previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.mounton previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.allow_execstack previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.restorecon previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.swapfile previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.connect_ports previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.vbetool previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.device previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 18 02:01:02 spectre python[20192]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 02:01:02 spectre setroubleshoot[20192]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 02:01:02 spectre setroubleshoot[20192]: signature found in database >Mar 18 02:01:02 spectre setroubleshoot[20192]: sending alert to all clients >Mar 18 02:01:02 spectre setroubleshoot[20192]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.restorecon_source previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.rsync_data previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.kernel_modules previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.bind_ports previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.allow_execheap previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.cvs_data previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.catchall previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.wine previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.catchall_labels previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.samba_share previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.sys_module previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.allow_execmod previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.file previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.sys_resource previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.mmap_zero previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.openvpn previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.mozplugger previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.setenforce previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.dac_override previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.public_content previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.associate previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.xen_image previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.chrome previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.leaks previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.sshd_root previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.mounton previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.allow_execstack previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.restorecon previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.swapfile previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.connect_ports previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.vbetool previously imported >Mar 18 02:01:02 spectre setroubleshoot[20192]: load_plugins() plugins.device previously imported >Mar 18 02:01:02 spectre python[20192]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 02:01:12 spectre setroubleshoot[20192]: received signal=14 >Mar 18 02:01:12 spectre setroubleshoot[20192]: KeyboardInterrupt in RunFaultServer >Mar 18 02:01:12 spectre setroubleshoot[20192]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 18 02:01:12 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 18 02:01:12 spectre dbus-daemon[637]: string index out of range >Mar 18 02:12:06 spectre systemd[1]: Starting dnf makecache... >Mar 18 02:12:07 spectre dnf[20286]: Config time: 0.006 >Mar 18 02:12:07 spectre dnf[20286]: cachedir: /var/cache/dnf/x86_64/21 >Mar 18 02:12:07 spectre dnf[20286]: dnf version: 0.4.17 >Mar 18 02:12:07 spectre dnf[20286]: Making cache files for all metadata files. >Mar 18 02:12:07 spectre dnf[20286]: Metadata cache refreshed recently. >Mar 18 02:12:07 spectre systemd[1]: Started dnf makecache. >Mar 18 03:01:01 spectre systemd[1]: Starting user-0.slice. >Mar 18 03:01:01 spectre systemd[1]: Created slice user-0.slice. >Mar 18 03:01:01 spectre systemd[1]: Starting User Manager for UID 0... >Mar 18 03:01:01 spectre systemd[1]: Starting Session 15 of user root. >Mar 18 03:01:01 spectre systemd[1]: Started Session 15 of user root. >Mar 18 03:01:01 spectre systemd[20293]: Starting Paths. >Mar 18 03:01:01 spectre systemd[20293]: Reached target Paths. >Mar 18 03:01:01 spectre systemd[20293]: Starting Timers. >Mar 18 03:01:01 spectre systemd[20293]: Reached target Timers. >Mar 18 03:01:01 spectre systemd[20293]: Starting Sockets. >Mar 18 03:01:01 spectre systemd[20293]: Reached target Sockets. >Mar 18 03:01:01 spectre systemd[20293]: Starting Basic System. >Mar 18 03:01:01 spectre systemd[20293]: Reached target Basic System. >Mar 18 03:01:01 spectre systemd[20293]: Starting Default. >Mar 18 03:01:01 spectre systemd[20293]: Reached target Default. >Mar 18 03:01:01 spectre systemd[20293]: Startup finished in 26ms. >Mar 18 03:01:01 spectre systemd[1]: Started User Manager for UID 0. >Mar 18 03:01:01 spectre systemd[20293]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 18 03:01:01 spectre CROND[20308]: (root) CMD (run-parts /etc/cron.hourly) >Mar 18 03:01:01 spectre run-parts[20313]: (/etc/cron.hourly) starting 0anacron >Mar 18 03:01:01 spectre anacron[20322]: Anacron started on 2014-03-18 >Mar 18 03:01:01 spectre anacron[20322]: Will run job `cron.daily' in 26 min. >Mar 18 03:01:01 spectre anacron[20322]: Jobs will be executed sequentially >Mar 18 03:01:01 spectre run-parts[20325]: (/etc/cron.hourly) finished 0anacron >Mar 18 03:01:01 spectre run-parts[20327]: (/etc/cron.hourly) starting mcelog.cron >Mar 18 03:01:01 spectre run-parts[20332]: (/etc/cron.hourly) finished mcelog.cron >Mar 18 03:12:08 spectre systemd[1]: Starting dnf makecache... >Mar 18 03:12:08 spectre dnf[20437]: Config time: 0.006 >Mar 18 03:12:08 spectre dnf[20437]: cachedir: /var/cache/dnf/x86_64/21 >Mar 18 03:12:08 spectre dnf[20437]: dnf version: 0.4.17 >Mar 18 03:12:08 spectre dnf[20437]: Making cache files for all metadata files. >Mar 18 03:12:08 spectre dnf[20437]: Metadata cache refreshed recently. >Mar 18 03:12:08 spectre systemd[1]: Started dnf makecache. >Mar 18 03:27:01 spectre anacron[20322]: Job `cron.daily' started >Mar 18 03:27:01 spectre run-parts[20445]: (/etc/cron.daily) starting logrotate >Mar 18 03:27:01 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 18 03:27:01 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 18 03:27:01 spectre run-parts[20454]: (/etc/cron.daily) finished logrotate >Mar 18 03:27:01 spectre run-parts[20456]: (/etc/cron.daily) starting man-db.cron >Mar 18 03:27:02 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 18 03:27:02 spectre setroubleshoot[20450]: RunFaultServer(10) >Mar 18 03:27:02 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 18 03:27:02 spectre setroubleshoot[20450]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 18 03:27:02 spectre setroubleshoot[20450]: database version 3.0 compatible with current 3.0 version >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 03:27:02 spectre setroubleshoot[20450]: Number of Plugins = 46 >Mar 18 03:27:02 spectre setroubleshoot[20450]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 18 03:27:02 spectre setroubleshoot[20450]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 18 03:27:02 spectre setroubleshoot[20450]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 18 03:27:02 spectre setroubleshoot[20450]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 18 03:27:02 spectre setroubleshoot[20450]: dbus avc(node=spectre type=AVC msg=audit(1395127621.773:627): avc: denied { write } for pid=20448 comm="logrotate" path=2F72756E2F73797374656D642F73657373696F6E732F31352E726566202864656C6574656429 dev="tmpfs" ino=73570 scontext=system_u:system_r:logrotate_t:s0-s0:c0.c1023 tcontext=system_u:object_r:systemd_logind_sessions_t:s0 tclass=fifo_file >node=spectre type=SYSCALL msg=audit(1395127621.773:627): arch=c000003e syscall=59 success=yes exit=0 a0=90f5e0 a1=90e5e0 a2=90df80 a3=3f0b27f items=0 ppid=20446 pid=20448 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="logrotate" exe="/usr/sbin/logrotate" subj=system_u:system_r:logrotate_t:s0-s0:c0.c1023 key=(null) >node=spectre type=EOE msg=audit(1395127621.773:627): >) called: 1 Connections >Mar 18 03:27:02 spectre setroubleshoot[20450]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395127621.773:627): avc: denied { write } for pid=20448 comm="logrotate" path=2F72756E2F73797374656D642F73657373696F6E732F31352E726566202864656C6574656429 dev="tmpfs" ino=73570 scontext=system_u:system_r:logrotate_t:s0-s0:c0.c1023 tcontext=system_u:object_r:systemd_logind_sessions_t:s0 tclass=fifo_file >Mar 18 03:27:02 spectre setroubleshoot[20450]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395127621.773:627): arch=c000003e syscall=59 success=yes exit=0 a0=90f5e0 a1=90e5e0 a2=90df80 a3=3f0b27f items=0 ppid=20446 pid=20448 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="logrotate" exe="/usr/sbin/logrotate" subj=system_u:system_r:logrotate_t:s0-s0:c0.c1023 key=(null) >Mar 18 03:27:02 spectre setroubleshoot[20450]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395127621.773:627): >Mar 18 03:27:02 spectre setroubleshoot[20450]: analyze_avc() avc=scontext=system_u:system_r:logrotate_t:s0-s0:c0.c1023 tcontext=system_u:object_r:systemd_logind_sessions_t:s0 access=['write'] tclass=fifo_file tpath= >Mar 18 03:27:02 spectre setroubleshoot[20450]: dbus avc(node=spectre type=AVC msg=audit(1395127621.950:628): avc: denied { write } for pid=20457 comm="man-db.cron" path=2F72756E2F73797374656D642F73657373696F6E732F31352E726566202864656C6574656429 dev="tmpfs" ino=73570 scontext=system_u:system_r:mandb_t:s0-s0:c0.c1023 tcontext=system_u:object_r:systemd_logind_sessions_t:s0 tclass=fifo_file >node=spectre type=SYSCALL msg=audit(1395127621.950:628): arch=c000003e syscall=59 success=yes exit=0 a0=2678cc0 a1=26737f0 a2=2670f60 a3=3f0b27f items=0 ppid=20442 pid=20457 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="man-db.cron" exe="/usr/bin/bash" subj=system_u:system_r:mandb_t:s0-s0:c0.c1023 key=(null) >node=spectre type=EOE msg=audit(1395127621.950:628): >) called: 1 Connections >Mar 18 03:27:02 spectre setroubleshoot[20450]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395127621.950:628): avc: denied { write } for pid=20457 comm="man-db.cron" path=2F72756E2F73797374656D642F73657373696F6E732F31352E726566202864656C6574656429 dev="tmpfs" ino=73570 scontext=system_u:system_r:mandb_t:s0-s0:c0.c1023 tcontext=system_u:object_r:systemd_logind_sessions_t:s0 tclass=fifo_file >Mar 18 03:27:02 spectre setroubleshoot[20450]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395127621.950:628): arch=c000003e syscall=59 success=yes exit=0 a0=2678cc0 a1=26737f0 a2=2670f60 a3=3f0b27f items=0 ppid=20442 pid=20457 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="man-db.cron" exe="/usr/bin/bash" subj=system_u:system_r:mandb_t:s0-s0:c0.c1023 key=(null) >Mar 18 03:27:02 spectre setroubleshoot[20450]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395127621.950:628): >Mar 18 03:27:02 spectre setroubleshoot[20450]: Plugin Exception restorecon_source >Mar 18 03:27:02 spectre setroubleshoot[20450]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 03:27:02 spectre setroubleshoot[20450]: signature found in database >Mar 18 03:27:02 spectre setroubleshoot[20450]: sending alert to all clients >Mar 18 03:27:02 spectre setroubleshoot[20450]: SELinux is preventing /usr/sbin/logrotate from write access on the fifo_file . For complete SELinux messages. run sealert -l 301b536e-8c6c-427a-bc27-36034acc1338 >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.restorecon_source previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.rsync_data previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.kernel_modules previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.bind_ports previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.allow_execheap previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.cvs_data previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.catchall previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.wine previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.catchall_labels previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.samba_share previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.sys_module previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.allow_execmod previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.file previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.sys_resource previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.mmap_zero previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.openvpn previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.mozplugger previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.setenforce previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.dac_override previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.public_content previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.associate previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.xen_image previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.chrome previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.leaks previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.sshd_root previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.mounton previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.allow_execstack previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.restorecon previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.swapfile previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.connect_ports previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.vbetool previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.device previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: analyze_avc() avc=scontext=system_u:system_r:mandb_t:s0-s0:c0.c1023 tcontext=system_u:object_r:systemd_logind_sessions_t:s0 access=['write'] tclass=fifo_file tpath= >Mar 18 03:27:02 spectre python[20450]: SELinux is preventing /usr/sbin/logrotate from write access on the fifo_file . > >***** Plugin leaks (86.2 confidence) suggests ***************************** > >If you want to ignore logrotate trying to write access the fifo_file, because you believe it should not need this access. >Then you should report this as a bug. >You can generate a local policy module to dontaudit this access. >Do ># grep /usr/sbin/logrotate /var/log/audit/audit.log | audit2allow -D -M mypol ># semodule -i mypol.pp > >***** Plugin catchall (14.7 confidence) suggests ************************** > >If you believe that logrotate should be allowed write access on the fifo_file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep logrotate /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 03:27:02 spectre setroubleshoot[20450]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 03:27:02 spectre setroubleshoot[20450]: signature found in database >Mar 18 03:27:02 spectre setroubleshoot[20450]: sending alert to all clients >Mar 18 03:27:02 spectre setroubleshoot[20450]: SELinux is preventing /usr/bin/bash from write access on the fifo_file . For complete SELinux messages. run sealert -l 7f66a60f-0426-430e-a44a-4d6a87d3ccc1 >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.restorecon_source previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.rsync_data previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.kernel_modules previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.bind_ports previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.allow_execheap previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.cvs_data previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.catchall previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.wine previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.catchall_labels previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.samba_share previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.sys_module previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.allow_execmod previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.file previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.sys_resource previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.mmap_zero previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.openvpn previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.mozplugger previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.setenforce previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.dac_override previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.public_content previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.associate previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.xen_image previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.chrome previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.leaks previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.sshd_root previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.mounton previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.allow_execstack previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.restorecon previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.swapfile previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.connect_ports previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.vbetool previously imported >Mar 18 03:27:02 spectre setroubleshoot[20450]: load_plugins() plugins.device previously imported >Mar 18 03:27:02 spectre python[20450]: SELinux is preventing /usr/bin/bash from write access on the fifo_file . > >***** Plugin leaks (86.2 confidence) suggests ***************************** > >If you want to ignore bash trying to write access the fifo_file, because you believe it should not need this access. >Then you should report this as a bug. >You can generate a local policy module to dontaudit this access. >Do ># grep /usr/bin/bash /var/log/audit/audit.log | audit2allow -D -M mypol ># semodule -i mypol.pp > >***** Plugin catchall (14.7 confidence) suggests ************************** > >If you believe that bash should be allowed write access on the fifo_file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep man-db.cron /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 03:27:12 spectre setroubleshoot[20450]: received signal=14 >Mar 18 03:27:12 spectre setroubleshoot[20450]: KeyboardInterrupt in RunFaultServer >Mar 18 03:27:12 spectre setroubleshoot[20450]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=2 >Mar 18 03:27:12 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 18 03:27:40 spectre run-parts[29188]: (/etc/cron.daily) finished man-db.cron >Mar 18 03:27:40 spectre run-parts[29190]: (/etc/cron.daily) starting mlocate >Mar 18 03:27:40 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 18 03:27:40 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 18 03:27:41 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 18 03:27:41 spectre setroubleshoot[29194]: RunFaultServer(10) >Mar 18 03:27:41 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 18 03:27:41 spectre setroubleshoot[29194]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 18 03:27:41 spectre setroubleshoot[29194]: database version 3.0 compatible with current 3.0 version >Mar 18 03:27:41 spectre setroubleshoot[29194]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 03:27:41 spectre setroubleshoot[29194]: Number of Plugins = 46 >Mar 18 03:27:41 spectre setroubleshoot[29194]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 18 03:27:41 spectre setroubleshoot[29194]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 18 03:27:41 spectre setroubleshoot[29194]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 18 03:27:41 spectre setroubleshoot[29194]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 18 03:27:41 spectre setroubleshoot[29194]: dbus avc(node=spectre type=AVC msg=audit(1395127660.822:629): avc: denied { write } for pid=29191 comm="mlocate" path=2F72756E2F73797374656D642F73657373696F6E732F31352E726566202864656C6574656429 dev="tmpfs" ino=73570 scontext=system_u:system_r:locate_t:s0-s0:c0.c1023 tcontext=system_u:object_r:systemd_logind_sessions_t:s0 tclass=fifo_file >node=spectre type=SYSCALL msg=audit(1395127660.822:629): arch=c000003e syscall=59 success=yes exit=0 a0=2673790 a1=26737f0 a2=2670f60 a3=3f0b27f items=0 ppid=20442 pid=29191 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="mlocate" exe="/usr/bin/bash" subj=system_u:system_r:locate_t:s0-s0:c0.c1023 key=(null) >node=spectre type=EOE msg=audit(1395127660.822:629): >) called: 1 Connections >Mar 18 03:27:41 spectre setroubleshoot[29194]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395127660.822:629): avc: denied { write } for pid=29191 comm="mlocate" path=2F72756E2F73797374656D642F73657373696F6E732F31352E726566202864656C6574656429 dev="tmpfs" ino=73570 scontext=system_u:system_r:locate_t:s0-s0:c0.c1023 tcontext=system_u:object_r:systemd_logind_sessions_t:s0 tclass=fifo_file >Mar 18 03:27:41 spectre setroubleshoot[29194]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395127660.822:629): arch=c000003e syscall=59 success=yes exit=0 a0=2673790 a1=26737f0 a2=2670f60 a3=3f0b27f items=0 ppid=20442 pid=29191 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="mlocate" exe="/usr/bin/bash" subj=system_u:system_r:locate_t:s0-s0:c0.c1023 key=(null) >Mar 18 03:27:41 spectre setroubleshoot[29194]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395127660.822:629): >Mar 18 03:27:41 spectre setroubleshoot[29194]: analyze_avc() avc=scontext=system_u:system_r:locate_t:s0-s0:c0.c1023 tcontext=system_u:object_r:systemd_logind_sessions_t:s0 access=['write'] tclass=fifo_file tpath= >Mar 18 03:27:41 spectre setroubleshoot[29194]: Plugin Exception restorecon_source >Mar 18 03:27:41 spectre setroubleshoot[29194]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 03:27:41 spectre setroubleshoot[29194]: signature found in database >Mar 18 03:27:41 spectre setroubleshoot[29194]: sending alert to all clients >Mar 18 03:27:41 spectre setroubleshoot[29194]: SELinux is preventing /usr/bin/bash from write access on the fifo_file . For complete SELinux messages. run sealert -l c1880770-e7ea-4b51-a75e-f499036c15ec >Mar 18 03:27:41 spectre setroubleshoot[29194]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 03:27:41 spectre setroubleshoot[29194]: load_plugins() plugins.restorecon_source previously imported >Mar 18 03:27:41 spectre setroubleshoot[29194]: load_plugins() plugins.rsync_data previously imported >Mar 18 03:27:41 spectre setroubleshoot[29194]: load_plugins() plugins.kernel_modules previously imported >Mar 18 03:27:41 spectre setroubleshoot[29194]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 03:27:41 spectre setroubleshoot[29194]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 03:27:41 spectre setroubleshoot[29194]: load_plugins() plugins.bind_ports previously imported >Mar 18 03:27:41 spectre setroubleshoot[29194]: load_plugins() plugins.allow_execheap previously imported >Mar 18 03:27:41 spectre setroubleshoot[29194]: load_plugins() plugins.cvs_data previously imported >Mar 18 03:27:41 spectre setroubleshoot[29194]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 03:27:41 spectre setroubleshoot[29194]: load_plugins() plugins.catchall previously imported >Mar 18 03:27:41 spectre setroubleshoot[29194]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 03:27:41 spectre setroubleshoot[29194]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 03:27:41 spectre setroubleshoot[29194]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 03:27:41 spectre setroubleshoot[29194]: load_plugins() plugins.wine previously imported >Mar 18 03:27:41 spectre setroubleshoot[29194]: load_plugins() plugins.catchall_labels previously imported >Mar 18 03:27:41 spectre setroubleshoot[29194]: load_plugins() plugins.samba_share previously imported >Mar 18 03:27:41 spectre setroubleshoot[29194]: load_plugins() plugins.sys_module previously imported >Mar 18 03:27:41 spectre setroubleshoot[29194]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 03:27:41 spectre setroubleshoot[29194]: load_plugins() plugins.allow_execmod previously imported >Mar 18 03:27:41 spectre setroubleshoot[29194]: load_plugins() plugins.file previously imported >Mar 18 03:27:41 spectre setroubleshoot[29194]: load_plugins() plugins.sys_resource previously imported >Mar 18 03:27:41 spectre setroubleshoot[29194]: load_plugins() plugins.mmap_zero previously imported >Mar 18 03:27:41 spectre setroubleshoot[29194]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 03:27:41 spectre setroubleshoot[29194]: load_plugins() plugins.openvpn previously imported >Mar 18 03:27:41 spectre setroubleshoot[29194]: load_plugins() plugins.mozplugger previously imported >Mar 18 03:27:41 spectre setroubleshoot[29194]: load_plugins() plugins.setenforce previously imported >Mar 18 03:27:41 spectre setroubleshoot[29194]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 03:27:41 spectre setroubleshoot[29194]: load_plugins() plugins.dac_override previously imported >Mar 18 03:27:41 spectre setroubleshoot[29194]: load_plugins() plugins.public_content previously imported >Mar 18 03:27:41 spectre setroubleshoot[29194]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 03:27:41 spectre setroubleshoot[29194]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 03:27:41 spectre setroubleshoot[29194]: load_plugins() plugins.associate previously imported >Mar 18 03:27:41 spectre setroubleshoot[29194]: load_plugins() plugins.xen_image previously imported >Mar 18 03:27:41 spectre setroubleshoot[29194]: load_plugins() plugins.chrome previously imported >Mar 18 03:27:41 spectre setroubleshoot[29194]: load_plugins() plugins.leaks previously imported >Mar 18 03:27:41 spectre setroubleshoot[29194]: load_plugins() plugins.sshd_root previously imported >Mar 18 03:27:41 spectre setroubleshoot[29194]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 03:27:41 spectre setroubleshoot[29194]: load_plugins() plugins.mounton previously imported >Mar 18 03:27:41 spectre setroubleshoot[29194]: load_plugins() plugins.allow_execstack previously imported >Mar 18 03:27:41 spectre setroubleshoot[29194]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 03:27:41 spectre setroubleshoot[29194]: load_plugins() plugins.restorecon previously imported >Mar 18 03:27:41 spectre setroubleshoot[29194]: load_plugins() plugins.swapfile previously imported >Mar 18 03:27:41 spectre setroubleshoot[29194]: load_plugins() plugins.connect_ports previously imported >Mar 18 03:27:41 spectre setroubleshoot[29194]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 03:27:41 spectre setroubleshoot[29194]: load_plugins() plugins.vbetool previously imported >Mar 18 03:27:41 spectre setroubleshoot[29194]: load_plugins() plugins.device previously imported >Mar 18 03:27:41 spectre python[29194]: SELinux is preventing /usr/bin/bash from write access on the fifo_file . > >***** Plugin leaks (86.2 confidence) suggests ***************************** > >If you want to ignore bash trying to write access the fifo_file, because you believe it should not need this access. >Then you should report this as a bug. >You can generate a local policy module to dontaudit this access. >Do ># grep /usr/bin/bash /var/log/audit/audit.log | audit2allow -D -M mypol ># semodule -i mypol.pp > >***** Plugin catchall (14.7 confidence) suggests ************************** > >If you believe that bash should be allowed write access on the fifo_file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep mlocate /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 03:27:46 spectre run-parts[29212]: (/etc/cron.daily) finished mlocate >Mar 18 03:27:46 spectre run-parts[29214]: (/etc/cron.daily) starting prelink >Mar 18 03:27:46 spectre setroubleshoot[29194]: dbus avc(node=spectre type=AVC msg=audit(1395127666.304:630): avc: denied { write } for pid=29215 comm="prelink" path=2F72756E2F73797374656D642F73657373696F6E732F31352E726566202864656C6574656429 dev="tmpfs" ino=73570 scontext=system_u:system_r:prelink_cron_system_t:s0-s0:c0.c1023 tcontext=system_u:object_r:systemd_logind_sessions_t:s0 tclass=fifo_file >node=spectre type=SYSCALL msg=audit(1395127666.304:630): arch=c000003e syscall=59 success=yes exit=0 a0=2678790 a1=26737f0 a2=2670f60 a3=3f0b27f items=0 ppid=20442 pid=29215 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="prelink" exe="/usr/bin/bash" subj=system_u:system_r:prelink_cron_system_t:s0-s0:c0.c1023 key=(null) >node=spectre type=EOE msg=audit(1395127666.304:630): >) called: 1 Connections >Mar 18 03:27:46 spectre setroubleshoot[29194]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395127666.304:630): avc: denied { write } for pid=29215 comm="prelink" path=2F72756E2F73797374656D642F73657373696F6E732F31352E726566202864656C6574656429 dev="tmpfs" ino=73570 scontext=system_u:system_r:prelink_cron_system_t:s0-s0:c0.c1023 tcontext=system_u:object_r:systemd_logind_sessions_t:s0 tclass=fifo_file >Mar 18 03:27:46 spectre setroubleshoot[29194]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395127666.304:630): arch=c000003e syscall=59 success=yes exit=0 a0=2678790 a1=26737f0 a2=2670f60 a3=3f0b27f items=0 ppid=20442 pid=29215 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="prelink" exe="/usr/bin/bash" subj=system_u:system_r:prelink_cron_system_t:s0-s0:c0.c1023 key=(null) >Mar 18 03:27:46 spectre setroubleshoot[29194]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395127666.304:630): >Mar 18 03:27:46 spectre setroubleshoot[29194]: analyze_avc() avc=scontext=system_u:system_r:prelink_cron_system_t:s0-s0:c0.c1023 tcontext=system_u:object_r:systemd_logind_sessions_t:s0 access=['write'] tclass=fifo_file tpath= >Mar 18 03:27:46 spectre setroubleshoot[29194]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 03:27:46 spectre setroubleshoot[29194]: signature found in database >Mar 18 03:27:46 spectre setroubleshoot[29194]: sending alert to all clients >Mar 18 03:27:46 spectre setroubleshoot[29194]: SELinux is preventing /usr/bin/bash from write access on the fifo_file . For complete SELinux messages. run sealert -l f60c2f79-fe8f-47e9-ad83-72fd7ebd491a >Mar 18 03:27:46 spectre setroubleshoot[29194]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 03:27:46 spectre setroubleshoot[29194]: load_plugins() plugins.restorecon_source previously imported >Mar 18 03:27:46 spectre setroubleshoot[29194]: load_plugins() plugins.rsync_data previously imported >Mar 18 03:27:46 spectre setroubleshoot[29194]: load_plugins() plugins.kernel_modules previously imported >Mar 18 03:27:46 spectre setroubleshoot[29194]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 03:27:46 spectre setroubleshoot[29194]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 03:27:46 spectre setroubleshoot[29194]: load_plugins() plugins.bind_ports previously imported >Mar 18 03:27:46 spectre setroubleshoot[29194]: load_plugins() plugins.allow_execheap previously imported >Mar 18 03:27:46 spectre setroubleshoot[29194]: load_plugins() plugins.cvs_data previously imported >Mar 18 03:27:46 spectre setroubleshoot[29194]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 03:27:46 spectre setroubleshoot[29194]: load_plugins() plugins.catchall previously imported >Mar 18 03:27:46 spectre setroubleshoot[29194]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 03:27:46 spectre setroubleshoot[29194]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 03:27:46 spectre setroubleshoot[29194]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 03:27:46 spectre setroubleshoot[29194]: load_plugins() plugins.wine previously imported >Mar 18 03:27:46 spectre setroubleshoot[29194]: load_plugins() plugins.catchall_labels previously imported >Mar 18 03:27:46 spectre setroubleshoot[29194]: load_plugins() plugins.samba_share previously imported >Mar 18 03:27:46 spectre setroubleshoot[29194]: load_plugins() plugins.sys_module previously imported >Mar 18 03:27:46 spectre setroubleshoot[29194]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 03:27:46 spectre setroubleshoot[29194]: load_plugins() plugins.allow_execmod previously imported >Mar 18 03:27:46 spectre setroubleshoot[29194]: load_plugins() plugins.file previously imported >Mar 18 03:27:46 spectre setroubleshoot[29194]: load_plugins() plugins.sys_resource previously imported >Mar 18 03:27:46 spectre setroubleshoot[29194]: load_plugins() plugins.mmap_zero previously imported >Mar 18 03:27:46 spectre setroubleshoot[29194]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 03:27:46 spectre setroubleshoot[29194]: load_plugins() plugins.openvpn previously imported >Mar 18 03:27:46 spectre setroubleshoot[29194]: load_plugins() plugins.mozplugger previously imported >Mar 18 03:27:46 spectre setroubleshoot[29194]: load_plugins() plugins.setenforce previously imported >Mar 18 03:27:46 spectre setroubleshoot[29194]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 03:27:46 spectre setroubleshoot[29194]: load_plugins() plugins.dac_override previously imported >Mar 18 03:27:46 spectre setroubleshoot[29194]: load_plugins() plugins.public_content previously imported >Mar 18 03:27:46 spectre setroubleshoot[29194]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 03:27:46 spectre setroubleshoot[29194]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 03:27:46 spectre setroubleshoot[29194]: load_plugins() plugins.associate previously imported >Mar 18 03:27:46 spectre setroubleshoot[29194]: load_plugins() plugins.xen_image previously imported >Mar 18 03:27:46 spectre setroubleshoot[29194]: load_plugins() plugins.chrome previously imported >Mar 18 03:27:46 spectre setroubleshoot[29194]: load_plugins() plugins.leaks previously imported >Mar 18 03:27:46 spectre setroubleshoot[29194]: load_plugins() plugins.sshd_root previously imported >Mar 18 03:27:46 spectre setroubleshoot[29194]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 03:27:46 spectre setroubleshoot[29194]: load_plugins() plugins.mounton previously imported >Mar 18 03:27:46 spectre setroubleshoot[29194]: load_plugins() plugins.allow_execstack previously imported >Mar 18 03:27:46 spectre setroubleshoot[29194]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 03:27:46 spectre setroubleshoot[29194]: load_plugins() plugins.restorecon previously imported >Mar 18 03:27:46 spectre setroubleshoot[29194]: load_plugins() plugins.swapfile previously imported >Mar 18 03:27:46 spectre setroubleshoot[29194]: load_plugins() plugins.connect_ports previously imported >Mar 18 03:27:46 spectre setroubleshoot[29194]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 03:27:46 spectre setroubleshoot[29194]: load_plugins() plugins.vbetool previously imported >Mar 18 03:27:46 spectre setroubleshoot[29194]: load_plugins() plugins.device previously imported >Mar 18 03:27:46 spectre python[29194]: SELinux is preventing /usr/bin/bash from write access on the fifo_file . > >***** Plugin leaks (86.2 confidence) suggests ***************************** > >If you want to ignore bash trying to write access the fifo_file, because you believe it should not need this access. >Then you should report this as a bug. >You can generate a local policy module to dontaudit this access. >Do ># grep /usr/bin/bash /var/log/audit/audit.log | audit2allow -D -M mypol ># semodule -i mypol.pp > >***** Plugin catchall (14.7 confidence) suggests ************************** > >If you believe that bash should be allowed write access on the fifo_file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep prelink /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 03:27:56 spectre setroubleshoot[29194]: received signal=14 >Mar 18 03:27:56 spectre setroubleshoot[29194]: KeyboardInterrupt in RunFaultServer >Mar 18 03:27:56 spectre setroubleshoot[29194]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=2 >Mar 18 03:27:56 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 18 03:29:25 spectre systemd[1]: Reexecuting. >Mar 18 03:29:25 spectre systemd[1]: systemd 211 running in system mode. (+PAM +LIBWRAP +AUDIT +SELINUX +IMA +SYSVINIT +LIBCRYPTSETUP +GCRYPT +ACL +XZ +SECCOMP -APPARMOR) >Mar 18 03:29:25 spectre systemd[1]: Detected virtualization 'kvm'. >Mar 18 03:29:25 spectre systemd[1]: Detected architecture 'x86-64'. >Mar 18 03:29:25 spectre systemd[1688]: /usr/lib/systemd/system-generators/systemd-gpt-auto-generator failed with error code 1. >Mar 18 03:29:25 spectre systemd-gpt-auto-generator[1694]: Out of memory. >Mar 18 03:29:25 spectre systemd[1]: Configuration file /usr/lib/systemd/system/auditd.service is marked world-inaccessible. This has no effect as configuration data is accessible via APIs without restrictions. Proceeding anyway. >Mar 18 03:29:25 spectre run-parts[1699]: (/etc/cron.daily) finished prelink >Mar 18 03:29:25 spectre anacron[20322]: Job `cron.daily' terminated >Mar 18 03:29:25 spectre anacron[20322]: Normal exit (1 job run) >Mar 18 03:29:25 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 18 03:29:25 spectre systemd[20293]: Stopping Default. >Mar 18 03:29:25 spectre systemd[20293]: Stopped target Default. >Mar 18 03:29:25 spectre systemd[20293]: Stopping Basic System. >Mar 18 03:29:25 spectre systemd[20293]: Stopped target Basic System. >Mar 18 03:29:25 spectre systemd[20293]: Stopping Paths. >Mar 18 03:29:25 spectre systemd[20293]: Stopped target Paths. >Mar 18 03:29:25 spectre systemd[20293]: Stopping Timers. >Mar 18 03:29:25 spectre systemd[20293]: Stopped target Timers. >Mar 18 03:29:25 spectre systemd[20293]: Stopping Sockets. >Mar 18 03:29:25 spectre systemd[20293]: Stopped target Sockets. >Mar 18 03:29:25 spectre systemd[20293]: Starting Shutdown. >Mar 18 03:29:25 spectre systemd[20293]: Reached target Shutdown. >Mar 18 03:29:25 spectre systemd[20293]: Starting Exit the Session... >Mar 18 03:29:25 spectre systemd[20293]: Received SIGRTMIN+24 from PID 1703 (kill). >Mar 18 03:29:25 spectre systemd[20302]: pam_unix(systemd-user:session): session closed for user root >Mar 18 03:29:25 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 18 03:29:25 spectre systemd[1]: Stopping user-0.slice. >Mar 18 03:29:25 spectre systemd[1]: Removed slice user-0.slice. >Mar 18 03:29:25 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 18 03:29:25 spectre systemd-logind[635]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 18 03:29:25 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 18 03:29:26 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 18 03:29:26 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 18 03:29:26 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 18 03:29:26 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 18 03:29:26 spectre setroubleshoot[1780]: RunFaultServer(10) >Mar 18 03:29:26 spectre setroubleshoot[1780]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 18 03:29:26 spectre setroubleshoot[1780]: database version 3.0 compatible with current 3.0 version >Mar 18 03:29:26 spectre setroubleshoot[1780]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 03:29:26 spectre setroubleshoot[1780]: Number of Plugins = 46 >Mar 18 03:29:26 spectre setroubleshoot[1780]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 18 03:29:26 spectre setroubleshoot[1780]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 18 03:29:26 spectre setroubleshoot[1780]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 18 03:29:26 spectre setroubleshoot[1780]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 18 03:29:26 spectre setroubleshoot[1780]: dbus avc(node=spectre type=AVC msg=audit(1395127765.486:634): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395127765.486:634): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528b4f0 a1=f0800 a2=0 a3=fffffffffffff018 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395127765.486:634): >) called: 1 Connections >Mar 18 03:29:26 spectre setroubleshoot[1780]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395127765.486:634): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 18 03:29:26 spectre setroubleshoot[1780]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395127765.486:634): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528b4f0 a1=f0800 a2=0 a3=fffffffffffff018 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 03:29:26 spectre setroubleshoot[1780]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395127765.486:634): >Mar 18 03:29:26 spectre setroubleshoot[1780]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 18 03:29:26 spectre setroubleshoot[1780]: dbus avc(node=spectre type=AVC msg=audit(1395127765.486:635): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395127765.486:635): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528b4f0 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395127765.486:635): >) called: 1 Connections >Mar 18 03:29:26 spectre setroubleshoot[1780]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395127765.486:635): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 18 03:29:26 spectre setroubleshoot[1780]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395127765.486:635): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528b4f0 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 03:29:26 spectre setroubleshoot[1780]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395127765.486:635): >Mar 18 03:29:27 spectre setroubleshoot[1780]: dbus avc(node=spectre type=AVC msg=audit(1395127765.486:636): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395127765.486:636): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528b4f0 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395127765.486:636): >) called: 1 Connections >Mar 18 03:29:27 spectre setroubleshoot[1780]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395127765.486:636): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 18 03:29:27 spectre setroubleshoot[1780]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395127765.486:636): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528b4f0 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 03:29:27 spectre setroubleshoot[1780]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395127765.486:636): >Mar 18 03:29:27 spectre setroubleshoot[1780]: Plugin Exception restorecon_source >Mar 18 03:29:27 spectre setroubleshoot[1780]: Plugin Exception restorecon >Mar 18 03:29:27 spectre setroubleshoot[1780]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 03:29:27 spectre setroubleshoot[1780]: signature found in database >Mar 18 03:29:27 spectre setroubleshoot[1780]: sending alert to all clients >Mar 18 03:29:27 spectre setroubleshoot[1780]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.restorecon_source previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.rsync_data previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.kernel_modules previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.bind_ports previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.allow_execheap previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.cvs_data previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.catchall previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.wine previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.catchall_labels previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.samba_share previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.sys_module previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.allow_execmod previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.file previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.sys_resource previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.mmap_zero previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.openvpn previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.mozplugger previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.setenforce previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.dac_override previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.public_content previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.associate previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.xen_image previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.chrome previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.leaks previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.sshd_root previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.mounton previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.allow_execstack previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.restorecon previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.swapfile previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.connect_ports previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.vbetool previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.device previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 18 03:29:27 spectre python[1780]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 03:29:27 spectre setroubleshoot[1780]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 03:29:27 spectre setroubleshoot[1780]: signature found in database >Mar 18 03:29:27 spectre setroubleshoot[1780]: sending alert to all clients >Mar 18 03:29:27 spectre setroubleshoot[1780]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.restorecon_source previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.rsync_data previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.kernel_modules previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.bind_ports previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.allow_execheap previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.cvs_data previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.catchall previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.wine previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.catchall_labels previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.samba_share previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.sys_module previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.allow_execmod previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.file previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.sys_resource previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.mmap_zero previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.openvpn previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.mozplugger previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.setenforce previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.dac_override previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.public_content previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.associate previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.xen_image previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.chrome previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.leaks previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.sshd_root previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.mounton previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.allow_execstack previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.restorecon previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.swapfile previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.connect_ports previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.vbetool previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.device previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 18 03:29:27 spectre python[1780]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 03:29:27 spectre setroubleshoot[1780]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 03:29:27 spectre setroubleshoot[1780]: signature found in database >Mar 18 03:29:27 spectre setroubleshoot[1780]: sending alert to all clients >Mar 18 03:29:27 spectre setroubleshoot[1780]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.restorecon_source previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.rsync_data previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.kernel_modules previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.bind_ports previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.allow_execheap previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.cvs_data previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.catchall previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.wine previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.catchall_labels previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.samba_share previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.sys_module previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.allow_execmod previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.file previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.sys_resource previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.mmap_zero previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.openvpn previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.mozplugger previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.setenforce previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.dac_override previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.public_content previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.associate previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.xen_image previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.chrome previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.leaks previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.sshd_root previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.mounton previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.allow_execstack previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.restorecon previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.swapfile previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.connect_ports previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.vbetool previously imported >Mar 18 03:29:27 spectre setroubleshoot[1780]: load_plugins() plugins.device previously imported >Mar 18 03:29:27 spectre python[1780]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 03:29:37 spectre setroubleshoot[1780]: received signal=14 >Mar 18 03:29:37 spectre setroubleshoot[1780]: KeyboardInterrupt in RunFaultServer >Mar 18 03:29:37 spectre setroubleshoot[1780]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 18 03:29:37 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 18 03:29:37 spectre dbus-daemon[637]: string index out of range >Mar 18 04:01:01 spectre systemd[1]: Starting user-0.slice. >Mar 18 04:01:01 spectre systemd[1]: Created slice user-0.slice. >Mar 18 04:01:01 spectre systemd[1]: Starting User Manager for UID 0... >Mar 18 04:01:01 spectre systemd[1]: Starting Session 16 of user root. >Mar 18 04:01:01 spectre systemd[1]: Started Session 16 of user root. >Mar 18 04:01:01 spectre systemd[1809]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 18 04:01:02 spectre systemd[1809]: Starting Paths. >Mar 18 04:01:02 spectre systemd[1809]: Reached target Paths. >Mar 18 04:01:02 spectre systemd[1809]: Starting Timers. >Mar 18 04:01:02 spectre systemd[1809]: Reached target Timers. >Mar 18 04:01:02 spectre systemd[1809]: Starting Sockets. >Mar 18 04:01:02 spectre systemd[1809]: Reached target Sockets. >Mar 18 04:01:02 spectre systemd[1809]: Starting Basic System. >Mar 18 04:01:02 spectre systemd[1809]: Reached target Basic System. >Mar 18 04:01:02 spectre systemd[1809]: Starting Default. >Mar 18 04:01:02 spectre systemd[1809]: Reached target Default. >Mar 18 04:01:02 spectre systemd[1809]: Startup finished in 10ms. >Mar 18 04:01:02 spectre systemd[1]: Started User Manager for UID 0. >Mar 18 04:01:02 spectre CROND[1823]: (root) CMD (run-parts /etc/cron.hourly) >Mar 18 04:01:02 spectre run-parts[1827]: (/etc/cron.hourly) starting 0anacron >Mar 18 04:01:02 spectre run-parts[1835]: (/etc/cron.hourly) finished 0anacron >Mar 18 04:01:02 spectre run-parts[1837]: (/etc/cron.hourly) starting mcelog.cron >Mar 18 04:01:02 spectre run-parts[1843]: (/etc/cron.hourly) finished mcelog.cron >Mar 18 04:01:02 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 18 04:01:02 spectre systemd[1809]: Stopping Default. >Mar 18 04:01:02 spectre systemd[1809]: Stopped target Default. >Mar 18 04:01:02 spectre systemd[1809]: Stopping Basic System. >Mar 18 04:01:02 spectre systemd[1809]: Stopped target Basic System. >Mar 18 04:01:02 spectre systemd[1809]: Stopping Paths. >Mar 18 04:01:02 spectre systemd[1809]: Stopped target Paths. >Mar 18 04:01:02 spectre systemd[1809]: Stopping Timers. >Mar 18 04:01:02 spectre systemd[1809]: Stopped target Timers. >Mar 18 04:01:02 spectre systemd[1809]: Stopping Sockets. >Mar 18 04:01:02 spectre systemd[1809]: Stopped target Sockets. >Mar 18 04:01:02 spectre systemd[1809]: Starting Shutdown. >Mar 18 04:01:02 spectre systemd[1809]: Reached target Shutdown. >Mar 18 04:01:02 spectre systemd[1809]: Starting Exit the Session... >Mar 18 04:01:02 spectre systemd[1809]: Received SIGRTMIN+24 from PID 1849 (kill). >Mar 18 04:01:02 spectre systemd[1818]: pam_unix(systemd-user:session): session closed for user root >Mar 18 04:01:02 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 18 04:01:02 spectre systemd[1]: Stopping user-0.slice. >Mar 18 04:01:02 spectre systemd[1]: Removed slice user-0.slice. >Mar 18 04:01:02 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 18 04:01:02 spectre systemd-logind[635]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 18 04:01:02 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 18 04:01:02 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 18 04:01:02 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 18 04:01:02 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 18 04:01:02 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 18 04:01:02 spectre setroubleshoot[1866]: RunFaultServer(10) >Mar 18 04:01:02 spectre setroubleshoot[1866]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 18 04:01:02 spectre setroubleshoot[1866]: database version 3.0 compatible with current 3.0 version >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 04:01:02 spectre setroubleshoot[1866]: Number of Plugins = 46 >Mar 18 04:01:02 spectre setroubleshoot[1866]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 18 04:01:02 spectre setroubleshoot[1866]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 18 04:01:02 spectre setroubleshoot[1866]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 18 04:01:02 spectre setroubleshoot[1866]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 18 04:01:02 spectre setroubleshoot[1866]: dbus avc(node=spectre type=AVC msg=audit(1395129662.107:649): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395129662.107:649): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528cac0 a1=f0800 a2=0 a3=7fa912e81680 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395129662.107:649): >) called: 1 Connections >Mar 18 04:01:02 spectre setroubleshoot[1866]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395129662.107:649): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 18 04:01:02 spectre setroubleshoot[1866]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395129662.107:649): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528cac0 a1=f0800 a2=0 a3=7fa912e81680 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 04:01:02 spectre setroubleshoot[1866]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395129662.107:649): >Mar 18 04:01:02 spectre setroubleshoot[1866]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 18 04:01:02 spectre setroubleshoot[1866]: dbus avc(node=spectre type=AVC msg=audit(1395129662.107:650): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395129662.107:650): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528cac0 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395129662.107:650): >) called: 1 Connections >Mar 18 04:01:02 spectre setroubleshoot[1866]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395129662.107:650): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 18 04:01:02 spectre setroubleshoot[1866]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395129662.107:650): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528cac0 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 04:01:02 spectre setroubleshoot[1866]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395129662.107:650): >Mar 18 04:01:02 spectre setroubleshoot[1866]: dbus avc(node=spectre type=AVC msg=audit(1395129662.107:651): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395129662.107:651): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528cac0 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395129662.107:651): >) called: 1 Connections >Mar 18 04:01:02 spectre setroubleshoot[1866]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395129662.107:651): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 18 04:01:02 spectre setroubleshoot[1866]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395129662.107:651): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528cac0 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 04:01:02 spectre setroubleshoot[1866]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395129662.107:651): >Mar 18 04:01:02 spectre setroubleshoot[1866]: Plugin Exception restorecon_source >Mar 18 04:01:02 spectre setroubleshoot[1866]: Plugin Exception restorecon >Mar 18 04:01:02 spectre setroubleshoot[1866]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 04:01:02 spectre setroubleshoot[1866]: signature found in database >Mar 18 04:01:02 spectre setroubleshoot[1866]: sending alert to all clients >Mar 18 04:01:02 spectre setroubleshoot[1866]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.restorecon_source previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.rsync_data previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.kernel_modules previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.bind_ports previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.allow_execheap previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.cvs_data previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.catchall previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.wine previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.catchall_labels previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.samba_share previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.sys_module previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.allow_execmod previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.file previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.sys_resource previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.mmap_zero previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.openvpn previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.mozplugger previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.setenforce previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.dac_override previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.public_content previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.associate previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.xen_image previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.chrome previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.leaks previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.sshd_root previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.mounton previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.allow_execstack previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.restorecon previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.swapfile previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.connect_ports previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.vbetool previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.device previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 18 04:01:02 spectre python[1866]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 04:01:02 spectre setroubleshoot[1866]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 04:01:02 spectre setroubleshoot[1866]: signature found in database >Mar 18 04:01:02 spectre setroubleshoot[1866]: sending alert to all clients >Mar 18 04:01:02 spectre setroubleshoot[1866]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.restorecon_source previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.rsync_data previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.kernel_modules previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.bind_ports previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.allow_execheap previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.cvs_data previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.catchall previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.wine previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.catchall_labels previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.samba_share previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.sys_module previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.allow_execmod previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.file previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.sys_resource previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.mmap_zero previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.openvpn previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.mozplugger previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.setenforce previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.dac_override previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.public_content previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.associate previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.xen_image previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.chrome previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.leaks previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.sshd_root previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.mounton previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.allow_execstack previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.restorecon previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.swapfile previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.connect_ports previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.vbetool previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.device previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 18 04:01:02 spectre python[1866]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 04:01:02 spectre setroubleshoot[1866]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 04:01:02 spectre setroubleshoot[1866]: signature found in database >Mar 18 04:01:02 spectre setroubleshoot[1866]: sending alert to all clients >Mar 18 04:01:02 spectre setroubleshoot[1866]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.restorecon_source previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.rsync_data previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.kernel_modules previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.bind_ports previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.allow_execheap previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.cvs_data previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.catchall previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.wine previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.catchall_labels previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.samba_share previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.sys_module previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.allow_execmod previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.file previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.sys_resource previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.mmap_zero previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.openvpn previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.mozplugger previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.setenforce previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.dac_override previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.public_content previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.associate previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.xen_image previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.chrome previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.leaks previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.sshd_root previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.mounton previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.allow_execstack previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.restorecon previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.swapfile previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.connect_ports previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.vbetool previously imported >Mar 18 04:01:02 spectre setroubleshoot[1866]: load_plugins() plugins.device previously imported >Mar 18 04:01:02 spectre python[1866]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 04:01:12 spectre setroubleshoot[1866]: received signal=14 >Mar 18 04:01:12 spectre setroubleshoot[1866]: KeyboardInterrupt in RunFaultServer >Mar 18 04:01:12 spectre setroubleshoot[1866]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 18 04:01:12 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 18 04:01:12 spectre dbus-daemon[637]: string index out of range >Mar 18 04:12:10 spectre systemd[1]: Starting dnf makecache... >Mar 18 04:12:10 spectre dnf[1936]: Config time: 0.006 >Mar 18 04:12:10 spectre dnf[1936]: cachedir: /var/cache/dnf/x86_64/21 >Mar 18 04:12:10 spectre dnf[1936]: dnf version: 0.4.17 >Mar 18 04:12:10 spectre dnf[1936]: Making cache files for all metadata files. >Mar 18 04:12:10 spectre dnf[1936]: rawhide: will expire after 21565 seconds. >Mar 18 04:12:10 spectre dnf[1936]: repo: using cache for: rawhide >Mar 18 04:12:10 spectre dnf[1936]: hawkey sack setup time: 0.122 >Mar 18 04:12:10 spectre dnf[1936]: Metadata cache created. >Mar 18 04:12:10 spectre systemd[1]: Started dnf makecache. >Mar 18 05:01:01 spectre systemd[1]: Starting user-0.slice. >Mar 18 05:01:01 spectre systemd[1]: Created slice user-0.slice. >Mar 18 05:01:01 spectre systemd[1]: Starting Session 17 of user root. >Mar 18 05:01:01 spectre systemd[1]: Started Session 17 of user root. >Mar 18 05:01:01 spectre systemd[1]: Starting User Manager for UID 0... >Mar 18 05:01:01 spectre systemd[1946]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 18 05:01:01 spectre systemd[1946]: Starting Paths. >Mar 18 05:01:01 spectre systemd[1946]: Reached target Paths. >Mar 18 05:01:01 spectre systemd[1946]: Starting Timers. >Mar 18 05:01:01 spectre systemd[1946]: Reached target Timers. >Mar 18 05:01:01 spectre systemd[1946]: Starting Sockets. >Mar 18 05:01:01 spectre systemd[1946]: Reached target Sockets. >Mar 18 05:01:01 spectre systemd[1946]: Starting Basic System. >Mar 18 05:01:01 spectre systemd[1946]: Reached target Basic System. >Mar 18 05:01:01 spectre systemd[1946]: Starting Default. >Mar 18 05:01:01 spectre systemd[1946]: Reached target Default. >Mar 18 05:01:01 spectre systemd[1946]: Startup finished in 10ms. >Mar 18 05:01:01 spectre systemd[1]: Started User Manager for UID 0. >Mar 18 05:01:01 spectre CROND[1958]: (root) CMD (run-parts /etc/cron.hourly) >Mar 18 05:01:01 spectre run-parts[1963]: (/etc/cron.hourly) starting 0anacron >Mar 18 05:01:01 spectre run-parts[1970]: (/etc/cron.hourly) finished 0anacron >Mar 18 05:01:01 spectre run-parts[1973]: (/etc/cron.hourly) starting mcelog.cron >Mar 18 05:01:01 spectre run-parts[1978]: (/etc/cron.hourly) finished mcelog.cron >Mar 18 05:01:01 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 18 05:01:01 spectre systemd[1946]: Stopping Default. >Mar 18 05:01:01 spectre systemd[1946]: Stopped target Default. >Mar 18 05:01:01 spectre systemd[1946]: Stopping Basic System. >Mar 18 05:01:01 spectre systemd[1946]: Stopped target Basic System. >Mar 18 05:01:01 spectre systemd[1946]: Stopping Paths. >Mar 18 05:01:01 spectre systemd[1946]: Stopped target Paths. >Mar 18 05:01:01 spectre systemd[1946]: Stopping Timers. >Mar 18 05:01:01 spectre systemd[1946]: Stopped target Timers. >Mar 18 05:01:01 spectre systemd[1946]: Stopping Sockets. >Mar 18 05:01:01 spectre systemd[1946]: Stopped target Sockets. >Mar 18 05:01:01 spectre systemd[1946]: Starting Shutdown. >Mar 18 05:01:01 spectre systemd[1946]: Reached target Shutdown. >Mar 18 05:01:01 spectre systemd[1946]: Starting Exit the Session... >Mar 18 05:01:01 spectre systemd[1946]: Received SIGRTMIN+24 from PID 1984 (kill). >Mar 18 05:01:01 spectre systemd[1954]: pam_unix(systemd-user:session): session closed for user root >Mar 18 05:01:01 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 18 05:01:01 spectre systemd[1]: Stopping user-0.slice. >Mar 18 05:01:01 spectre systemd[1]: Removed slice user-0.slice. >Mar 18 05:01:01 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 18 05:01:01 spectre systemd-logind[635]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 18 05:01:01 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 18 05:01:01 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 18 05:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 18 05:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 18 05:01:01 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 18 05:01:01 spectre setroubleshoot[2000]: RunFaultServer(10) >Mar 18 05:01:01 spectre setroubleshoot[2000]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 18 05:01:01 spectre setroubleshoot[2000]: database version 3.0 compatible with current 3.0 version >Mar 18 05:01:01 spectre setroubleshoot[2000]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 05:01:01 spectre setroubleshoot[2000]: Number of Plugins = 46 >Mar 18 05:01:01 spectre setroubleshoot[2000]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 18 05:01:01 spectre setroubleshoot[2000]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 18 05:01:01 spectre setroubleshoot[2000]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 18 05:01:01 spectre setroubleshoot[2000]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 18 05:01:01 spectre setroubleshoot[2000]: dbus avc(node=spectre type=AVC msg=audit(1395133261.275:666): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395133261.275:666): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528ce60 a1=f0800 a2=0 a3=fffffffffffff018 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395133261.275:666): >) called: 1 Connections >Mar 18 05:01:01 spectre setroubleshoot[2000]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395133261.275:666): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 18 05:01:01 spectre setroubleshoot[2000]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395133261.275:666): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528ce60 a1=f0800 a2=0 a3=fffffffffffff018 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 05:01:01 spectre setroubleshoot[2000]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395133261.275:666): >Mar 18 05:01:01 spectre setroubleshoot[2000]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 18 05:01:01 spectre setroubleshoot[2000]: dbus avc(node=spectre type=AVC msg=audit(1395133261.275:667): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395133261.275:667): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528ce60 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395133261.275:667): >) called: 1 Connections >Mar 18 05:01:01 spectre setroubleshoot[2000]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395133261.275:667): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 18 05:01:01 spectre setroubleshoot[2000]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395133261.275:667): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528ce60 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 05:01:01 spectre setroubleshoot[2000]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395133261.275:667): >Mar 18 05:01:01 spectre setroubleshoot[2000]: dbus avc(node=spectre type=AVC msg=audit(1395133261.275:668): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395133261.275:668): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528ce60 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395133261.275:668): >) called: 1 Connections >Mar 18 05:01:01 spectre setroubleshoot[2000]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395133261.275:668): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 18 05:01:01 spectre setroubleshoot[2000]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395133261.275:668): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528ce60 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 05:01:01 spectre setroubleshoot[2000]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395133261.275:668): >Mar 18 05:01:01 spectre setroubleshoot[2000]: Plugin Exception restorecon_source >Mar 18 05:01:01 spectre setroubleshoot[2000]: Plugin Exception restorecon >Mar 18 05:01:01 spectre setroubleshoot[2000]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 05:01:01 spectre setroubleshoot[2000]: signature found in database >Mar 18 05:01:01 spectre setroubleshoot[2000]: sending alert to all clients >Mar 18 05:01:01 spectre setroubleshoot[2000]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 18 05:01:01 spectre setroubleshoot[2000]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 05:01:01 spectre setroubleshoot[2000]: load_plugins() plugins.restorecon_source previously imported >Mar 18 05:01:01 spectre setroubleshoot[2000]: load_plugins() plugins.rsync_data previously imported >Mar 18 05:01:01 spectre setroubleshoot[2000]: load_plugins() plugins.kernel_modules previously imported >Mar 18 05:01:01 spectre setroubleshoot[2000]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 05:01:01 spectre setroubleshoot[2000]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 05:01:01 spectre setroubleshoot[2000]: load_plugins() plugins.bind_ports previously imported >Mar 18 05:01:01 spectre setroubleshoot[2000]: load_plugins() plugins.allow_execheap previously imported >Mar 18 05:01:01 spectre setroubleshoot[2000]: load_plugins() plugins.cvs_data previously imported >Mar 18 05:01:01 spectre setroubleshoot[2000]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 05:01:01 spectre setroubleshoot[2000]: load_plugins() plugins.catchall previously imported >Mar 18 05:01:01 spectre setroubleshoot[2000]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 05:01:01 spectre setroubleshoot[2000]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 05:01:01 spectre setroubleshoot[2000]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 05:01:01 spectre setroubleshoot[2000]: load_plugins() plugins.wine previously imported >Mar 18 05:01:01 spectre setroubleshoot[2000]: load_plugins() plugins.catchall_labels previously imported >Mar 18 05:01:01 spectre setroubleshoot[2000]: load_plugins() plugins.samba_share previously imported >Mar 18 05:01:01 spectre setroubleshoot[2000]: load_plugins() plugins.sys_module previously imported >Mar 18 05:01:01 spectre setroubleshoot[2000]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 05:01:01 spectre setroubleshoot[2000]: load_plugins() plugins.allow_execmod previously imported >Mar 18 05:01:01 spectre setroubleshoot[2000]: load_plugins() plugins.file previously imported >Mar 18 05:01:01 spectre setroubleshoot[2000]: load_plugins() plugins.sys_resource previously imported >Mar 18 05:01:01 spectre setroubleshoot[2000]: load_plugins() plugins.mmap_zero previously imported >Mar 18 05:01:01 spectre setroubleshoot[2000]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 05:01:01 spectre setroubleshoot[2000]: load_plugins() plugins.openvpn previously imported >Mar 18 05:01:01 spectre setroubleshoot[2000]: load_plugins() plugins.mozplugger previously imported >Mar 18 05:01:01 spectre setroubleshoot[2000]: load_plugins() plugins.setenforce previously imported >Mar 18 05:01:01 spectre setroubleshoot[2000]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 05:01:01 spectre setroubleshoot[2000]: load_plugins() plugins.dac_override previously imported >Mar 18 05:01:01 spectre setroubleshoot[2000]: load_plugins() plugins.public_content previously imported >Mar 18 05:01:01 spectre setroubleshoot[2000]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 05:01:01 spectre setroubleshoot[2000]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 05:01:01 spectre setroubleshoot[2000]: load_plugins() plugins.associate previously imported >Mar 18 05:01:01 spectre setroubleshoot[2000]: load_plugins() plugins.xen_image previously imported >Mar 18 05:01:01 spectre setroubleshoot[2000]: load_plugins() plugins.chrome previously imported >Mar 18 05:01:01 spectre setroubleshoot[2000]: load_plugins() plugins.leaks previously imported >Mar 18 05:01:01 spectre setroubleshoot[2000]: load_plugins() plugins.sshd_root previously imported >Mar 18 05:01:01 spectre setroubleshoot[2000]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 05:01:01 spectre setroubleshoot[2000]: load_plugins() plugins.mounton previously imported >Mar 18 05:01:01 spectre setroubleshoot[2000]: load_plugins() plugins.allow_execstack previously imported >Mar 18 05:01:01 spectre setroubleshoot[2000]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 05:01:01 spectre setroubleshoot[2000]: load_plugins() plugins.restorecon previously imported >Mar 18 05:01:01 spectre setroubleshoot[2000]: load_plugins() plugins.swapfile previously imported >Mar 18 05:01:01 spectre setroubleshoot[2000]: load_plugins() plugins.connect_ports previously imported >Mar 18 05:01:01 spectre setroubleshoot[2000]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 05:01:01 spectre setroubleshoot[2000]: load_plugins() plugins.vbetool previously imported >Mar 18 05:01:01 spectre setroubleshoot[2000]: load_plugins() plugins.device previously imported >Mar 18 05:01:01 spectre setroubleshoot[2000]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 18 05:01:01 spectre python[2000]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 05:01:02 spectre setroubleshoot[2000]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 05:01:02 spectre setroubleshoot[2000]: signature found in database >Mar 18 05:01:02 spectre setroubleshoot[2000]: sending alert to all clients >Mar 18 05:01:02 spectre setroubleshoot[2000]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.restorecon_source previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.rsync_data previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.kernel_modules previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.bind_ports previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.allow_execheap previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.cvs_data previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.catchall previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.wine previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.catchall_labels previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.samba_share previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.sys_module previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.allow_execmod previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.file previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.sys_resource previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.mmap_zero previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.openvpn previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.mozplugger previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.setenforce previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.dac_override previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.public_content previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.associate previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.xen_image previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.chrome previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.leaks previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.sshd_root previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.mounton previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.allow_execstack previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.restorecon previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.swapfile previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.connect_ports previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.vbetool previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.device previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 18 05:01:02 spectre python[2000]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 05:01:02 spectre setroubleshoot[2000]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 05:01:02 spectre setroubleshoot[2000]: signature found in database >Mar 18 05:01:02 spectre setroubleshoot[2000]: sending alert to all clients >Mar 18 05:01:02 spectre setroubleshoot[2000]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.restorecon_source previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.rsync_data previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.kernel_modules previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.bind_ports previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.allow_execheap previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.cvs_data previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.catchall previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.wine previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.catchall_labels previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.samba_share previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.sys_module previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.allow_execmod previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.file previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.sys_resource previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.mmap_zero previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.openvpn previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.mozplugger previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.setenforce previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.dac_override previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.public_content previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.associate previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.xen_image previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.chrome previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.leaks previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.sshd_root previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.mounton previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.allow_execstack previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.restorecon previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.swapfile previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.connect_ports previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.vbetool previously imported >Mar 18 05:01:02 spectre setroubleshoot[2000]: load_plugins() plugins.device previously imported >Mar 18 05:01:02 spectre python[2000]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 05:01:11 spectre setroubleshoot[2000]: received signal=14 >Mar 18 05:01:11 spectre setroubleshoot[2000]: KeyboardInterrupt in RunFaultServer >Mar 18 05:01:11 spectre setroubleshoot[2000]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 18 05:01:11 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 18 05:01:11 spectre dbus-daemon[637]: string index out of range >Mar 18 05:12:11 spectre systemd[1]: Starting dnf makecache... >Mar 18 05:12:11 spectre dnf[2069]: Config time: 0.006 >Mar 18 05:12:11 spectre dnf[2069]: cachedir: /var/cache/dnf/x86_64/21 >Mar 18 05:12:11 spectre dnf[2069]: dnf version: 0.4.17 >Mar 18 05:12:11 spectre dnf[2069]: Making cache files for all metadata files. >Mar 18 05:12:11 spectre dnf[2069]: Metadata cache refreshed recently. >Mar 18 05:12:11 spectre systemd[1]: Started dnf makecache. >Mar 18 06:01:01 spectre systemd[1]: Starting user-0.slice. >Mar 18 06:01:01 spectre systemd[1]: Created slice user-0.slice. >Mar 18 06:01:01 spectre systemd[1]: Starting User Manager for UID 0... >Mar 18 06:01:01 spectre systemd[1]: Starting Session 18 of user root. >Mar 18 06:01:01 spectre systemd[1]: Started Session 18 of user root. >Mar 18 06:01:01 spectre systemd[2077]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 18 06:01:01 spectre systemd[2077]: Starting Paths. >Mar 18 06:01:01 spectre systemd[2077]: Reached target Paths. >Mar 18 06:01:01 spectre systemd[2077]: Starting Timers. >Mar 18 06:01:01 spectre systemd[2077]: Reached target Timers. >Mar 18 06:01:01 spectre systemd[2077]: Starting Sockets. >Mar 18 06:01:01 spectre systemd[2077]: Reached target Sockets. >Mar 18 06:01:01 spectre systemd[2077]: Starting Basic System. >Mar 18 06:01:01 spectre systemd[2077]: Reached target Basic System. >Mar 18 06:01:01 spectre systemd[2077]: Starting Default. >Mar 18 06:01:01 spectre systemd[2077]: Reached target Default. >Mar 18 06:01:01 spectre systemd[2077]: Startup finished in 11ms. >Mar 18 06:01:01 spectre systemd[1]: Started User Manager for UID 0. >Mar 18 06:01:01 spectre CROND[2089]: (root) CMD (run-parts /etc/cron.hourly) >Mar 18 06:01:01 spectre run-parts[2093]: (/etc/cron.hourly) starting 0anacron >Mar 18 06:01:01 spectre run-parts[2100]: (/etc/cron.hourly) finished 0anacron >Mar 18 06:01:01 spectre run-parts[2103]: (/etc/cron.hourly) starting mcelog.cron >Mar 18 06:01:01 spectre run-parts[2108]: (/etc/cron.hourly) finished mcelog.cron >Mar 18 06:01:01 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 18 06:01:01 spectre systemd[2077]: Stopping Default. >Mar 18 06:01:01 spectre systemd[2077]: Stopped target Default. >Mar 18 06:01:01 spectre systemd[2077]: Stopping Basic System. >Mar 18 06:01:01 spectre systemd[2077]: Stopped target Basic System. >Mar 18 06:01:01 spectre systemd[2077]: Stopping Paths. >Mar 18 06:01:01 spectre systemd[2077]: Stopped target Paths. >Mar 18 06:01:01 spectre systemd[2077]: Stopping Timers. >Mar 18 06:01:01 spectre systemd[2077]: Stopped target Timers. >Mar 18 06:01:01 spectre systemd[2077]: Stopping Sockets. >Mar 18 06:01:01 spectre systemd[2077]: Stopped target Sockets. >Mar 18 06:01:01 spectre systemd[2077]: Starting Shutdown. >Mar 18 06:01:01 spectre systemd[2077]: Reached target Shutdown. >Mar 18 06:01:01 spectre systemd[2077]: Starting Exit the Session... >Mar 18 06:01:01 spectre systemd[2077]: Received SIGRTMIN+24 from PID 2114 (kill). >Mar 18 06:01:01 spectre systemd[2085]: pam_unix(systemd-user:session): session closed for user root >Mar 18 06:01:01 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 18 06:01:01 spectre systemd[1]: Stopping user-0.slice. >Mar 18 06:01:01 spectre systemd[1]: Removed slice user-0.slice. >Mar 18 06:01:01 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 18 06:01:01 spectre systemd-logind[635]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 18 06:01:01 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 18 06:01:01 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 18 06:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 18 06:01:01 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 18 06:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 18 06:01:01 spectre setroubleshoot[2134]: RunFaultServer(10) >Mar 18 06:01:02 spectre setroubleshoot[2134]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 18 06:01:02 spectre setroubleshoot[2134]: database version 3.0 compatible with current 3.0 version >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 06:01:02 spectre setroubleshoot[2134]: Number of Plugins = 46 >Mar 18 06:01:02 spectre setroubleshoot[2134]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 18 06:01:02 spectre setroubleshoot[2134]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 18 06:01:02 spectre setroubleshoot[2134]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 18 06:01:02 spectre setroubleshoot[2134]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 18 06:01:02 spectre setroubleshoot[2134]: dbus avc(node=spectre type=AVC msg=audit(1395136861.478:683): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395136861.478:683): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528dc90 a1=f0800 a2=0 a3=fffffffffffffd88 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395136861.478:683): >) called: 1 Connections >Mar 18 06:01:02 spectre setroubleshoot[2134]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395136861.478:683): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 18 06:01:02 spectre setroubleshoot[2134]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395136861.478:683): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528dc90 a1=f0800 a2=0 a3=fffffffffffffd88 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 06:01:02 spectre setroubleshoot[2134]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395136861.478:683): >Mar 18 06:01:02 spectre setroubleshoot[2134]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 18 06:01:02 spectre setroubleshoot[2134]: dbus avc(node=spectre type=AVC msg=audit(1395136861.478:684): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395136861.478:684): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528dc90 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395136861.478:684): >) called: 1 Connections >Mar 18 06:01:02 spectre setroubleshoot[2134]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395136861.478:684): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 18 06:01:02 spectre setroubleshoot[2134]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395136861.478:684): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528dc90 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 06:01:02 spectre setroubleshoot[2134]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395136861.478:684): >Mar 18 06:01:02 spectre setroubleshoot[2134]: dbus avc(node=spectre type=AVC msg=audit(1395136861.479:685): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395136861.479:685): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528dc90 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395136861.479:685): >) called: 1 Connections >Mar 18 06:01:02 spectre setroubleshoot[2134]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395136861.479:685): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 18 06:01:02 spectre setroubleshoot[2134]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395136861.479:685): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528dc90 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 06:01:02 spectre setroubleshoot[2134]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395136861.479:685): >Mar 18 06:01:02 spectre setroubleshoot[2134]: Plugin Exception restorecon_source >Mar 18 06:01:02 spectre setroubleshoot[2134]: Plugin Exception restorecon >Mar 18 06:01:02 spectre setroubleshoot[2134]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 06:01:02 spectre setroubleshoot[2134]: signature found in database >Mar 18 06:01:02 spectre setroubleshoot[2134]: sending alert to all clients >Mar 18 06:01:02 spectre setroubleshoot[2134]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.restorecon_source previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.rsync_data previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.kernel_modules previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.bind_ports previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.allow_execheap previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.cvs_data previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.catchall previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.wine previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.catchall_labels previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.samba_share previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.sys_module previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.allow_execmod previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.file previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.sys_resource previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.mmap_zero previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.openvpn previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.mozplugger previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.setenforce previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.dac_override previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.public_content previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.associate previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.xen_image previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.chrome previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.leaks previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.sshd_root previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.mounton previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.allow_execstack previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.restorecon previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.swapfile previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.connect_ports previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.vbetool previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.device previously imported >Mar 18 06:01:02 spectre python[2134]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 06:01:02 spectre setroubleshoot[2134]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 18 06:01:02 spectre setroubleshoot[2134]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 06:01:02 spectre setroubleshoot[2134]: signature found in database >Mar 18 06:01:02 spectre setroubleshoot[2134]: sending alert to all clients >Mar 18 06:01:02 spectre setroubleshoot[2134]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.restorecon_source previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.rsync_data previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.kernel_modules previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.bind_ports previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.allow_execheap previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.cvs_data previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.catchall previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.wine previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.catchall_labels previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.samba_share previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.sys_module previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.allow_execmod previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.file previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.sys_resource previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.mmap_zero previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.openvpn previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.mozplugger previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.setenforce previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.dac_override previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.public_content previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.associate previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.xen_image previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.chrome previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.leaks previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.sshd_root previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.mounton previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.allow_execstack previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.restorecon previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.swapfile previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.connect_ports previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.vbetool previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.device previously imported >Mar 18 06:01:02 spectre python[2134]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 06:01:02 spectre setroubleshoot[2134]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 18 06:01:02 spectre setroubleshoot[2134]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 06:01:02 spectre setroubleshoot[2134]: signature found in database >Mar 18 06:01:02 spectre setroubleshoot[2134]: sending alert to all clients >Mar 18 06:01:02 spectre setroubleshoot[2134]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.restorecon_source previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.rsync_data previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.kernel_modules previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.bind_ports previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.allow_execheap previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.cvs_data previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.catchall previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.wine previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.catchall_labels previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.samba_share previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.sys_module previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.allow_execmod previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.file previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.sys_resource previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.mmap_zero previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.openvpn previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.mozplugger previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.setenforce previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.dac_override previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.public_content previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.associate previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.xen_image previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.chrome previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.leaks previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.sshd_root previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.mounton previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.allow_execstack previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.restorecon previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.swapfile previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.connect_ports previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.vbetool previously imported >Mar 18 06:01:02 spectre setroubleshoot[2134]: load_plugins() plugins.device previously imported >Mar 18 06:01:02 spectre python[2134]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 06:01:12 spectre setroubleshoot[2134]: received signal=14 >Mar 18 06:01:12 spectre setroubleshoot[2134]: KeyboardInterrupt in RunFaultServer >Mar 18 06:01:12 spectre setroubleshoot[2134]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 18 06:01:12 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 18 06:01:12 spectre dbus-daemon[637]: string index out of range >Mar 18 06:12:12 spectre systemd[1]: Starting dnf makecache... >Mar 18 06:12:12 spectre dnf[2224]: Config time: 0.006 >Mar 18 06:12:12 spectre dnf[2224]: cachedir: /var/cache/dnf/x86_64/21 >Mar 18 06:12:12 spectre dnf[2224]: dnf version: 0.4.17 >Mar 18 06:12:12 spectre dnf[2224]: Making cache files for all metadata files. >Mar 18 06:12:12 spectre dnf[2224]: Metadata cache refreshed recently. >Mar 18 06:12:12 spectre systemd[1]: Started dnf makecache. >Mar 18 07:01:01 spectre systemd[1]: Starting user-0.slice. >Mar 18 07:01:01 spectre systemd[1]: Created slice user-0.slice. >Mar 18 07:01:01 spectre systemd[1]: Starting User Manager for UID 0... >Mar 18 07:01:01 spectre systemd[1]: Starting Session 19 of user root. >Mar 18 07:01:01 spectre systemd[1]: Started Session 19 of user root. >Mar 18 07:01:01 spectre systemd[2235]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 18 07:01:01 spectre systemd[2235]: Starting Paths. >Mar 18 07:01:01 spectre systemd[2235]: Reached target Paths. >Mar 18 07:01:01 spectre systemd[2235]: Starting Timers. >Mar 18 07:01:01 spectre systemd[2235]: Reached target Timers. >Mar 18 07:01:01 spectre systemd[2235]: Starting Sockets. >Mar 18 07:01:01 spectre systemd[2235]: Reached target Sockets. >Mar 18 07:01:01 spectre systemd[2235]: Starting Basic System. >Mar 18 07:01:01 spectre systemd[2235]: Reached target Basic System. >Mar 18 07:01:01 spectre systemd[2235]: Starting Default. >Mar 18 07:01:01 spectre systemd[2235]: Reached target Default. >Mar 18 07:01:01 spectre systemd[2235]: Startup finished in 11ms. >Mar 18 07:01:01 spectre systemd[1]: Started User Manager for UID 0. >Mar 18 07:01:01 spectre CROND[2247]: (root) CMD (run-parts /etc/cron.hourly) >Mar 18 07:01:01 spectre run-parts[2251]: (/etc/cron.hourly) starting 0anacron >Mar 18 07:01:01 spectre run-parts[2259]: (/etc/cron.hourly) finished 0anacron >Mar 18 07:01:01 spectre run-parts[2261]: (/etc/cron.hourly) starting mcelog.cron >Mar 18 07:01:01 spectre run-parts[2266]: (/etc/cron.hourly) finished mcelog.cron >Mar 18 07:01:01 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 18 07:01:01 spectre systemd[2235]: Stopping Default. >Mar 18 07:01:01 spectre systemd[2235]: Stopped target Default. >Mar 18 07:01:01 spectre systemd[2235]: Stopping Basic System. >Mar 18 07:01:01 spectre systemd[2235]: Stopped target Basic System. >Mar 18 07:01:01 spectre systemd[2235]: Stopping Paths. >Mar 18 07:01:01 spectre systemd[2235]: Stopped target Paths. >Mar 18 07:01:01 spectre systemd[2235]: Stopping Timers. >Mar 18 07:01:01 spectre systemd[2235]: Stopped target Timers. >Mar 18 07:01:01 spectre systemd[2235]: Stopping Sockets. >Mar 18 07:01:01 spectre systemd[2235]: Stopped target Sockets. >Mar 18 07:01:01 spectre systemd[2235]: Starting Shutdown. >Mar 18 07:01:01 spectre systemd[2235]: Reached target Shutdown. >Mar 18 07:01:01 spectre systemd[2235]: Starting Exit the Session... >Mar 18 07:01:01 spectre systemd[2235]: Received SIGRTMIN+24 from PID 2272 (kill). >Mar 18 07:01:01 spectre systemd[2242]: pam_unix(systemd-user:session): session closed for user root >Mar 18 07:01:01 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 18 07:01:01 spectre systemd[1]: Stopping user-0.slice. >Mar 18 07:01:01 spectre systemd[1]: Removed slice user-0.slice. >Mar 18 07:01:01 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 18 07:01:01 spectre systemd-logind[635]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 18 07:01:01 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 18 07:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 18 07:01:01 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 18 07:01:02 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 18 07:01:02 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 18 07:01:02 spectre setroubleshoot[2287]: RunFaultServer(10) >Mar 18 07:01:02 spectre setroubleshoot[2287]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 18 07:01:02 spectre setroubleshoot[2287]: database version 3.0 compatible with current 3.0 version >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 07:01:02 spectre setroubleshoot[2287]: Number of Plugins = 46 >Mar 18 07:01:02 spectre setroubleshoot[2287]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 18 07:01:02 spectre setroubleshoot[2287]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 18 07:01:02 spectre setroubleshoot[2287]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 18 07:01:02 spectre setroubleshoot[2287]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 18 07:01:02 spectre setroubleshoot[2287]: dbus avc(node=spectre type=AVC msg=audit(1395140461.643:700): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395140461.643:700): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528dc90 a1=f0800 a2=0 a3=fffffffffffff188 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395140461.643:700): >) called: 1 Connections >Mar 18 07:01:02 spectre setroubleshoot[2287]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395140461.643:700): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 18 07:01:02 spectre setroubleshoot[2287]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395140461.643:700): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528dc90 a1=f0800 a2=0 a3=fffffffffffff188 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 07:01:02 spectre setroubleshoot[2287]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395140461.643:700): >Mar 18 07:01:02 spectre setroubleshoot[2287]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 18 07:01:02 spectre setroubleshoot[2287]: dbus avc(node=spectre type=AVC msg=audit(1395140461.643:701): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395140461.643:701): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528dc90 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395140461.643:701): >) called: 1 Connections >Mar 18 07:01:02 spectre setroubleshoot[2287]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395140461.643:701): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 18 07:01:02 spectre setroubleshoot[2287]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395140461.643:701): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528dc90 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 07:01:02 spectre setroubleshoot[2287]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395140461.643:701): >Mar 18 07:01:02 spectre setroubleshoot[2287]: dbus avc(node=spectre type=AVC msg=audit(1395140461.643:702): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395140461.643:702): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528dc90 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395140461.643:702): >) called: 1 Connections >Mar 18 07:01:02 spectre setroubleshoot[2287]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395140461.643:702): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 18 07:01:02 spectre setroubleshoot[2287]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395140461.643:702): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528dc90 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 07:01:02 spectre setroubleshoot[2287]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395140461.643:702): >Mar 18 07:01:02 spectre setroubleshoot[2287]: Plugin Exception restorecon_source >Mar 18 07:01:02 spectre setroubleshoot[2287]: Plugin Exception restorecon >Mar 18 07:01:02 spectre setroubleshoot[2287]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 07:01:02 spectre setroubleshoot[2287]: signature found in database >Mar 18 07:01:02 spectre setroubleshoot[2287]: sending alert to all clients >Mar 18 07:01:02 spectre setroubleshoot[2287]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.restorecon_source previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.rsync_data previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.kernel_modules previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.bind_ports previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.allow_execheap previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.cvs_data previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.catchall previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.wine previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.catchall_labels previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.samba_share previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.sys_module previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.allow_execmod previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.file previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.sys_resource previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.mmap_zero previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.openvpn previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.mozplugger previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.setenforce previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.dac_override previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.public_content previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.associate previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.xen_image previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.chrome previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.leaks previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.sshd_root previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.mounton previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.allow_execstack previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.restorecon previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.swapfile previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.connect_ports previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.vbetool previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.device previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 18 07:01:02 spectre python[2287]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 07:01:02 spectre setroubleshoot[2287]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 07:01:02 spectre setroubleshoot[2287]: signature found in database >Mar 18 07:01:02 spectre setroubleshoot[2287]: sending alert to all clients >Mar 18 07:01:02 spectre setroubleshoot[2287]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.restorecon_source previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.rsync_data previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.kernel_modules previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.bind_ports previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.allow_execheap previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.cvs_data previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.catchall previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.wine previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.catchall_labels previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.samba_share previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.sys_module previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.allow_execmod previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.file previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.sys_resource previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.mmap_zero previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.openvpn previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.mozplugger previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.setenforce previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.dac_override previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.public_content previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.associate previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.xen_image previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.chrome previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.leaks previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.sshd_root previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.mounton previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.allow_execstack previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.restorecon previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.swapfile previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.connect_ports previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.vbetool previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.device previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 18 07:01:02 spectre python[2287]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 07:01:02 spectre setroubleshoot[2287]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 07:01:02 spectre setroubleshoot[2287]: signature found in database >Mar 18 07:01:02 spectre setroubleshoot[2287]: sending alert to all clients >Mar 18 07:01:02 spectre setroubleshoot[2287]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.restorecon_source previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.rsync_data previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.kernel_modules previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.bind_ports previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.allow_execheap previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.cvs_data previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.catchall previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.wine previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.catchall_labels previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.samba_share previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.sys_module previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.allow_execmod previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.file previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.sys_resource previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.mmap_zero previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.openvpn previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.mozplugger previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.setenforce previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.dac_override previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.public_content previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.associate previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.xen_image previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.chrome previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.leaks previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.sshd_root previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.mounton previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.allow_execstack previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.restorecon previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.swapfile previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.connect_ports previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.vbetool previously imported >Mar 18 07:01:02 spectre setroubleshoot[2287]: load_plugins() plugins.device previously imported >Mar 18 07:01:02 spectre python[2287]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 07:01:12 spectre setroubleshoot[2287]: received signal=14 >Mar 18 07:01:12 spectre setroubleshoot[2287]: KeyboardInterrupt in RunFaultServer >Mar 18 07:01:12 spectre setroubleshoot[2287]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 18 07:01:12 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 18 07:01:12 spectre dbus-daemon[637]: string index out of range >Mar 18 07:12:13 spectre systemd[1]: Starting dnf makecache... >Mar 18 07:12:13 spectre dnf[2358]: Config time: 0.005 >Mar 18 07:12:13 spectre dnf[2358]: cachedir: /var/cache/dnf/x86_64/21 >Mar 18 07:12:13 spectre dnf[2358]: dnf version: 0.4.17 >Mar 18 07:12:13 spectre dnf[2358]: Making cache files for all metadata files. >Mar 18 07:12:13 spectre dnf[2358]: rawhide: metadata will expire after 10762 seconds and will be refreshed now >Mar 18 07:12:14 spectre dnf[2358]: reviving: failed for 'rawhide', mismatched sha256 sum. >Mar 18 07:12:14 spectre dnf[2358]: repo: downloading from remote: rawhide >Mar 18 07:12:30 spectre dnf[2358]: hawkey sack setup time: 17.119 >Mar 18 07:12:30 spectre dnf[2358]: Metadata cache created. >Mar 18 07:12:30 spectre systemd[1]: Started dnf makecache. >Mar 18 08:01:01 spectre systemd[1]: Starting user-0.slice. >Mar 18 08:01:01 spectre systemd[1]: Created slice user-0.slice. >Mar 18 08:01:01 spectre systemd[1]: Starting Session 20 of user root. >Mar 18 08:01:01 spectre systemd[1]: Started Session 20 of user root. >Mar 18 08:01:01 spectre systemd[1]: Starting User Manager for UID 0... >Mar 18 08:01:01 spectre systemd[2375]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 18 08:01:01 spectre systemd[2375]: Starting Paths. >Mar 18 08:01:01 spectre systemd[2375]: Reached target Paths. >Mar 18 08:01:01 spectre systemd[2375]: Starting Timers. >Mar 18 08:01:01 spectre systemd[2375]: Reached target Timers. >Mar 18 08:01:01 spectre systemd[2375]: Starting Sockets. >Mar 18 08:01:01 spectre systemd[2375]: Reached target Sockets. >Mar 18 08:01:01 spectre systemd[2375]: Starting Basic System. >Mar 18 08:01:01 spectre systemd[2375]: Reached target Basic System. >Mar 18 08:01:01 spectre systemd[2375]: Starting Default. >Mar 18 08:01:01 spectre systemd[2375]: Reached target Default. >Mar 18 08:01:01 spectre systemd[2375]: Startup finished in 10ms. >Mar 18 08:01:01 spectre systemd[1]: Started User Manager for UID 0. >Mar 18 08:01:01 spectre CROND[2386]: (root) CMD (run-parts /etc/cron.hourly) >Mar 18 08:01:01 spectre run-parts[2390]: (/etc/cron.hourly) starting 0anacron >Mar 18 08:01:01 spectre run-parts[2398]: (/etc/cron.hourly) finished 0anacron >Mar 18 08:01:01 spectre run-parts[2401]: (/etc/cron.hourly) starting mcelog.cron >Mar 18 08:01:01 spectre run-parts[2406]: (/etc/cron.hourly) finished mcelog.cron >Mar 18 08:01:01 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 18 08:01:01 spectre systemd[2375]: Stopping Default. >Mar 18 08:01:01 spectre systemd[2375]: Stopped target Default. >Mar 18 08:01:01 spectre systemd[2375]: Stopping Basic System. >Mar 18 08:01:01 spectre systemd[2375]: Stopped target Basic System. >Mar 18 08:01:01 spectre systemd[2375]: Stopping Paths. >Mar 18 08:01:01 spectre systemd[2375]: Stopped target Paths. >Mar 18 08:01:01 spectre systemd[2375]: Stopping Timers. >Mar 18 08:01:01 spectre systemd[2375]: Stopped target Timers. >Mar 18 08:01:01 spectre systemd[2375]: Stopping Sockets. >Mar 18 08:01:01 spectre systemd[2375]: Stopped target Sockets. >Mar 18 08:01:01 spectre systemd[2375]: Starting Shutdown. >Mar 18 08:01:01 spectre systemd[2375]: Reached target Shutdown. >Mar 18 08:01:01 spectre systemd[2375]: Starting Exit the Session... >Mar 18 08:01:01 spectre systemd[2375]: Received SIGRTMIN+24 from PID 2413 (kill). >Mar 18 08:01:01 spectre systemd[2382]: pam_unix(systemd-user:session): session closed for user root >Mar 18 08:01:01 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 18 08:01:01 spectre systemd[1]: Stopping user-0.slice. >Mar 18 08:01:01 spectre systemd[1]: Removed slice user-0.slice. >Mar 18 08:01:01 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 18 08:01:01 spectre systemd-logind[635]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 18 08:01:01 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 18 08:01:01 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 18 08:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 18 08:01:02 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 18 08:01:02 spectre setroubleshoot[2429]: RunFaultServer(10) >Mar 18 08:01:02 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 18 08:01:02 spectre setroubleshoot[2429]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 18 08:01:02 spectre setroubleshoot[2429]: database version 3.0 compatible with current 3.0 version >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 08:01:02 spectre setroubleshoot[2429]: Number of Plugins = 46 >Mar 18 08:01:02 spectre setroubleshoot[2429]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 18 08:01:02 spectre setroubleshoot[2429]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 18 08:01:02 spectre setroubleshoot[2429]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 18 08:01:02 spectre setroubleshoot[2429]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 18 08:01:02 spectre setroubleshoot[2429]: dbus avc(node=spectre type=AVC msg=audit(1395144061.816:717): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395144061.816:717): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528fbc0 a1=f0800 a2=0 a3=7fa912e81680 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395144061.816:717): >) called: 1 Connections >Mar 18 08:01:02 spectre setroubleshoot[2429]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395144061.816:717): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 18 08:01:02 spectre setroubleshoot[2429]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395144061.816:717): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528fbc0 a1=f0800 a2=0 a3=7fa912e81680 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 08:01:02 spectre setroubleshoot[2429]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395144061.816:717): >Mar 18 08:01:02 spectre setroubleshoot[2429]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 18 08:01:02 spectre setroubleshoot[2429]: dbus avc(node=spectre type=AVC msg=audit(1395144061.816:718): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395144061.816:718): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528fbc0 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395144061.816:718): >) called: 1 Connections >Mar 18 08:01:02 spectre setroubleshoot[2429]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395144061.816:718): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 18 08:01:02 spectre setroubleshoot[2429]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395144061.816:718): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528fbc0 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 08:01:02 spectre setroubleshoot[2429]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395144061.816:718): >Mar 18 08:01:02 spectre setroubleshoot[2429]: dbus avc(node=spectre type=AVC msg=audit(1395144061.816:719): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395144061.816:719): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528fbc0 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395144061.816:719): >) called: 1 Connections >Mar 18 08:01:02 spectre setroubleshoot[2429]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395144061.816:719): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 18 08:01:02 spectre setroubleshoot[2429]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395144061.816:719): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528fbc0 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 08:01:02 spectre setroubleshoot[2429]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395144061.816:719): >Mar 18 08:01:02 spectre setroubleshoot[2429]: Plugin Exception restorecon_source >Mar 18 08:01:02 spectre setroubleshoot[2429]: Plugin Exception restorecon >Mar 18 08:01:02 spectre setroubleshoot[2429]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 08:01:02 spectre setroubleshoot[2429]: signature found in database >Mar 18 08:01:02 spectre setroubleshoot[2429]: sending alert to all clients >Mar 18 08:01:02 spectre setroubleshoot[2429]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.restorecon_source previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.rsync_data previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.kernel_modules previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.bind_ports previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.allow_execheap previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.cvs_data previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.catchall previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.wine previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.catchall_labels previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.samba_share previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.sys_module previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.allow_execmod previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.file previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.sys_resource previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.mmap_zero previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.openvpn previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.mozplugger previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.setenforce previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.dac_override previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.public_content previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.associate previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.xen_image previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.chrome previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.leaks previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.sshd_root previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.mounton previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.allow_execstack previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.restorecon previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.swapfile previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.connect_ports previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.vbetool previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.device previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 18 08:01:02 spectre python[2429]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 08:01:02 spectre setroubleshoot[2429]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 08:01:02 spectre setroubleshoot[2429]: signature found in database >Mar 18 08:01:02 spectre setroubleshoot[2429]: sending alert to all clients >Mar 18 08:01:02 spectre setroubleshoot[2429]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.restorecon_source previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.rsync_data previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.kernel_modules previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.bind_ports previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.allow_execheap previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.cvs_data previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.catchall previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.wine previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.catchall_labels previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.samba_share previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.sys_module previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.allow_execmod previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.file previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.sys_resource previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.mmap_zero previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.openvpn previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.mozplugger previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.setenforce previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.dac_override previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.public_content previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.associate previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.xen_image previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.chrome previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.leaks previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.sshd_root previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.mounton previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.allow_execstack previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.restorecon previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.swapfile previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.connect_ports previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.vbetool previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.device previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 18 08:01:02 spectre python[2429]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 08:01:02 spectre setroubleshoot[2429]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 08:01:02 spectre setroubleshoot[2429]: signature found in database >Mar 18 08:01:02 spectre setroubleshoot[2429]: sending alert to all clients >Mar 18 08:01:02 spectre setroubleshoot[2429]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.restorecon_source previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.rsync_data previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.kernel_modules previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.bind_ports previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.allow_execheap previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.cvs_data previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.catchall previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.wine previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.catchall_labels previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.samba_share previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.sys_module previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.allow_execmod previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.file previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.sys_resource previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.mmap_zero previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.openvpn previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.mozplugger previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.setenforce previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.dac_override previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.public_content previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.associate previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.xen_image previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.chrome previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.leaks previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.sshd_root previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.mounton previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.allow_execstack previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.restorecon previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.swapfile previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.connect_ports previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.vbetool previously imported >Mar 18 08:01:02 spectre setroubleshoot[2429]: load_plugins() plugins.device previously imported >Mar 18 08:01:02 spectre python[2429]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 08:01:12 spectre setroubleshoot[2429]: received signal=14 >Mar 18 08:01:12 spectre setroubleshoot[2429]: KeyboardInterrupt in RunFaultServer >Mar 18 08:01:12 spectre setroubleshoot[2429]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 18 08:01:12 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 18 08:01:12 spectre dbus-daemon[637]: string index out of range >Mar 18 08:12:39 spectre systemd[1]: Starting dnf makecache... >Mar 18 08:12:39 spectre dnf[2499]: Config time: 0.006 >Mar 18 08:12:39 spectre dnf[2499]: cachedir: /var/cache/dnf/x86_64/21 >Mar 18 08:12:39 spectre dnf[2499]: dnf version: 0.4.17 >Mar 18 08:12:39 spectre dnf[2499]: Making cache files for all metadata files. >Mar 18 08:12:39 spectre dnf[2499]: Metadata cache refreshed recently. >Mar 18 08:12:39 spectre systemd[1]: Started dnf makecache. >Mar 18 09:01:01 spectre systemd[1]: Starting user-0.slice. >Mar 18 09:01:01 spectre systemd[1]: Created slice user-0.slice. >Mar 18 09:01:01 spectre systemd[1]: Starting Session 21 of user root. >Mar 18 09:01:01 spectre systemd[1]: Started Session 21 of user root. >Mar 18 09:01:01 spectre systemd[1]: Starting User Manager for UID 0... >Mar 18 09:01:01 spectre systemd[2509]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 18 09:01:01 spectre systemd[2509]: Starting Paths. >Mar 18 09:01:01 spectre systemd[2509]: Reached target Paths. >Mar 18 09:01:01 spectre systemd[2509]: Starting Timers. >Mar 18 09:01:01 spectre systemd[2509]: Reached target Timers. >Mar 18 09:01:01 spectre systemd[2509]: Starting Sockets. >Mar 18 09:01:01 spectre systemd[2509]: Reached target Sockets. >Mar 18 09:01:01 spectre systemd[2509]: Starting Basic System. >Mar 18 09:01:01 spectre systemd[2509]: Reached target Basic System. >Mar 18 09:01:01 spectre systemd[2509]: Starting Default. >Mar 18 09:01:01 spectre systemd[2509]: Reached target Default. >Mar 18 09:01:01 spectre systemd[2509]: Startup finished in 10ms. >Mar 18 09:01:01 spectre systemd[1]: Started User Manager for UID 0. >Mar 18 09:01:01 spectre CROND[2522]: (root) CMD (run-parts /etc/cron.hourly) >Mar 18 09:01:01 spectre run-parts[2527]: (/etc/cron.hourly) starting 0anacron >Mar 18 09:01:01 spectre run-parts[2535]: (/etc/cron.hourly) finished 0anacron >Mar 18 09:01:01 spectre run-parts[2537]: (/etc/cron.hourly) starting mcelog.cron >Mar 18 09:01:01 spectre run-parts[2542]: (/etc/cron.hourly) finished mcelog.cron >Mar 18 09:01:01 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 18 09:01:01 spectre systemd[2509]: Stopping Default. >Mar 18 09:01:01 spectre systemd[2509]: Stopped target Default. >Mar 18 09:01:01 spectre systemd[2509]: Stopping Basic System. >Mar 18 09:01:01 spectre systemd[2509]: Stopped target Basic System. >Mar 18 09:01:01 spectre systemd[2509]: Stopping Paths. >Mar 18 09:01:01 spectre systemd[2509]: Stopped target Paths. >Mar 18 09:01:01 spectre systemd[2509]: Stopping Timers. >Mar 18 09:01:01 spectre systemd[2509]: Stopped target Timers. >Mar 18 09:01:01 spectre systemd[2509]: Stopping Sockets. >Mar 18 09:01:01 spectre systemd[2509]: Stopped target Sockets. >Mar 18 09:01:01 spectre systemd[2509]: Starting Shutdown. >Mar 18 09:01:01 spectre systemd[2509]: Reached target Shutdown. >Mar 18 09:01:01 spectre systemd[2509]: Starting Exit the Session... >Mar 18 09:01:01 spectre systemd[2509]: Received SIGRTMIN+24 from PID 2548 (kill). >Mar 18 09:01:01 spectre systemd[2518]: pam_unix(systemd-user:session): session closed for user root >Mar 18 09:01:01 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 18 09:01:01 spectre systemd[1]: Stopping user-0.slice. >Mar 18 09:01:01 spectre systemd[1]: Removed slice user-0.slice. >Mar 18 09:01:01 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 18 09:01:01 spectre systemd-logind[635]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 18 09:01:01 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 18 09:01:02 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 18 09:01:02 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 18 09:01:02 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 18 09:01:02 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 18 09:01:02 spectre setroubleshoot[2566]: RunFaultServer(10) >Mar 18 09:01:02 spectre setroubleshoot[2566]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 18 09:01:02 spectre setroubleshoot[2566]: database version 3.0 compatible with current 3.0 version >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 09:01:02 spectre setroubleshoot[2566]: Number of Plugins = 46 >Mar 18 09:01:02 spectre setroubleshoot[2566]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 18 09:01:02 spectre setroubleshoot[2566]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 18 09:01:02 spectre setroubleshoot[2566]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 18 09:01:02 spectre setroubleshoot[2566]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 18 09:01:02 spectre setroubleshoot[2566]: dbus avc(node=spectre type=AVC msg=audit(1395147661.988:734): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395147661.988:734): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528ce60 a1=f0800 a2=0 a3=7fa912e81680 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395147661.988:734): >) called: 1 Connections >Mar 18 09:01:02 spectre setroubleshoot[2566]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395147661.988:734): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 18 09:01:02 spectre setroubleshoot[2566]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395147661.988:734): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528ce60 a1=f0800 a2=0 a3=7fa912e81680 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 09:01:02 spectre setroubleshoot[2566]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395147661.988:734): >Mar 18 09:01:02 spectre setroubleshoot[2566]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 18 09:01:02 spectre setroubleshoot[2566]: dbus avc(node=spectre type=AVC msg=audit(1395147661.988:735): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395147661.988:735): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528ce60 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395147661.988:735): >) called: 1 Connections >Mar 18 09:01:02 spectre setroubleshoot[2566]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395147661.988:735): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 18 09:01:02 spectre setroubleshoot[2566]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395147661.988:735): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528ce60 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 09:01:02 spectre setroubleshoot[2566]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395147661.988:735): >Mar 18 09:01:02 spectre setroubleshoot[2566]: dbus avc(node=spectre type=AVC msg=audit(1395147661.989:736): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395147661.989:736): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528ce60 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395147661.989:736): >) called: 1 Connections >Mar 18 09:01:02 spectre setroubleshoot[2566]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395147661.989:736): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 18 09:01:02 spectre setroubleshoot[2566]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395147661.989:736): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528ce60 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 09:01:02 spectre setroubleshoot[2566]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395147661.989:736): >Mar 18 09:01:02 spectre setroubleshoot[2566]: Plugin Exception restorecon_source >Mar 18 09:01:02 spectre setroubleshoot[2566]: Plugin Exception restorecon >Mar 18 09:01:02 spectre setroubleshoot[2566]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 09:01:02 spectre setroubleshoot[2566]: signature found in database >Mar 18 09:01:02 spectre setroubleshoot[2566]: sending alert to all clients >Mar 18 09:01:02 spectre setroubleshoot[2566]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.restorecon_source previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.rsync_data previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.kernel_modules previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.bind_ports previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.allow_execheap previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.cvs_data previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.catchall previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.wine previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.catchall_labels previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.samba_share previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.sys_module previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.allow_execmod previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.file previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.sys_resource previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.mmap_zero previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.openvpn previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.mozplugger previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.setenforce previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.dac_override previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.public_content previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.associate previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.xen_image previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.chrome previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.leaks previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.sshd_root previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.mounton previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.allow_execstack previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.restorecon previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.swapfile previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.connect_ports previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.vbetool previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.device previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 18 09:01:02 spectre python[2566]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 09:01:02 spectre setroubleshoot[2566]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 09:01:02 spectre setroubleshoot[2566]: signature found in database >Mar 18 09:01:02 spectre setroubleshoot[2566]: sending alert to all clients >Mar 18 09:01:02 spectre setroubleshoot[2566]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.restorecon_source previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.rsync_data previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.kernel_modules previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.bind_ports previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.allow_execheap previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.cvs_data previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.catchall previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.wine previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.catchall_labels previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.samba_share previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.sys_module previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.allow_execmod previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.file previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.sys_resource previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.mmap_zero previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.openvpn previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.mozplugger previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.setenforce previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.dac_override previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.public_content previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.associate previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.xen_image previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.chrome previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.leaks previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.sshd_root previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.mounton previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.allow_execstack previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.restorecon previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.swapfile previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.connect_ports previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.vbetool previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.device previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 18 09:01:02 spectre python[2566]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 09:01:02 spectre setroubleshoot[2566]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 09:01:02 spectre setroubleshoot[2566]: signature found in database >Mar 18 09:01:02 spectre setroubleshoot[2566]: sending alert to all clients >Mar 18 09:01:02 spectre setroubleshoot[2566]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.restorecon_source previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.rsync_data previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.kernel_modules previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.bind_ports previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.allow_execheap previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.cvs_data previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.catchall previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.wine previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.catchall_labels previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.samba_share previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.sys_module previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.allow_execmod previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.file previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.sys_resource previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.mmap_zero previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.openvpn previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.mozplugger previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.setenforce previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.dac_override previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.public_content previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.associate previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.xen_image previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.chrome previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.leaks previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.sshd_root previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.mounton previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.allow_execstack previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.restorecon previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.swapfile previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.connect_ports previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.vbetool previously imported >Mar 18 09:01:02 spectre setroubleshoot[2566]: load_plugins() plugins.device previously imported >Mar 18 09:01:02 spectre python[2566]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 09:01:12 spectre setroubleshoot[2566]: received signal=14 >Mar 18 09:01:12 spectre setroubleshoot[2566]: KeyboardInterrupt in RunFaultServer >Mar 18 09:01:12 spectre setroubleshoot[2566]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 18 09:01:12 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 18 09:01:12 spectre dbus-daemon[637]: string index out of range >Mar 18 09:12:46 spectre systemd[1]: Starting dnf makecache... >Mar 18 09:12:46 spectre dnf[2656]: Config time: 0.006 >Mar 18 09:12:46 spectre dnf[2656]: cachedir: /var/cache/dnf/x86_64/21 >Mar 18 09:12:46 spectre dnf[2656]: dnf version: 0.4.17 >Mar 18 09:12:46 spectre dnf[2656]: Making cache files for all metadata files. >Mar 18 09:12:46 spectre dnf[2656]: Metadata cache refreshed recently. >Mar 18 09:12:46 spectre systemd[1]: Started dnf makecache. >Mar 18 09:36:48 spectre sshd[2664]: Accepted publickey for dshea from 192.168.100.1 port 43245 ssh2: RSA 29:71:d3:be:dc:71:8e:0d:ef:a5:2f:ab:31:0c:82:d4 >Mar 18 09:36:48 spectre systemd[1]: Starting user-1000.slice. >Mar 18 09:36:48 spectre systemd[1]: Created slice user-1000.slice. >Mar 18 09:36:48 spectre systemd[1]: Starting User Manager for UID 1000... >Mar 18 09:36:48 spectre systemd[1]: Starting Session 22 of user dshea. >Mar 18 09:36:48 spectre systemd-logind[635]: New session 22 of user dshea. >Mar 18 09:36:48 spectre systemd[1]: Started Session 22 of user dshea. >Mar 18 09:36:48 spectre systemd[2667]: pam_unix(systemd-user:session): session opened for user dshea by (uid=0) >Mar 18 09:36:48 spectre systemd[2667]: Starting Paths. >Mar 18 09:36:48 spectre systemd[2667]: Reached target Paths. >Mar 18 09:36:48 spectre systemd[2667]: Starting Timers. >Mar 18 09:36:48 spectre systemd[2667]: Reached target Timers. >Mar 18 09:36:48 spectre systemd[2667]: Starting Sockets. >Mar 18 09:36:48 spectre systemd[2667]: Reached target Sockets. >Mar 18 09:36:48 spectre systemd[2667]: Starting Basic System. >Mar 18 09:36:48 spectre systemd[2667]: Reached target Basic System. >Mar 18 09:36:48 spectre systemd[2667]: Starting Default. >Mar 18 09:36:48 spectre systemd[2667]: Reached target Default. >Mar 18 09:36:48 spectre systemd[2667]: Startup finished in 11ms. >Mar 18 09:36:48 spectre systemd[1]: Started User Manager for UID 1000. >Mar 18 09:36:48 spectre sshd[2664]: pam_unix(sshd:session): session opened for user dshea by (uid=0) >Mar 18 09:37:34 spectre sshd[2839]: Accepted publickey for dshea from 192.168.100.1 port 43246 ssh2: RSA 29:71:d3:be:dc:71:8e:0d:ef:a5:2f:ab:31:0c:82:d4 >Mar 18 09:37:34 spectre systemd-logind[635]: New session 23 of user dshea. >Mar 18 09:37:34 spectre systemd[1]: Starting Session 23 of user dshea. >Mar 18 09:37:34 spectre systemd[1]: Started Session 23 of user dshea. >Mar 18 09:37:34 spectre sshd[2839]: pam_unix(sshd:session): session opened for user dshea by (uid=0) >Mar 18 10:01:01 spectre systemd[1]: Starting user-0.slice. >Mar 18 10:01:01 spectre systemd[1]: Created slice user-0.slice. >Mar 18 10:01:02 spectre systemd[1]: Starting User Manager for UID 0... >Mar 18 10:01:02 spectre systemd[1]: Starting Session 24 of user root. >Mar 18 10:01:02 spectre systemd[1]: Started Session 24 of user root. >Mar 18 10:01:02 spectre systemd[3021]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 18 10:01:02 spectre systemd[3021]: Starting Paths. >Mar 18 10:01:02 spectre systemd[3021]: Reached target Paths. >Mar 18 10:01:02 spectre systemd[3021]: Starting Timers. >Mar 18 10:01:02 spectre systemd[3021]: Reached target Timers. >Mar 18 10:01:02 spectre systemd[3021]: Starting Sockets. >Mar 18 10:01:02 spectre systemd[3021]: Reached target Sockets. >Mar 18 10:01:02 spectre systemd[3021]: Starting Basic System. >Mar 18 10:01:02 spectre systemd[3021]: Reached target Basic System. >Mar 18 10:01:02 spectre systemd[3021]: Starting Default. >Mar 18 10:01:02 spectre systemd[3021]: Reached target Default. >Mar 18 10:01:02 spectre systemd[3021]: Startup finished in 10ms. >Mar 18 10:01:02 spectre systemd[1]: Started User Manager for UID 0. >Mar 18 10:01:02 spectre CROND[3035]: (root) CMD (run-parts /etc/cron.hourly) >Mar 18 10:01:02 spectre run-parts[3039]: (/etc/cron.hourly) starting 0anacron >Mar 18 10:01:02 spectre run-parts[3047]: (/etc/cron.hourly) finished 0anacron >Mar 18 10:01:02 spectre run-parts[3049]: (/etc/cron.hourly) starting mcelog.cron >Mar 18 10:01:02 spectre run-parts[3055]: (/etc/cron.hourly) finished mcelog.cron >Mar 18 10:01:02 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 18 10:01:02 spectre systemd[3021]: Stopping Default. >Mar 18 10:01:02 spectre systemd[3021]: Stopped target Default. >Mar 18 10:01:02 spectre systemd[3021]: Stopping Basic System. >Mar 18 10:01:02 spectre systemd[3021]: Stopped target Basic System. >Mar 18 10:01:02 spectre systemd[3021]: Stopping Paths. >Mar 18 10:01:02 spectre systemd[3021]: Stopped target Paths. >Mar 18 10:01:02 spectre systemd[3021]: Stopping Timers. >Mar 18 10:01:02 spectre systemd[3021]: Stopped target Timers. >Mar 18 10:01:02 spectre systemd[3021]: Stopping Sockets. >Mar 18 10:01:02 spectre systemd[3021]: Stopped target Sockets. >Mar 18 10:01:02 spectre systemd[3021]: Starting Shutdown. >Mar 18 10:01:02 spectre systemd[3021]: Reached target Shutdown. >Mar 18 10:01:02 spectre systemd[3021]: Starting Exit the Session... >Mar 18 10:01:02 spectre systemd[3021]: Received SIGRTMIN+24 from PID 3060 (kill). >Mar 18 10:01:02 spectre systemd[3031]: pam_unix(systemd-user:session): session closed for user root >Mar 18 10:01:02 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 18 10:01:02 spectre systemd[1]: Stopping user-0.slice. >Mar 18 10:01:02 spectre systemd[1]: Removed slice user-0.slice. >Mar 18 10:01:02 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 18 10:01:02 spectre systemd-logind[635]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 18 10:01:02 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 18 10:01:02 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 18 10:01:02 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 18 10:01:02 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 18 10:01:02 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 18 10:01:02 spectre setroubleshoot[3075]: RunFaultServer(10) >Mar 18 10:01:02 spectre setroubleshoot[3075]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 18 10:01:02 spectre setroubleshoot[3075]: database version 3.0 compatible with current 3.0 version >Mar 18 10:01:02 spectre setroubleshoot[3075]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 10:01:02 spectre setroubleshoot[3075]: Number of Plugins = 46 >Mar 18 10:01:02 spectre setroubleshoot[3075]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 18 10:01:02 spectre setroubleshoot[3075]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 18 10:01:02 spectre setroubleshoot[3075]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 18 10:01:02 spectre setroubleshoot[3075]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 18 10:01:02 spectre setroubleshoot[3075]: dbus avc(node=spectre type=AVC msg=audit(1395151262.181:792): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395151262.181:792): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528f4a0 a1=f0800 a2=0 a3=7fa912e81680 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395151262.181:792): >) called: 1 Connections >Mar 18 10:01:02 spectre setroubleshoot[3075]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395151262.181:792): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 18 10:01:02 spectre setroubleshoot[3075]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395151262.181:792): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528f4a0 a1=f0800 a2=0 a3=7fa912e81680 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 10:01:02 spectre setroubleshoot[3075]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395151262.181:792): >Mar 18 10:01:02 spectre setroubleshoot[3075]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 18 10:01:02 spectre setroubleshoot[3075]: dbus avc(node=spectre type=AVC msg=audit(1395151262.182:793): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395151262.182:793): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528f4a0 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395151262.182:793): >) called: 1 Connections >Mar 18 10:01:02 spectre setroubleshoot[3075]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395151262.182:793): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 18 10:01:02 spectre setroubleshoot[3075]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395151262.182:793): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528f4a0 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 10:01:02 spectre setroubleshoot[3075]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395151262.182:793): >Mar 18 10:01:02 spectre setroubleshoot[3075]: dbus avc(node=spectre type=AVC msg=audit(1395151262.182:794): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395151262.182:794): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528f4a0 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395151262.182:794): >) called: 1 Connections >Mar 18 10:01:02 spectre setroubleshoot[3075]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395151262.182:794): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 18 10:01:02 spectre setroubleshoot[3075]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395151262.182:794): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528f4a0 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 10:01:02 spectre setroubleshoot[3075]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395151262.182:794): >Mar 18 10:01:02 spectre setroubleshoot[3075]: Plugin Exception restorecon_source >Mar 18 10:01:02 spectre setroubleshoot[3075]: Plugin Exception restorecon >Mar 18 10:01:02 spectre setroubleshoot[3075]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 10:01:02 spectre setroubleshoot[3075]: signature found in database >Mar 18 10:01:02 spectre setroubleshoot[3075]: sending alert to all clients >Mar 18 10:01:02 spectre setroubleshoot[3075]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 18 10:01:02 spectre setroubleshoot[3075]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 10:01:02 spectre setroubleshoot[3075]: load_plugins() plugins.restorecon_source previously imported >Mar 18 10:01:02 spectre setroubleshoot[3075]: load_plugins() plugins.rsync_data previously imported >Mar 18 10:01:02 spectre setroubleshoot[3075]: load_plugins() plugins.kernel_modules previously imported >Mar 18 10:01:02 spectre setroubleshoot[3075]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 10:01:02 spectre setroubleshoot[3075]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 10:01:02 spectre setroubleshoot[3075]: load_plugins() plugins.bind_ports previously imported >Mar 18 10:01:02 spectre setroubleshoot[3075]: load_plugins() plugins.allow_execheap previously imported >Mar 18 10:01:02 spectre setroubleshoot[3075]: load_plugins() plugins.cvs_data previously imported >Mar 18 10:01:02 spectre setroubleshoot[3075]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 10:01:02 spectre setroubleshoot[3075]: load_plugins() plugins.catchall previously imported >Mar 18 10:01:02 spectre setroubleshoot[3075]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 10:01:02 spectre setroubleshoot[3075]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 10:01:02 spectre setroubleshoot[3075]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 10:01:02 spectre setroubleshoot[3075]: load_plugins() plugins.wine previously imported >Mar 18 10:01:02 spectre setroubleshoot[3075]: load_plugins() plugins.catchall_labels previously imported >Mar 18 10:01:02 spectre setroubleshoot[3075]: load_plugins() plugins.samba_share previously imported >Mar 18 10:01:02 spectre setroubleshoot[3075]: load_plugins() plugins.sys_module previously imported >Mar 18 10:01:02 spectre setroubleshoot[3075]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 10:01:02 spectre setroubleshoot[3075]: load_plugins() plugins.allow_execmod previously imported >Mar 18 10:01:02 spectre setroubleshoot[3075]: load_plugins() plugins.file previously imported >Mar 18 10:01:02 spectre setroubleshoot[3075]: load_plugins() plugins.sys_resource previously imported >Mar 18 10:01:02 spectre setroubleshoot[3075]: load_plugins() plugins.mmap_zero previously imported >Mar 18 10:01:02 spectre setroubleshoot[3075]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 10:01:02 spectre setroubleshoot[3075]: load_plugins() plugins.openvpn previously imported >Mar 18 10:01:02 spectre setroubleshoot[3075]: load_plugins() plugins.mozplugger previously imported >Mar 18 10:01:02 spectre setroubleshoot[3075]: load_plugins() plugins.setenforce previously imported >Mar 18 10:01:02 spectre setroubleshoot[3075]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 10:01:02 spectre setroubleshoot[3075]: load_plugins() plugins.dac_override previously imported >Mar 18 10:01:02 spectre setroubleshoot[3075]: load_plugins() plugins.public_content previously imported >Mar 18 10:01:02 spectre setroubleshoot[3075]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 10:01:02 spectre setroubleshoot[3075]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 10:01:02 spectre setroubleshoot[3075]: load_plugins() plugins.associate previously imported >Mar 18 10:01:02 spectre setroubleshoot[3075]: load_plugins() plugins.xen_image previously imported >Mar 18 10:01:02 spectre setroubleshoot[3075]: load_plugins() plugins.chrome previously imported >Mar 18 10:01:02 spectre setroubleshoot[3075]: load_plugins() plugins.leaks previously imported >Mar 18 10:01:02 spectre setroubleshoot[3075]: load_plugins() plugins.sshd_root previously imported >Mar 18 10:01:02 spectre setroubleshoot[3075]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 10:01:02 spectre setroubleshoot[3075]: load_plugins() plugins.mounton previously imported >Mar 18 10:01:02 spectre setroubleshoot[3075]: load_plugins() plugins.allow_execstack previously imported >Mar 18 10:01:02 spectre setroubleshoot[3075]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 10:01:02 spectre setroubleshoot[3075]: load_plugins() plugins.restorecon previously imported >Mar 18 10:01:02 spectre setroubleshoot[3075]: load_plugins() plugins.swapfile previously imported >Mar 18 10:01:02 spectre setroubleshoot[3075]: load_plugins() plugins.connect_ports previously imported >Mar 18 10:01:02 spectre setroubleshoot[3075]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 10:01:02 spectre setroubleshoot[3075]: load_plugins() plugins.vbetool previously imported >Mar 18 10:01:02 spectre setroubleshoot[3075]: load_plugins() plugins.device previously imported >Mar 18 10:01:02 spectre setroubleshoot[3075]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 18 10:01:02 spectre python[3075]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 10:01:03 spectre setroubleshoot[3075]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 10:01:03 spectre setroubleshoot[3075]: signature found in database >Mar 18 10:01:03 spectre setroubleshoot[3075]: sending alert to all clients >Mar 18 10:01:03 spectre setroubleshoot[3075]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.restorecon_source previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.rsync_data previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.kernel_modules previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.bind_ports previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.allow_execheap previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.cvs_data previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.catchall previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.wine previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.catchall_labels previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.samba_share previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.sys_module previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.allow_execmod previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.file previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.sys_resource previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.mmap_zero previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.openvpn previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.mozplugger previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.setenforce previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.dac_override previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.public_content previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.associate previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.xen_image previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.chrome previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.leaks previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.sshd_root previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.mounton previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.allow_execstack previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.restorecon previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.swapfile previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.connect_ports previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.vbetool previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.device previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 18 10:01:03 spectre python[3075]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 10:01:03 spectre setroubleshoot[3075]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 10:01:03 spectre setroubleshoot[3075]: signature found in database >Mar 18 10:01:03 spectre setroubleshoot[3075]: sending alert to all clients >Mar 18 10:01:03 spectre setroubleshoot[3075]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.restorecon_source previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.rsync_data previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.kernel_modules previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.bind_ports previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.allow_execheap previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.cvs_data previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.catchall previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.wine previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.catchall_labels previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.samba_share previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.sys_module previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.allow_execmod previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.file previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.sys_resource previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.mmap_zero previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.openvpn previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.mozplugger previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.setenforce previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.dac_override previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.public_content previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.associate previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.xen_image previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.chrome previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.leaks previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.sshd_root previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.mounton previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.allow_execstack previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.restorecon previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.swapfile previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.connect_ports previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.vbetool previously imported >Mar 18 10:01:03 spectre setroubleshoot[3075]: load_plugins() plugins.device previously imported >Mar 18 10:01:03 spectre python[3075]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 10:01:12 spectre setroubleshoot[3075]: received signal=14 >Mar 18 10:01:12 spectre setroubleshoot[3075]: KeyboardInterrupt in RunFaultServer >Mar 18 10:01:12 spectre setroubleshoot[3075]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 18 10:01:12 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 18 10:01:12 spectre dbus-daemon[637]: string index out of range >Mar 18 10:12:47 spectre systemd[1]: Starting dnf makecache... >Mar 18 10:12:47 spectre dnf[3167]: Config time: 0.006 >Mar 18 10:12:47 spectre dnf[3167]: cachedir: /var/cache/dnf/x86_64/21 >Mar 18 10:12:47 spectre dnf[3167]: dnf version: 0.4.17 >Mar 18 10:12:47 spectre dnf[3167]: Making cache files for all metadata files. >Mar 18 10:12:47 spectre dnf[3167]: rawhide: will expire after 32369 seconds. >Mar 18 10:12:47 spectre dnf[3167]: repo: using cache for: rawhide >Mar 18 10:12:47 spectre dnf[3167]: hawkey sack setup time: 0.129 >Mar 18 10:12:47 spectre dnf[3167]: Metadata cache created. >Mar 18 10:12:47 spectre systemd[1]: Started dnf makecache. >Mar 18 11:01:01 spectre systemd[1]: Starting user-0.slice. >Mar 18 11:01:01 spectre systemd[1]: Created slice user-0.slice. >Mar 18 11:01:01 spectre systemd[1]: Starting Session 25 of user root. >Mar 18 11:01:01 spectre systemd[1]: Started Session 25 of user root. >Mar 18 11:01:01 spectre systemd[1]: Starting User Manager for UID 0... >Mar 18 11:01:01 spectre systemd[3177]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 18 11:01:01 spectre systemd[3177]: Starting Paths. >Mar 18 11:01:01 spectre systemd[3177]: Reached target Paths. >Mar 18 11:01:01 spectre systemd[3177]: Starting Timers. >Mar 18 11:01:01 spectre systemd[3177]: Reached target Timers. >Mar 18 11:01:01 spectre systemd[3177]: Starting Sockets. >Mar 18 11:01:01 spectre systemd[3177]: Reached target Sockets. >Mar 18 11:01:01 spectre systemd[3177]: Starting Basic System. >Mar 18 11:01:01 spectre systemd[3177]: Reached target Basic System. >Mar 18 11:01:01 spectre systemd[3177]: Starting Default. >Mar 18 11:01:01 spectre systemd[3177]: Reached target Default. >Mar 18 11:01:01 spectre systemd[3177]: Startup finished in 10ms. >Mar 18 11:01:01 spectre systemd[1]: Started User Manager for UID 0. >Mar 18 11:01:01 spectre CROND[3191]: (root) CMD (run-parts /etc/cron.hourly) >Mar 18 11:01:01 spectre run-parts[3196]: (/etc/cron.hourly) starting 0anacron >Mar 18 11:01:01 spectre run-parts[3204]: (/etc/cron.hourly) finished 0anacron >Mar 18 11:01:01 spectre run-parts[3206]: (/etc/cron.hourly) starting mcelog.cron >Mar 18 11:01:01 spectre run-parts[3212]: (/etc/cron.hourly) finished mcelog.cron >Mar 18 11:01:01 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 18 11:01:01 spectre systemd[3177]: Stopping Default. >Mar 18 11:01:01 spectre systemd[3177]: Stopped target Default. >Mar 18 11:01:01 spectre systemd[3177]: Stopping Basic System. >Mar 18 11:01:01 spectre systemd[3177]: Stopped target Basic System. >Mar 18 11:01:01 spectre systemd[3177]: Stopping Paths. >Mar 18 11:01:01 spectre systemd[3177]: Stopped target Paths. >Mar 18 11:01:01 spectre systemd[3177]: Stopping Timers. >Mar 18 11:01:01 spectre systemd[3177]: Stopped target Timers. >Mar 18 11:01:01 spectre systemd[3177]: Stopping Sockets. >Mar 18 11:01:01 spectre systemd[3177]: Stopped target Sockets. >Mar 18 11:01:01 spectre systemd[3177]: Starting Shutdown. >Mar 18 11:01:01 spectre systemd[3177]: Reached target Shutdown. >Mar 18 11:01:01 spectre systemd[3177]: Starting Exit the Session... >Mar 18 11:01:01 spectre systemd[3177]: Received SIGRTMIN+24 from PID 3219 (kill). >Mar 18 11:01:01 spectre systemd[3187]: pam_unix(systemd-user:session): session closed for user root >Mar 18 11:01:01 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 18 11:01:01 spectre systemd[1]: Stopping user-0.slice. >Mar 18 11:01:01 spectre systemd[1]: Removed slice user-0.slice. >Mar 18 11:01:01 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 18 11:01:01 spectre systemd-logind[635]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 18 11:01:01 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 18 11:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 18 11:01:01 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 18 11:01:01 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 18 11:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 18 11:01:01 spectre setroubleshoot[3235]: RunFaultServer(10) >Mar 18 11:01:01 spectre setroubleshoot[3235]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 18 11:01:01 spectre setroubleshoot[3235]: database version 3.0 compatible with current 3.0 version >Mar 18 11:01:01 spectre setroubleshoot[3235]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 11:01:01 spectre setroubleshoot[3235]: Number of Plugins = 46 >Mar 18 11:01:01 spectre setroubleshoot[3235]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 18 11:01:01 spectre setroubleshoot[3235]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 18 11:01:01 spectre setroubleshoot[3235]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 18 11:01:01 spectre setroubleshoot[3235]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 18 11:01:01 spectre setroubleshoot[3235]: dbus avc(node=spectre type=AVC msg=audit(1395154861.375:809): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395154861.375:809): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528d540 a1=f0800 a2=0 a3=7fa912e81680 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395154861.375:809): >) called: 1 Connections >Mar 18 11:01:01 spectre setroubleshoot[3235]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395154861.375:809): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 18 11:01:01 spectre setroubleshoot[3235]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395154861.375:809): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528d540 a1=f0800 a2=0 a3=7fa912e81680 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 11:01:01 spectre setroubleshoot[3235]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395154861.375:809): >Mar 18 11:01:01 spectre setroubleshoot[3235]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 18 11:01:01 spectre setroubleshoot[3235]: dbus avc(node=spectre type=AVC msg=audit(1395154861.375:810): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395154861.375:810): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528d540 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395154861.375:810): >) called: 1 Connections >Mar 18 11:01:01 spectre setroubleshoot[3235]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395154861.375:810): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 18 11:01:01 spectre setroubleshoot[3235]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395154861.375:810): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528d540 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 11:01:01 spectre setroubleshoot[3235]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395154861.375:810): >Mar 18 11:01:01 spectre setroubleshoot[3235]: dbus avc(node=spectre type=AVC msg=audit(1395154861.376:811): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395154861.376:811): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528d540 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395154861.376:811): >) called: 1 Connections >Mar 18 11:01:01 spectre setroubleshoot[3235]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395154861.376:811): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 18 11:01:01 spectre setroubleshoot[3235]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395154861.376:811): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528d540 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 11:01:01 spectre setroubleshoot[3235]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395154861.376:811): >Mar 18 11:01:02 spectre setroubleshoot[3235]: Plugin Exception restorecon_source >Mar 18 11:01:02 spectre setroubleshoot[3235]: Plugin Exception restorecon >Mar 18 11:01:02 spectre setroubleshoot[3235]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 11:01:02 spectre setroubleshoot[3235]: signature found in database >Mar 18 11:01:02 spectre setroubleshoot[3235]: sending alert to all clients >Mar 18 11:01:02 spectre setroubleshoot[3235]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.restorecon_source previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.rsync_data previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.kernel_modules previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.bind_ports previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.allow_execheap previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.cvs_data previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.catchall previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.wine previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.catchall_labels previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.samba_share previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.sys_module previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.allow_execmod previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.file previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.sys_resource previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.mmap_zero previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.openvpn previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.mozplugger previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.setenforce previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.dac_override previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.public_content previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.associate previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.xen_image previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.chrome previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.leaks previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.sshd_root previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.mounton previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.allow_execstack previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.restorecon previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.swapfile previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.connect_ports previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.vbetool previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.device previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 18 11:01:02 spectre python[3235]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 11:01:02 spectre setroubleshoot[3235]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 11:01:02 spectre setroubleshoot[3235]: signature found in database >Mar 18 11:01:02 spectre setroubleshoot[3235]: sending alert to all clients >Mar 18 11:01:02 spectre setroubleshoot[3235]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.restorecon_source previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.rsync_data previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.kernel_modules previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.bind_ports previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.allow_execheap previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.cvs_data previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.catchall previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.wine previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.catchall_labels previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.samba_share previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.sys_module previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.allow_execmod previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.file previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.sys_resource previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.mmap_zero previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.openvpn previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.mozplugger previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.setenforce previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.dac_override previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.public_content previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.associate previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.xen_image previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.chrome previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.leaks previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.sshd_root previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.mounton previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.allow_execstack previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.restorecon previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.swapfile previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.connect_ports previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.vbetool previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.device previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 18 11:01:02 spectre python[3235]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 11:01:02 spectre setroubleshoot[3235]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 11:01:02 spectre setroubleshoot[3235]: signature found in database >Mar 18 11:01:02 spectre setroubleshoot[3235]: sending alert to all clients >Mar 18 11:01:02 spectre setroubleshoot[3235]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.restorecon_source previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.rsync_data previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.kernel_modules previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.bind_ports previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.allow_execheap previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.cvs_data previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.catchall previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.wine previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.catchall_labels previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.samba_share previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.sys_module previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.allow_execmod previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.file previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.sys_resource previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.mmap_zero previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.openvpn previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.mozplugger previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.setenforce previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.dac_override previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.public_content previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.associate previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.xen_image previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.chrome previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.leaks previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.sshd_root previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.mounton previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.allow_execstack previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.restorecon previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.swapfile previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.connect_ports previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.vbetool previously imported >Mar 18 11:01:02 spectre setroubleshoot[3235]: load_plugins() plugins.device previously imported >Mar 18 11:01:02 spectre python[3235]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 11:01:12 spectre setroubleshoot[3235]: received signal=14 >Mar 18 11:01:12 spectre setroubleshoot[3235]: KeyboardInterrupt in RunFaultServer >Mar 18 11:01:12 spectre setroubleshoot[3235]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 18 11:01:12 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 18 11:01:12 spectre dbus-daemon[637]: string index out of range >Mar 18 11:12:48 spectre systemd[1]: Starting dnf makecache... >Mar 18 11:12:48 spectre dnf[3323]: Config time: 0.006 >Mar 18 11:12:48 spectre dnf[3323]: cachedir: /var/cache/dnf/x86_64/21 >Mar 18 11:12:48 spectre dnf[3323]: dnf version: 0.4.17 >Mar 18 11:12:48 spectre dnf[3323]: Making cache files for all metadata files. >Mar 18 11:12:48 spectre dnf[3323]: Metadata cache refreshed recently. >Mar 18 11:12:48 spectre systemd[1]: Started dnf makecache. >Mar 18 11:13:19 spectre sshd[2843]: Received disconnect from 192.168.100.1: 11: disconnected by user >Mar 18 11:13:19 spectre sshd[2839]: pam_unix(sshd:session): session closed for user dshea >Mar 18 11:13:19 spectre systemd-logind[635]: Removed session 23. >Mar 18 11:34:13 spectre sshd[2681]: Received disconnect from 192.168.100.1: 11: disconnected by user >Mar 18 11:34:13 spectre sshd[2664]: pam_unix(sshd:session): session closed for user dshea >Mar 18 11:34:13 spectre systemd-logind[635]: Removed session 22. >Mar 18 11:34:13 spectre systemd[1]: Stopping User Manager for UID 1000... >Mar 18 11:34:13 spectre systemd[2667]: Stopping Default. >Mar 18 11:34:13 spectre systemd[2667]: Stopped target Default. >Mar 18 11:34:13 spectre systemd[2667]: Stopping Basic System. >Mar 18 11:34:13 spectre systemd[2667]: Stopped target Basic System. >Mar 18 11:34:13 spectre systemd[2667]: Stopping Paths. >Mar 18 11:34:13 spectre systemd[2667]: Stopped target Paths. >Mar 18 11:34:13 spectre systemd[2667]: Stopping Timers. >Mar 18 11:34:13 spectre systemd[2667]: Stopped target Timers. >Mar 18 11:34:13 spectre systemd[2667]: Stopping Sockets. >Mar 18 11:34:13 spectre systemd[2667]: Stopped target Sockets. >Mar 18 11:34:13 spectre systemd[2667]: Starting Shutdown. >Mar 18 11:34:13 spectre systemd[2667]: Reached target Shutdown. >Mar 18 11:34:13 spectre systemd[2667]: Starting Exit the Session... >Mar 18 11:34:13 spectre systemd[2667]: Received SIGRTMIN+24 from PID 3400 (kill). >Mar 18 11:34:13 spectre systemd[1]: Stopped User Manager for UID 1000. >Mar 18 11:34:13 spectre systemd[1]: Stopping user-1000.slice. >Mar 18 11:34:13 spectre systemd[1]: Removed slice user-1000.slice. >Mar 18 11:34:13 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/1000: Permission denied >Mar 18 11:34:13 spectre systemd-logind[635]: Failed to unmount user runtime directory /run/user/1000: Permission denied >Mar 18 11:34:13 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/1000: Permission denied >Mar 18 11:34:13 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 18 11:34:13 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 18 11:34:14 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 18 11:34:14 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 18 11:34:14 spectre setroubleshoot[3409]: RunFaultServer(10) >Mar 18 11:34:14 spectre setroubleshoot[3409]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 18 11:34:14 spectre setroubleshoot[3409]: database version 3.0 compatible with current 3.0 version >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 11:34:14 spectre setroubleshoot[3409]: Number of Plugins = 46 >Mar 18 11:34:14 spectre setroubleshoot[3409]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 18 11:34:14 spectre setroubleshoot[3409]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 18 11:34:14 spectre setroubleshoot[3409]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 18 11:34:14 spectre setroubleshoot[3409]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 18 11:34:14 spectre setroubleshoot[3409]: dbus avc(node=spectre type=AVC msg=audit(1395156853.896:829): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=29033 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395156853.896:829): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528cbd0 a1=f0800 a2=0 a3=fffffffffffff7e8 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395156853.896:829): >) called: 1 Connections >Mar 18 11:34:14 spectre setroubleshoot[3409]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395156853.896:829): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=29033 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 18 11:34:14 spectre setroubleshoot[3409]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395156853.896:829): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528cbd0 a1=f0800 a2=0 a3=fffffffffffff7e8 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 11:34:14 spectre setroubleshoot[3409]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395156853.896:829): >Mar 18 11:34:14 spectre setroubleshoot[3409]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 18 11:34:14 spectre setroubleshoot[3409]: dbus avc(node=spectre type=AVC msg=audit(1395156853.896:830): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395156853.896:830): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528cbd0 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395156853.896:830): >) called: 1 Connections >Mar 18 11:34:14 spectre setroubleshoot[3409]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395156853.896:830): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 18 11:34:14 spectre setroubleshoot[3409]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395156853.896:830): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528cbd0 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 11:34:14 spectre setroubleshoot[3409]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395156853.896:830): >Mar 18 11:34:14 spectre setroubleshoot[3409]: dbus avc(node=spectre type=AVC msg=audit(1395156853.896:831): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=29033 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395156853.896:831): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528cbd0 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395156853.896:831): >) called: 1 Connections >Mar 18 11:34:14 spectre setroubleshoot[3409]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395156853.896:831): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=29033 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 18 11:34:14 spectre setroubleshoot[3409]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395156853.896:831): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528cbd0 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 11:34:14 spectre setroubleshoot[3409]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395156853.896:831): >Mar 18 11:34:14 spectre setroubleshoot[3409]: Plugin Exception restorecon_source >Mar 18 11:34:14 spectre setroubleshoot[3409]: Plugin Exception restorecon >Mar 18 11:34:14 spectre setroubleshoot[3409]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 11:34:14 spectre setroubleshoot[3409]: signature found in database >Mar 18 11:34:14 spectre setroubleshoot[3409]: sending alert to all clients >Mar 18 11:34:14 spectre setroubleshoot[3409]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.restorecon_source previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.rsync_data previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.kernel_modules previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.bind_ports previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.allow_execheap previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.cvs_data previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.catchall previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.wine previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.catchall_labels previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.samba_share previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.sys_module previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.allow_execmod previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.file previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.sys_resource previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.mmap_zero previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.openvpn previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.mozplugger previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.setenforce previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.dac_override previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.public_content previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.associate previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.xen_image previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.chrome previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.leaks previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.sshd_root previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.mounton previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.allow_execstack previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.restorecon previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.swapfile previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.connect_ports previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.vbetool previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.device previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 18 11:34:14 spectre python[3409]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 11:34:14 spectre setroubleshoot[3409]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 11:34:14 spectre setroubleshoot[3409]: signature found in database >Mar 18 11:34:14 spectre setroubleshoot[3409]: sending alert to all clients >Mar 18 11:34:14 spectre setroubleshoot[3409]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.restorecon_source previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.rsync_data previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.kernel_modules previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.bind_ports previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.allow_execheap previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.cvs_data previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.catchall previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.wine previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.catchall_labels previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.samba_share previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.sys_module previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.allow_execmod previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.file previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.sys_resource previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.mmap_zero previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.openvpn previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.mozplugger previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.setenforce previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.dac_override previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.public_content previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.associate previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.xen_image previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.chrome previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.leaks previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.sshd_root previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.mounton previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.allow_execstack previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.restorecon previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.swapfile previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.connect_ports previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.vbetool previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.device previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 18 11:34:14 spectre python[3409]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 11:34:14 spectre setroubleshoot[3409]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 11:34:14 spectre setroubleshoot[3409]: signature found in database >Mar 18 11:34:14 spectre setroubleshoot[3409]: sending alert to all clients >Mar 18 11:34:14 spectre setroubleshoot[3409]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.restorecon_source previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.rsync_data previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.kernel_modules previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.bind_ports previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.allow_execheap previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.cvs_data previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.catchall previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.wine previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.catchall_labels previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.samba_share previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.sys_module previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.allow_execmod previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.file previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.sys_resource previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.mmap_zero previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.openvpn previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.mozplugger previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.setenforce previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.dac_override previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.public_content previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.associate previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.xen_image previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.chrome previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.leaks previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.sshd_root previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.mounton previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.allow_execstack previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.restorecon previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.swapfile previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.connect_ports previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.vbetool previously imported >Mar 18 11:34:14 spectre setroubleshoot[3409]: load_plugins() plugins.device previously imported >Mar 18 11:34:14 spectre python[3409]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 11:34:24 spectre setroubleshoot[3409]: received signal=14 >Mar 18 11:34:24 spectre setroubleshoot[3409]: KeyboardInterrupt in RunFaultServer >Mar 18 11:34:24 spectre setroubleshoot[3409]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 18 11:34:24 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 18 11:34:24 spectre dbus-daemon[637]: string index out of range >Mar 18 11:58:39 spectre sshd[3482]: Accepted publickey for dshea from 192.168.100.1 port 44322 ssh2: RSA 29:71:d3:be:dc:71:8e:0d:ef:a5:2f:ab:31:0c:82:d4 >Mar 18 11:58:39 spectre systemd[1]: Starting user-1000.slice. >Mar 18 11:58:39 spectre systemd[1]: Created slice user-1000.slice. >Mar 18 11:58:39 spectre systemd-logind[635]: New session 26 of user dshea. >Mar 18 11:58:39 spectre systemd[1]: Starting Session 26 of user dshea. >Mar 18 11:58:39 spectre systemd[1]: Started Session 26 of user dshea. >Mar 18 11:58:39 spectre systemd[1]: Starting User Manager for UID 1000... >Mar 18 11:58:39 spectre systemd[3486]: pam_unix(systemd-user:session): session opened for user dshea by (uid=0) >Mar 18 11:58:39 spectre systemd[3486]: Starting Paths. >Mar 18 11:58:39 spectre systemd[3486]: Reached target Paths. >Mar 18 11:58:39 spectre systemd[3486]: Starting Timers. >Mar 18 11:58:39 spectre systemd[3486]: Reached target Timers. >Mar 18 11:58:39 spectre systemd[3486]: Starting Sockets. >Mar 18 11:58:39 spectre systemd[3486]: Reached target Sockets. >Mar 18 11:58:39 spectre systemd[3486]: Starting Basic System. >Mar 18 11:58:39 spectre systemd[3486]: Reached target Basic System. >Mar 18 11:58:39 spectre systemd[3486]: Starting Default. >Mar 18 11:58:39 spectre systemd[3486]: Reached target Default. >Mar 18 11:58:39 spectre systemd[3486]: Startup finished in 11ms. >Mar 18 11:58:39 spectre systemd[1]: Started User Manager for UID 1000. >Mar 18 11:58:39 spectre sshd[3482]: pam_unix(sshd:session): session opened for user dshea by (uid=0) >Mar 18 12:01:01 spectre systemd[1]: Starting user-0.slice. >Mar 18 12:01:01 spectre systemd[1]: Created slice user-0.slice. >Mar 18 12:01:01 spectre systemd[1]: Starting User Manager for UID 0... >Mar 18 12:01:01 spectre systemd[1]: Starting Session 27 of user root. >Mar 18 12:01:01 spectre systemd[1]: Started Session 27 of user root. >Mar 18 12:01:01 spectre systemd[3819]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 18 12:01:01 spectre systemd[3819]: Starting Paths. >Mar 18 12:01:01 spectre systemd[3819]: Reached target Paths. >Mar 18 12:01:01 spectre systemd[3819]: Starting Timers. >Mar 18 12:01:01 spectre systemd[3819]: Reached target Timers. >Mar 18 12:01:01 spectre systemd[3819]: Starting Sockets. >Mar 18 12:01:01 spectre systemd[3819]: Reached target Sockets. >Mar 18 12:01:01 spectre systemd[3819]: Starting Basic System. >Mar 18 12:01:01 spectre systemd[3819]: Reached target Basic System. >Mar 18 12:01:01 spectre systemd[3819]: Starting Default. >Mar 18 12:01:01 spectre systemd[3819]: Reached target Default. >Mar 18 12:01:01 spectre systemd[3819]: Startup finished in 9ms. >Mar 18 12:01:01 spectre systemd[1]: Started User Manager for UID 0. >Mar 18 12:01:01 spectre CROND[3831]: (root) CMD (run-parts /etc/cron.hourly) >Mar 18 12:01:01 spectre run-parts[3836]: (/etc/cron.hourly) starting 0anacron >Mar 18 12:01:01 spectre run-parts[3843]: (/etc/cron.hourly) finished 0anacron >Mar 18 12:01:01 spectre run-parts[3846]: (/etc/cron.hourly) starting mcelog.cron >Mar 18 12:01:01 spectre run-parts[3851]: (/etc/cron.hourly) finished mcelog.cron >Mar 18 12:01:01 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 18 12:01:01 spectre systemd[3819]: Stopping Default. >Mar 18 12:01:01 spectre systemd[3819]: Stopped target Default. >Mar 18 12:01:01 spectre systemd[3819]: Stopping Basic System. >Mar 18 12:01:01 spectre systemd[3819]: Stopped target Basic System. >Mar 18 12:01:01 spectre systemd[3819]: Stopping Paths. >Mar 18 12:01:01 spectre systemd[3819]: Stopped target Paths. >Mar 18 12:01:01 spectre systemd[3819]: Stopping Timers. >Mar 18 12:01:01 spectre systemd[3819]: Stopped target Timers. >Mar 18 12:01:01 spectre systemd[3819]: Stopping Sockets. >Mar 18 12:01:01 spectre systemd[3819]: Stopped target Sockets. >Mar 18 12:01:01 spectre systemd[3819]: Starting Shutdown. >Mar 18 12:01:01 spectre systemd[3819]: Reached target Shutdown. >Mar 18 12:01:01 spectre systemd[3819]: Starting Exit the Session... >Mar 18 12:01:01 spectre systemd[3819]: Received SIGRTMIN+24 from PID 3857 (kill). >Mar 18 12:01:01 spectre systemd[3826]: pam_unix(systemd-user:session): session closed for user root >Mar 18 12:01:01 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 18 12:01:01 spectre systemd[1]: Stopping user-0.slice. >Mar 18 12:01:01 spectre systemd[1]: Removed slice user-0.slice. >Mar 18 12:01:01 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 18 12:01:01 spectre systemd-logind[635]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 18 12:01:01 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 18 12:01:01 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 18 12:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 18 12:01:01 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 18 12:01:01 spectre setroubleshoot[3869]: RunFaultServer(10) >Mar 18 12:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 18 12:01:02 spectre setroubleshoot[3869]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 18 12:01:02 spectre setroubleshoot[3869]: database version 3.0 compatible with current 3.0 version >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 12:01:02 spectre setroubleshoot[3869]: Number of Plugins = 46 >Mar 18 12:01:02 spectre setroubleshoot[3869]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 18 12:01:02 spectre setroubleshoot[3869]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 18 12:01:02 spectre setroubleshoot[3869]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 18 12:01:02 spectre setroubleshoot[3869]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 18 12:01:02 spectre setroubleshoot[3869]: dbus avc(node=spectre type=AVC msg=audit(1395158461.544:866): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395158461.544:866): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528fb20 a1=f0800 a2=0 a3=7fa912e81680 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395158461.544:866): >) called: 1 Connections >Mar 18 12:01:02 spectre setroubleshoot[3869]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395158461.544:866): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 18 12:01:02 spectre setroubleshoot[3869]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395158461.544:866): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528fb20 a1=f0800 a2=0 a3=7fa912e81680 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 12:01:02 spectre setroubleshoot[3869]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395158461.544:866): >Mar 18 12:01:02 spectre setroubleshoot[3869]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 18 12:01:02 spectre setroubleshoot[3869]: dbus avc(node=spectre type=AVC msg=audit(1395158461.544:867): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395158461.544:867): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528fb20 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395158461.544:867): >) called: 1 Connections >Mar 18 12:01:02 spectre setroubleshoot[3869]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395158461.544:867): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 18 12:01:02 spectre setroubleshoot[3869]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395158461.544:867): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528fb20 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 12:01:02 spectre setroubleshoot[3869]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395158461.544:867): >Mar 18 12:01:02 spectre setroubleshoot[3869]: dbus avc(node=spectre type=AVC msg=audit(1395158461.545:868): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395158461.545:868): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528fb20 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395158461.545:868): >) called: 1 Connections >Mar 18 12:01:02 spectre setroubleshoot[3869]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395158461.545:868): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 18 12:01:02 spectre setroubleshoot[3869]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395158461.545:868): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528fb20 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 12:01:02 spectre setroubleshoot[3869]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395158461.545:868): >Mar 18 12:01:02 spectre setroubleshoot[3869]: Plugin Exception restorecon_source >Mar 18 12:01:02 spectre setroubleshoot[3869]: Plugin Exception restorecon >Mar 18 12:01:02 spectre setroubleshoot[3869]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 12:01:02 spectre setroubleshoot[3869]: signature found in database >Mar 18 12:01:02 spectre setroubleshoot[3869]: sending alert to all clients >Mar 18 12:01:02 spectre setroubleshoot[3869]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.restorecon_source previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.rsync_data previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.kernel_modules previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.bind_ports previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.allow_execheap previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.cvs_data previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.catchall previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.wine previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.catchall_labels previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.samba_share previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.sys_module previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.allow_execmod previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.file previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.sys_resource previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.mmap_zero previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.openvpn previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.mozplugger previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.setenforce previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.dac_override previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.public_content previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.associate previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.xen_image previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.chrome previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.leaks previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.sshd_root previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.mounton previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.allow_execstack previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.restorecon previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.swapfile previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.connect_ports previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.vbetool previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.device previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 18 12:01:02 spectre python[3869]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 12:01:02 spectre setroubleshoot[3869]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 12:01:02 spectre setroubleshoot[3869]: signature found in database >Mar 18 12:01:02 spectre setroubleshoot[3869]: sending alert to all clients >Mar 18 12:01:02 spectre setroubleshoot[3869]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.restorecon_source previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.rsync_data previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.kernel_modules previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.bind_ports previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.allow_execheap previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.cvs_data previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.catchall previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.wine previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.catchall_labels previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.samba_share previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.sys_module previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.allow_execmod previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.file previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.sys_resource previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.mmap_zero previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.openvpn previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.mozplugger previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.setenforce previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.dac_override previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.public_content previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.associate previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.xen_image previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.chrome previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.leaks previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.sshd_root previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.mounton previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.allow_execstack previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.restorecon previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.swapfile previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.connect_ports previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.vbetool previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.device previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 18 12:01:02 spectre python[3869]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 12:01:02 spectre setroubleshoot[3869]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 12:01:02 spectre setroubleshoot[3869]: signature found in database >Mar 18 12:01:02 spectre setroubleshoot[3869]: sending alert to all clients >Mar 18 12:01:02 spectre setroubleshoot[3869]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.restorecon_source previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.rsync_data previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.kernel_modules previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.bind_ports previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.allow_execheap previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.cvs_data previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.catchall previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.wine previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.catchall_labels previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.samba_share previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.sys_module previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.allow_execmod previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.file previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.sys_resource previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.mmap_zero previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.openvpn previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.mozplugger previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.setenforce previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.dac_override previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.public_content previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.associate previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.xen_image previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.chrome previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.leaks previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.sshd_root previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.mounton previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.allow_execstack previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.restorecon previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.swapfile previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.connect_ports previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.vbetool previously imported >Mar 18 12:01:02 spectre setroubleshoot[3869]: load_plugins() plugins.device previously imported >Mar 18 12:01:02 spectre python[3869]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 12:01:12 spectre setroubleshoot[3869]: received signal=14 >Mar 18 12:01:12 spectre setroubleshoot[3869]: KeyboardInterrupt in RunFaultServer >Mar 18 12:01:12 spectre setroubleshoot[3869]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 18 12:01:12 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 18 12:01:12 spectre dbus-daemon[637]: string index out of range >Mar 18 12:12:49 spectre systemd[1]: Starting dnf makecache... >Mar 18 12:12:50 spectre dnf[3944]: Config time: 0.006 >Mar 18 12:12:50 spectre dnf[3944]: cachedir: /var/cache/dnf/x86_64/21 >Mar 18 12:12:50 spectre dnf[3944]: dnf version: 0.4.17 >Mar 18 12:12:50 spectre dnf[3944]: Making cache files for all metadata files. >Mar 18 12:12:50 spectre dnf[3944]: Metadata cache refreshed recently. >Mar 18 12:12:50 spectre systemd[1]: Started dnf makecache. >Mar 18 13:01:01 spectre systemd[1]: Starting user-0.slice. >Mar 18 13:01:01 spectre systemd[1]: Created slice user-0.slice. >Mar 18 13:01:01 spectre systemd[1]: Starting User Manager for UID 0... >Mar 18 13:01:01 spectre systemd[1]: Starting Session 28 of user root. >Mar 18 13:01:01 spectre systemd[1]: Started Session 28 of user root. >Mar 18 13:01:01 spectre systemd[3955]: Starting Paths. >Mar 18 13:01:01 spectre systemd[3955]: Reached target Paths. >Mar 18 13:01:01 spectre systemd[3955]: Starting Timers. >Mar 18 13:01:01 spectre systemd[3955]: Reached target Timers. >Mar 18 13:01:01 spectre systemd[3955]: Starting Sockets. >Mar 18 13:01:01 spectre systemd[3955]: Reached target Sockets. >Mar 18 13:01:01 spectre systemd[3955]: Starting Basic System. >Mar 18 13:01:01 spectre systemd[3955]: Reached target Basic System. >Mar 18 13:01:01 spectre systemd[3955]: Starting Default. >Mar 18 13:01:01 spectre systemd[3955]: Reached target Default. >Mar 18 13:01:01 spectre systemd[3955]: Startup finished in 28ms. >Mar 18 13:01:01 spectre systemd[1]: Started User Manager for UID 0. >Mar 18 13:01:01 spectre systemd[3955]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 18 13:01:01 spectre CROND[3971]: (root) CMD (run-parts /etc/cron.hourly) >Mar 18 13:01:01 spectre run-parts[3975]: (/etc/cron.hourly) starting 0anacron >Mar 18 13:01:01 spectre run-parts[3983]: (/etc/cron.hourly) finished 0anacron >Mar 18 13:01:01 spectre run-parts[3986]: (/etc/cron.hourly) starting mcelog.cron >Mar 18 13:01:01 spectre run-parts[3991]: (/etc/cron.hourly) finished mcelog.cron >Mar 18 13:01:01 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 18 13:01:01 spectre systemd[3955]: Stopping Default. >Mar 18 13:01:01 spectre systemd[3955]: Stopped target Default. >Mar 18 13:01:01 spectre systemd[3955]: Stopping Basic System. >Mar 18 13:01:01 spectre systemd[3955]: Stopped target Basic System. >Mar 18 13:01:01 spectre systemd[3955]: Stopping Paths. >Mar 18 13:01:01 spectre systemd[3955]: Stopped target Paths. >Mar 18 13:01:01 spectre systemd[3955]: Stopping Timers. >Mar 18 13:01:01 spectre systemd[3955]: Stopped target Timers. >Mar 18 13:01:01 spectre systemd[3955]: Stopping Sockets. >Mar 18 13:01:01 spectre systemd[3955]: Stopped target Sockets. >Mar 18 13:01:01 spectre systemd[3955]: Starting Shutdown. >Mar 18 13:01:01 spectre systemd[3955]: Reached target Shutdown. >Mar 18 13:01:01 spectre systemd[3955]: Starting Exit the Session... >Mar 18 13:01:01 spectre systemd[3955]: Received SIGRTMIN+24 from PID 3996 (kill). >Mar 18 13:01:01 spectre systemd[3964]: pam_unix(systemd-user:session): session closed for user root >Mar 18 13:01:01 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 18 13:01:01 spectre systemd[1]: Stopping user-0.slice. >Mar 18 13:01:01 spectre systemd[1]: Removed slice user-0.slice. >Mar 18 13:01:01 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 18 13:01:01 spectre systemd-logind[635]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 18 13:01:01 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 18 13:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 18 13:01:01 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 18 13:01:02 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 18 13:01:02 spectre setroubleshoot[4007]: RunFaultServer(10) >Mar 18 13:01:02 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 18 13:01:02 spectre setroubleshoot[4007]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 18 13:01:02 spectre setroubleshoot[4007]: database version 3.0 compatible with current 3.0 version >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 13:01:02 spectre setroubleshoot[4007]: Number of Plugins = 46 >Mar 18 13:01:02 spectre setroubleshoot[4007]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 18 13:01:02 spectre setroubleshoot[4007]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 18 13:01:02 spectre setroubleshoot[4007]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 18 13:01:02 spectre setroubleshoot[4007]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 18 13:01:02 spectre setroubleshoot[4007]: dbus avc(node=spectre type=AVC msg=audit(1395162061.717:883): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395162061.717:883): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528b170 a1=f0800 a2=0 a3=7fa912e81680 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395162061.717:883): >) called: 1 Connections >Mar 18 13:01:02 spectre setroubleshoot[4007]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395162061.717:883): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 18 13:01:02 spectre setroubleshoot[4007]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395162061.717:883): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528b170 a1=f0800 a2=0 a3=7fa912e81680 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 13:01:02 spectre setroubleshoot[4007]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395162061.717:883): >Mar 18 13:01:02 spectre setroubleshoot[4007]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 18 13:01:02 spectre setroubleshoot[4007]: dbus avc(node=spectre type=AVC msg=audit(1395162061.717:884): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395162061.717:884): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528b170 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395162061.717:884): >) called: 1 Connections >Mar 18 13:01:02 spectre setroubleshoot[4007]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395162061.717:884): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 18 13:01:02 spectre setroubleshoot[4007]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395162061.717:884): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528b170 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 13:01:02 spectre setroubleshoot[4007]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395162061.717:884): >Mar 18 13:01:02 spectre setroubleshoot[4007]: dbus avc(node=spectre type=AVC msg=audit(1395162061.717:885): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395162061.717:885): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528b170 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395162061.717:885): >) called: 1 Connections >Mar 18 13:01:02 spectre setroubleshoot[4007]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395162061.717:885): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 18 13:01:02 spectre setroubleshoot[4007]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395162061.717:885): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528b170 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 13:01:02 spectre setroubleshoot[4007]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395162061.717:885): >Mar 18 13:01:02 spectre setroubleshoot[4007]: Plugin Exception restorecon_source >Mar 18 13:01:02 spectre setroubleshoot[4007]: Plugin Exception restorecon >Mar 18 13:01:02 spectre setroubleshoot[4007]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 13:01:02 spectre setroubleshoot[4007]: signature found in database >Mar 18 13:01:02 spectre setroubleshoot[4007]: sending alert to all clients >Mar 18 13:01:02 spectre setroubleshoot[4007]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.restorecon_source previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.rsync_data previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.kernel_modules previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.bind_ports previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.allow_execheap previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.cvs_data previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.catchall previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.wine previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.catchall_labels previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.samba_share previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.sys_module previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.allow_execmod previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.file previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.sys_resource previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.mmap_zero previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.openvpn previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.mozplugger previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.setenforce previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.dac_override previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.public_content previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.associate previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.xen_image previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.chrome previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.leaks previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.sshd_root previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.mounton previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.allow_execstack previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.restorecon previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.swapfile previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.connect_ports previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.vbetool previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.device previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 18 13:01:02 spectre python[4007]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 13:01:02 spectre setroubleshoot[4007]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 13:01:02 spectre setroubleshoot[4007]: signature found in database >Mar 18 13:01:02 spectre setroubleshoot[4007]: sending alert to all clients >Mar 18 13:01:02 spectre setroubleshoot[4007]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.restorecon_source previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.rsync_data previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.kernel_modules previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.bind_ports previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.allow_execheap previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.cvs_data previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.catchall previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.wine previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.catchall_labels previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.samba_share previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.sys_module previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.allow_execmod previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.file previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.sys_resource previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.mmap_zero previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.openvpn previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.mozplugger previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.setenforce previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.dac_override previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.public_content previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.associate previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.xen_image previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.chrome previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.leaks previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.sshd_root previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.mounton previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.allow_execstack previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.restorecon previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.swapfile previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.connect_ports previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.vbetool previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.device previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 18 13:01:02 spectre python[4007]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 13:01:02 spectre setroubleshoot[4007]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 13:01:02 spectre setroubleshoot[4007]: signature found in database >Mar 18 13:01:02 spectre setroubleshoot[4007]: sending alert to all clients >Mar 18 13:01:02 spectre setroubleshoot[4007]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.restorecon_source previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.rsync_data previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.kernel_modules previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.bind_ports previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.allow_execheap previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.cvs_data previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.catchall previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.wine previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.catchall_labels previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.samba_share previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.sys_module previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.allow_execmod previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.file previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.sys_resource previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.mmap_zero previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.openvpn previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.mozplugger previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.setenforce previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.dac_override previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.public_content previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.associate previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.xen_image previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.chrome previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.leaks previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.sshd_root previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.mounton previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.allow_execstack previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.restorecon previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.swapfile previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.connect_ports previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.vbetool previously imported >Mar 18 13:01:02 spectre setroubleshoot[4007]: load_plugins() plugins.device previously imported >Mar 18 13:01:02 spectre python[4007]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 13:01:12 spectre setroubleshoot[4007]: received signal=14 >Mar 18 13:01:12 spectre setroubleshoot[4007]: KeyboardInterrupt in RunFaultServer >Mar 18 13:01:12 spectre setroubleshoot[4007]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 18 13:01:12 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 18 13:01:12 spectre dbus-daemon[637]: string index out of range >Mar 18 13:04:47 spectre sshd[4102]: Accepted publickey for dshea from 192.168.100.1 port 44455 ssh2: RSA 29:71:d3:be:dc:71:8e:0d:ef:a5:2f:ab:31:0c:82:d4 >Mar 18 13:04:47 spectre systemd-logind[635]: New session 29 of user dshea. >Mar 18 13:04:47 spectre systemd[1]: Starting Session 29 of user dshea. >Mar 18 13:04:47 spectre systemd[1]: Started Session 29 of user dshea. >Mar 18 13:04:47 spectre sshd[4102]: pam_unix(sshd:session): session opened for user dshea by (uid=0) >Mar 18 13:12:13 spectre sshd[4201]: Accepted publickey for dshea from 192.168.100.1 port 44495 ssh2: RSA 29:71:d3:be:dc:71:8e:0d:ef:a5:2f:ab:31:0c:82:d4 >Mar 18 13:12:13 spectre systemd-logind[635]: New session 30 of user dshea. >Mar 18 13:12:13 spectre systemd[1]: Starting Session 30 of user dshea. >Mar 18 13:12:13 spectre systemd[1]: Started Session 30 of user dshea. >Mar 18 13:12:13 spectre sshd[4201]: pam_unix(sshd:session): session opened for user dshea by (uid=0) >Mar 18 13:12:51 spectre systemd[1]: Starting dnf makecache... >Mar 18 13:12:51 spectre dnf[8081]: Config time: 0.006 >Mar 18 13:12:51 spectre dnf[8081]: cachedir: /var/cache/dnf/x86_64/21 >Mar 18 13:12:51 spectre dnf[8081]: dnf version: 0.4.17 >Mar 18 13:12:51 spectre dnf[8081]: Making cache files for all metadata files. >Mar 18 13:12:51 spectre dnf[8081]: rawhide: will expire after 21564 seconds. >Mar 18 13:12:51 spectre dnf[8081]: repo: using cache for: rawhide >Mar 18 13:12:51 spectre dnf[8081]: hawkey sack setup time: 0.169 >Mar 18 13:12:51 spectre dnf[8081]: Metadata cache created. >Mar 18 13:12:51 spectre systemd[1]: Started dnf makecache. >Mar 18 13:17:18 spectre sshd[10435]: Accepted publickey for dshea from 192.168.100.1 port 44501 ssh2: RSA 29:71:d3:be:dc:71:8e:0d:ef:a5:2f:ab:31:0c:82:d4 >Mar 18 13:17:18 spectre systemd-logind[635]: New session 31 of user dshea. >Mar 18 13:17:18 spectre systemd[1]: Starting Session 31 of user dshea. >Mar 18 13:17:18 spectre systemd[1]: Started Session 31 of user dshea. >Mar 18 13:17:18 spectre sshd[10435]: pam_unix(sshd:session): session opened for user dshea by (uid=0) >Mar 18 13:21:19 spectre sshd[11946]: Accepted publickey for dshea from 192.168.100.1 port 44523 ssh2: RSA 29:71:d3:be:dc:71:8e:0d:ef:a5:2f:ab:31:0c:82:d4 >Mar 18 13:21:19 spectre systemd-logind[635]: New session 32 of user dshea. >Mar 18 13:21:19 spectre systemd[1]: Starting Session 32 of user dshea. >Mar 18 13:21:19 spectre systemd[1]: Started Session 32 of user dshea. >Mar 18 13:21:19 spectre sshd[11946]: pam_unix(sshd:session): session opened for user dshea by (uid=0) >Mar 18 13:26:08 spectre sshd[4204]: Received disconnect from 192.168.100.1: 11: disconnected by user >Mar 18 13:26:08 spectre sshd[4201]: pam_unix(sshd:session): session closed for user dshea >Mar 18 13:26:08 spectre systemd-logind[635]: Removed session 30. >Mar 18 13:26:09 spectre sshd[19563]: Accepted publickey for dshea from 192.168.100.1 port 44530 ssh2: RSA 29:71:d3:be:dc:71:8e:0d:ef:a5:2f:ab:31:0c:82:d4 >Mar 18 13:26:09 spectre systemd-logind[635]: New session 33 of user dshea. >Mar 18 13:26:09 spectre systemd[1]: Starting Session 33 of user dshea. >Mar 18 13:26:09 spectre systemd[1]: Started Session 33 of user dshea. >Mar 18 13:26:09 spectre sshd[19563]: pam_unix(sshd:session): session opened for user dshea by (uid=0) >Mar 18 13:27:49 spectre sshd[4105]: Received disconnect from 192.168.100.1: 11: disconnected by user >Mar 18 13:27:49 spectre sshd[4102]: pam_unix(sshd:session): session closed for user dshea >Mar 18 13:27:49 spectre systemd-logind[635]: Removed session 29. >Mar 18 13:27:50 spectre sshd[22179]: Accepted publickey for dshea from 192.168.100.1 port 44555 ssh2: RSA 29:71:d3:be:dc:71:8e:0d:ef:a5:2f:ab:31:0c:82:d4 >Mar 18 13:27:50 spectre systemd-logind[635]: New session 34 of user dshea. >Mar 18 13:27:50 spectre systemd[1]: Starting Session 34 of user dshea. >Mar 18 13:27:50 spectre systemd[1]: Started Session 34 of user dshea. >Mar 18 13:27:50 spectre sshd[22179]: pam_unix(sshd:session): session opened for user dshea by (uid=0) >Mar 18 13:27:50 spectre polkitd[685]: Terminating runaway script >Mar 18 13:27:50 spectre polkitd[685]: <no filename>:0: uncaught exception: Terminating runaway script >Mar 18 13:27:50 spectre polkitd[685]: Error evaluating authorization rules >Mar 18 13:37:47 spectre dbus-daemon[637]: dbus[637]: [system] Activating via systemd: service name='org.freedesktop.PackageKit' unit='packagekit.service' >Mar 18 13:37:47 spectre dbus[637]: [system] Activating via systemd: service name='org.freedesktop.PackageKit' unit='packagekit.service' >Mar 18 13:37:47 spectre PackageKit[22269]: daemon start >Mar 18 13:37:47 spectre systemd[1]: Starting PackageKit Daemon... >Mar 18 13:37:47 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.freedesktop.PackageKit' >Mar 18 13:37:47 spectre dbus[637]: [system] Successfully activated service 'org.freedesktop.PackageKit' >Mar 18 13:37:47 spectre systemd[1]: Started PackageKit Daemon. >Mar 18 13:37:48 spectre PackageKit[22269]: search-file transaction /197_bcacbabc from uid 1000 finished with success after 862ms >Mar 18 13:42:41 spectre sshd[5279]: Accepted publickey for dshea from 192.168.100.1 port 44716 ssh2: RSA 29:71:d3:be:dc:71:8e:0d:ef:a5:2f:ab:31:0c:82:d4 >Mar 18 13:42:41 spectre systemd[1]: Starting Session 35 of user dshea. >Mar 18 13:42:41 spectre systemd-logind[635]: New session 35 of user dshea. >Mar 18 13:42:41 spectre systemd[1]: Started Session 35 of user dshea. >Mar 18 13:42:41 spectre sshd[5279]: pam_unix(sshd:session): session opened for user dshea by (uid=0) >Mar 18 13:42:52 spectre PackageKit[22269]: daemon quit >Mar 18 13:42:54 spectre packagekitd[22269]: (packagekitd:22269): GLib-CRITICAL **: Source ID 7 was not found when attempting to remove it >Mar 18 13:50:31 spectre sshd[10825]: Accepted publickey for dshea from 192.168.100.1 port 44733 ssh2: RSA 29:71:d3:be:dc:71:8e:0d:ef:a5:2f:ab:31:0c:82:d4 >Mar 18 13:50:31 spectre systemd-logind[635]: New session 36 of user dshea. >Mar 18 13:50:31 spectre systemd[1]: Starting Session 36 of user dshea. >Mar 18 13:50:31 spectre systemd[1]: Started Session 36 of user dshea. >Mar 18 13:50:31 spectre sshd[10825]: pam_unix(sshd:session): session opened for user dshea by (uid=0) >Mar 18 13:58:17 spectre sshd[19566]: Received disconnect from 192.168.100.1: 11: disconnected by user >Mar 18 13:58:17 spectre sshd[19563]: pam_unix(sshd:session): session closed for user dshea >Mar 18 13:58:17 spectre systemd-logind[635]: Removed session 33. >Mar 18 14:01:01 spectre systemd[1]: Starting user-0.slice. >Mar 18 14:01:01 spectre systemd[1]: Created slice user-0.slice. >Mar 18 14:01:01 spectre systemd[1]: Starting User Manager for UID 0... >Mar 18 14:01:01 spectre systemd[1]: Starting Session 37 of user root. >Mar 18 14:01:01 spectre systemd[1]: Started Session 37 of user root. >Mar 18 14:01:01 spectre systemd[11029]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 18 14:01:01 spectre systemd[11029]: Starting Paths. >Mar 18 14:01:01 spectre systemd[11029]: Reached target Paths. >Mar 18 14:01:01 spectre systemd[11029]: Starting Timers. >Mar 18 14:01:01 spectre systemd[11029]: Reached target Timers. >Mar 18 14:01:01 spectre systemd[11029]: Starting Sockets. >Mar 18 14:01:01 spectre systemd[11029]: Reached target Sockets. >Mar 18 14:01:01 spectre systemd[11029]: Starting Basic System. >Mar 18 14:01:01 spectre systemd[11029]: Reached target Basic System. >Mar 18 14:01:01 spectre systemd[11029]: Starting Default. >Mar 18 14:01:01 spectre systemd[11029]: Reached target Default. >Mar 18 14:01:01 spectre systemd[11029]: Startup finished in 10ms. >Mar 18 14:01:01 spectre systemd[1]: Started User Manager for UID 0. >Mar 18 14:01:01 spectre CROND[11041]: (root) CMD (run-parts /etc/cron.hourly) >Mar 18 14:01:01 spectre run-parts[11045]: (/etc/cron.hourly) starting 0anacron >Mar 18 14:01:01 spectre run-parts[11053]: (/etc/cron.hourly) finished 0anacron >Mar 18 14:01:01 spectre run-parts[11055]: (/etc/cron.hourly) starting mcelog.cron >Mar 18 14:01:01 spectre run-parts[11060]: (/etc/cron.hourly) finished mcelog.cron >Mar 18 14:01:01 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 18 14:01:01 spectre systemd[11029]: Stopping Default. >Mar 18 14:01:01 spectre systemd[11029]: Stopped target Default. >Mar 18 14:01:01 spectre systemd[11029]: Stopping Basic System. >Mar 18 14:01:01 spectre systemd[11029]: Stopped target Basic System. >Mar 18 14:01:01 spectre systemd[11029]: Stopping Paths. >Mar 18 14:01:01 spectre systemd[11029]: Stopped target Paths. >Mar 18 14:01:01 spectre systemd[11029]: Stopping Timers. >Mar 18 14:01:01 spectre systemd[11029]: Stopped target Timers. >Mar 18 14:01:01 spectre systemd[11029]: Stopping Sockets. >Mar 18 14:01:01 spectre systemd[11029]: Stopped target Sockets. >Mar 18 14:01:01 spectre systemd[11029]: Starting Shutdown. >Mar 18 14:01:01 spectre systemd[11029]: Reached target Shutdown. >Mar 18 14:01:01 spectre systemd[11029]: Starting Exit the Session... >Mar 18 14:01:01 spectre systemd[11029]: Received SIGRTMIN+24 from PID 11066 (kill). >Mar 18 14:01:01 spectre systemd[11037]: pam_unix(systemd-user:session): session closed for user root >Mar 18 14:01:01 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 18 14:01:01 spectre systemd[1]: Stopping user-0.slice. >Mar 18 14:01:01 spectre systemd[1]: Removed slice user-0.slice. >Mar 18 14:01:01 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 18 14:01:01 spectre systemd-logind[635]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 18 14:01:01 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 18 14:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 18 14:01:01 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 18 14:01:02 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 18 14:01:02 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 18 14:01:02 spectre setroubleshoot[11075]: RunFaultServer(10) >Mar 18 14:01:02 spectre setroubleshoot[11075]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 18 14:01:02 spectre setroubleshoot[11075]: database version 3.0 compatible with current 3.0 version >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 14:01:02 spectre setroubleshoot[11075]: Number of Plugins = 46 >Mar 18 14:01:02 spectre setroubleshoot[11075]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 18 14:01:02 spectre setroubleshoot[11075]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 18 14:01:02 spectre setroubleshoot[11075]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 18 14:01:02 spectre setroubleshoot[11075]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 18 14:01:02 spectre setroubleshoot[11075]: dbus avc(node=spectre type=AVC msg=audit(1395165661.887:1075): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395165661.887:1075): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528f580 a1=f0800 a2=0 a3=fffffffffffff808 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395165661.887:1075): >) called: 1 Connections >Mar 18 14:01:02 spectre setroubleshoot[11075]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395165661.887:1075): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 18 14:01:02 spectre setroubleshoot[11075]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395165661.887:1075): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528f580 a1=f0800 a2=0 a3=fffffffffffff808 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 14:01:02 spectre setroubleshoot[11075]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395165661.887:1075): >Mar 18 14:01:02 spectre setroubleshoot[11075]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 18 14:01:02 spectre setroubleshoot[11075]: dbus avc(node=spectre type=AVC msg=audit(1395165661.887:1076): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395165661.887:1076): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528f580 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395165661.887:1076): >) called: 1 Connections >Mar 18 14:01:02 spectre setroubleshoot[11075]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395165661.887:1076): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 18 14:01:02 spectre setroubleshoot[11075]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395165661.887:1076): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528f580 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 14:01:02 spectre setroubleshoot[11075]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395165661.887:1076): >Mar 18 14:01:02 spectre setroubleshoot[11075]: dbus avc(node=spectre type=AVC msg=audit(1395165661.888:1077): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395165661.888:1077): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528f580 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395165661.888:1077): >) called: 1 Connections >Mar 18 14:01:02 spectre setroubleshoot[11075]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395165661.888:1077): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 18 14:01:02 spectre setroubleshoot[11075]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395165661.888:1077): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528f580 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 14:01:02 spectre setroubleshoot[11075]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395165661.888:1077): >Mar 18 14:01:02 spectre setroubleshoot[11075]: Plugin Exception restorecon_source >Mar 18 14:01:02 spectre setroubleshoot[11075]: Plugin Exception restorecon >Mar 18 14:01:02 spectre setroubleshoot[11075]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 14:01:02 spectre setroubleshoot[11075]: signature found in database >Mar 18 14:01:02 spectre setroubleshoot[11075]: sending alert to all clients >Mar 18 14:01:02 spectre setroubleshoot[11075]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.restorecon_source previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.rsync_data previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.kernel_modules previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.bind_ports previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.allow_execheap previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.cvs_data previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.catchall previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.wine previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.catchall_labels previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.samba_share previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.sys_module previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.allow_execmod previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.file previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.sys_resource previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.mmap_zero previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.openvpn previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.mozplugger previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.setenforce previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.dac_override previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.public_content previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.associate previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.xen_image previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.chrome previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.leaks previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.sshd_root previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.mounton previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.allow_execstack previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.restorecon previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.swapfile previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.connect_ports previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.vbetool previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.device previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 18 14:01:02 spectre python[11075]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 14:01:02 spectre setroubleshoot[11075]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 14:01:02 spectre setroubleshoot[11075]: signature found in database >Mar 18 14:01:02 spectre setroubleshoot[11075]: sending alert to all clients >Mar 18 14:01:02 spectre setroubleshoot[11075]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.restorecon_source previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.rsync_data previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.kernel_modules previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.bind_ports previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.allow_execheap previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.cvs_data previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.catchall previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.wine previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.catchall_labels previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.samba_share previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.sys_module previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.allow_execmod previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.file previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.sys_resource previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.mmap_zero previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.openvpn previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.mozplugger previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.setenforce previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.dac_override previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.public_content previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.associate previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.xen_image previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.chrome previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.leaks previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.sshd_root previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.mounton previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.allow_execstack previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.restorecon previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.swapfile previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.connect_ports previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.vbetool previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.device previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 18 14:01:02 spectre python[11075]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 14:01:02 spectre setroubleshoot[11075]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 14:01:02 spectre setroubleshoot[11075]: signature found in database >Mar 18 14:01:02 spectre setroubleshoot[11075]: sending alert to all clients >Mar 18 14:01:02 spectre setroubleshoot[11075]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.restorecon_source previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.rsync_data previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.kernel_modules previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.bind_ports previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.allow_execheap previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.cvs_data previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.catchall previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.wine previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.catchall_labels previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.samba_share previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.sys_module previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.allow_execmod previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.file previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.sys_resource previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.mmap_zero previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.openvpn previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.mozplugger previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.setenforce previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.dac_override previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.public_content previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.associate previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.xen_image previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.chrome previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.leaks previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.sshd_root previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.mounton previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.allow_execstack previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.restorecon previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.swapfile previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.connect_ports previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.vbetool previously imported >Mar 18 14:01:02 spectre setroubleshoot[11075]: load_plugins() plugins.device previously imported >Mar 18 14:01:02 spectre python[11075]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 14:01:12 spectre setroubleshoot[11075]: received signal=14 >Mar 18 14:01:12 spectre setroubleshoot[11075]: KeyboardInterrupt in RunFaultServer >Mar 18 14:01:12 spectre setroubleshoot[11075]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 18 14:01:12 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 18 14:01:12 spectre dbus-daemon[637]: string index out of range >Mar 18 14:07:47 spectre sshd[10439]: Received disconnect from 192.168.100.1: 11: disconnected by user >Mar 18 14:07:47 spectre sshd[10435]: pam_unix(sshd:session): session closed for user dshea >Mar 18 14:07:47 spectre systemd-logind[635]: Removed session 31. >Mar 18 14:07:49 spectre dbus[637]: [system] Activating via systemd: service name='org.freedesktop.PackageKit' unit='packagekit.service' >Mar 18 14:07:49 spectre dbus-daemon[637]: dbus[637]: [system] Activating via systemd: service name='org.freedesktop.PackageKit' unit='packagekit.service' >Mar 18 14:07:49 spectre systemd[1]: Starting PackageKit Daemon... >Mar 18 14:07:49 spectre PackageKit[11228]: daemon start >Mar 18 14:07:49 spectre dbus[637]: [system] Successfully activated service 'org.freedesktop.PackageKit' >Mar 18 14:07:49 spectre systemd[1]: Started PackageKit Daemon. >Mar 18 14:07:49 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.freedesktop.PackageKit' >Mar 18 14:07:50 spectre PackageKit[11228]: search-file transaction /198_ebdbbaca from uid 1000 finished with success after 273ms >Mar 18 14:07:51 spectre sshd[5285]: Received disconnect from 192.168.100.1: 11: disconnected by user >Mar 18 14:07:51 spectre sshd[5279]: pam_unix(sshd:session): session closed for user dshea >Mar 18 14:07:51 spectre systemd-logind[635]: Removed session 35. >Mar 18 14:12:53 spectre systemd[1]: Starting dnf makecache... >Mar 18 14:12:54 spectre dnf[11284]: Config time: 0.006 >Mar 18 14:12:54 spectre dnf[11284]: cachedir: /var/cache/dnf/x86_64/21 >Mar 18 14:12:54 spectre dnf[11284]: dnf version: 0.4.17 >Mar 18 14:12:54 spectre dnf[11284]: Making cache files for all metadata files. >Mar 18 14:12:54 spectre dnf[11284]: Metadata cache refreshed recently. >Mar 18 14:12:54 spectre systemd[1]: Started dnf makecache. >Mar 18 14:12:54 spectre PackageKit[11228]: daemon quit >Mar 18 14:12:54 spectre packagekitd[11228]: (packagekitd:11228): GLib-CRITICAL **: Source ID 7 was not found when attempting to remove it >Mar 18 14:16:23 spectre systemd[1]: Starting Cleanup of Temporary Directories... >Mar 18 14:16:24 spectre systemd[1]: Started Cleanup of Temporary Directories. >Mar 18 15:01:01 spectre systemd[1]: Starting user-0.slice. >Mar 18 15:01:01 spectre systemd[1]: Created slice user-0.slice. >Mar 18 15:01:01 spectre systemd[1]: Starting Session 38 of user root. >Mar 18 15:01:01 spectre systemd[1]: Started Session 38 of user root. >Mar 18 15:01:01 spectre systemd[1]: Starting User Manager for UID 0... >Mar 18 15:01:01 spectre systemd[11295]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 18 15:01:01 spectre systemd[11295]: Starting Paths. >Mar 18 15:01:01 spectre systemd[11295]: Reached target Paths. >Mar 18 15:01:01 spectre systemd[11295]: Starting Timers. >Mar 18 15:01:01 spectre systemd[11295]: Reached target Timers. >Mar 18 15:01:01 spectre systemd[11295]: Starting Sockets. >Mar 18 15:01:01 spectre systemd[11295]: Reached target Sockets. >Mar 18 15:01:01 spectre systemd[11295]: Starting Basic System. >Mar 18 15:01:01 spectre systemd[11295]: Reached target Basic System. >Mar 18 15:01:01 spectre systemd[11295]: Starting Default. >Mar 18 15:01:01 spectre systemd[11295]: Reached target Default. >Mar 18 15:01:01 spectre systemd[11295]: Startup finished in 16ms. >Mar 18 15:01:01 spectre systemd[1]: Started User Manager for UID 0. >Mar 18 15:01:01 spectre CROND[11309]: (root) CMD (run-parts /etc/cron.hourly) >Mar 18 15:01:01 spectre run-parts[11313]: (/etc/cron.hourly) starting 0anacron >Mar 18 15:01:01 spectre run-parts[11321]: (/etc/cron.hourly) finished 0anacron >Mar 18 15:01:01 spectre run-parts[11324]: (/etc/cron.hourly) starting mcelog.cron >Mar 18 15:01:02 spectre run-parts[11329]: (/etc/cron.hourly) finished mcelog.cron >Mar 18 15:01:02 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 18 15:01:02 spectre systemd[11295]: Stopping Default. >Mar 18 15:01:02 spectre systemd[11295]: Stopped target Default. >Mar 18 15:01:02 spectre systemd[11295]: Stopping Basic System. >Mar 18 15:01:02 spectre systemd[11295]: Stopped target Basic System. >Mar 18 15:01:02 spectre systemd[11295]: Stopping Paths. >Mar 18 15:01:02 spectre systemd[11295]: Stopped target Paths. >Mar 18 15:01:02 spectre systemd[11295]: Stopping Timers. >Mar 18 15:01:02 spectre systemd[11295]: Stopped target Timers. >Mar 18 15:01:02 spectre systemd[11295]: Stopping Sockets. >Mar 18 15:01:02 spectre systemd[11295]: Stopped target Sockets. >Mar 18 15:01:02 spectre systemd[11295]: Starting Shutdown. >Mar 18 15:01:02 spectre systemd[11295]: Reached target Shutdown. >Mar 18 15:01:02 spectre systemd[11295]: Starting Exit the Session... >Mar 18 15:01:02 spectre systemd[11295]: Received SIGRTMIN+24 from PID 11335 (kill). >Mar 18 15:01:02 spectre systemd[11303]: pam_unix(systemd-user:session): session closed for user root >Mar 18 15:01:02 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 18 15:01:02 spectre systemd[1]: Stopping user-0.slice. >Mar 18 15:01:02 spectre systemd[1]: Removed slice user-0.slice. >Mar 18 15:01:02 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 18 15:01:02 spectre systemd-logind[635]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 18 15:01:02 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 18 15:01:02 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 18 15:01:02 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 18 15:01:02 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 18 15:01:02 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 18 15:01:02 spectre setroubleshoot[11345]: RunFaultServer(10) >Mar 18 15:01:02 spectre setroubleshoot[11345]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 18 15:01:02 spectre setroubleshoot[11345]: database version 3.0 compatible with current 3.0 version >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 15:01:02 spectre setroubleshoot[11345]: Number of Plugins = 46 >Mar 18 15:01:02 spectre setroubleshoot[11345]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 18 15:01:02 spectre setroubleshoot[11345]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 18 15:01:02 spectre setroubleshoot[11345]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 18 15:01:02 spectre setroubleshoot[11345]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 18 15:01:02 spectre setroubleshoot[11345]: dbus avc(node=spectre type=AVC msg=audit(1395169262.065:1110): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395169262.065:1110): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528d000 a1=f0800 a2=0 a3=fffffffffffffc98 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395169262.065:1110): >) called: 1 Connections >Mar 18 15:01:02 spectre setroubleshoot[11345]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395169262.65:1110): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 18 15:01:02 spectre setroubleshoot[11345]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395169262.65:1110): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528d000 a1=f0800 a2=0 a3=fffffffffffffc98 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 15:01:02 spectre setroubleshoot[11345]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395169262.65:1110): >Mar 18 15:01:02 spectre setroubleshoot[11345]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 18 15:01:02 spectre setroubleshoot[11345]: dbus avc(node=spectre type=AVC msg=audit(1395169262.065:1111): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395169262.065:1111): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528d000 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395169262.065:1111): >) called: 1 Connections >Mar 18 15:01:02 spectre setroubleshoot[11345]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395169262.65:1111): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 18 15:01:02 spectre setroubleshoot[11345]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395169262.65:1111): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528d000 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 15:01:02 spectre setroubleshoot[11345]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395169262.65:1111): >Mar 18 15:01:02 spectre setroubleshoot[11345]: dbus avc(node=spectre type=AVC msg=audit(1395169262.065:1112): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395169262.065:1112): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528d000 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395169262.065:1112): >) called: 1 Connections >Mar 18 15:01:02 spectre setroubleshoot[11345]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395169262.65:1112): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 18 15:01:02 spectre setroubleshoot[11345]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395169262.65:1112): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528d000 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 15:01:02 spectre setroubleshoot[11345]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395169262.65:1112): >Mar 18 15:01:02 spectre setroubleshoot[11345]: Plugin Exception restorecon_source >Mar 18 15:01:02 spectre setroubleshoot[11345]: Plugin Exception restorecon >Mar 18 15:01:02 spectre setroubleshoot[11345]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 15:01:02 spectre setroubleshoot[11345]: signature found in database >Mar 18 15:01:02 spectre setroubleshoot[11345]: sending alert to all clients >Mar 18 15:01:02 spectre setroubleshoot[11345]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.restorecon_source previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.rsync_data previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.kernel_modules previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.bind_ports previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.allow_execheap previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.cvs_data previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.catchall previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.wine previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.catchall_labels previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.samba_share previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.sys_module previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.allow_execmod previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.file previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.sys_resource previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.mmap_zero previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.openvpn previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.mozplugger previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.setenforce previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.dac_override previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.public_content previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.associate previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.xen_image previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.chrome previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.leaks previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.sshd_root previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.mounton previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.allow_execstack previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.restorecon previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.swapfile previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.connect_ports previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.vbetool previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.device previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 18 15:01:02 spectre python[11345]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 15:01:02 spectre setroubleshoot[11345]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 15:01:02 spectre setroubleshoot[11345]: signature found in database >Mar 18 15:01:02 spectre setroubleshoot[11345]: sending alert to all clients >Mar 18 15:01:02 spectre setroubleshoot[11345]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.restorecon_source previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.rsync_data previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.kernel_modules previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.bind_ports previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.allow_execheap previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.cvs_data previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.catchall previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.wine previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.catchall_labels previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.samba_share previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.sys_module previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.allow_execmod previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.file previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.sys_resource previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.mmap_zero previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.openvpn previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.mozplugger previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.setenforce previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.dac_override previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.public_content previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.associate previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.xen_image previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.chrome previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.leaks previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.sshd_root previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.mounton previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.allow_execstack previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.restorecon previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.swapfile previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.connect_ports previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.vbetool previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.device previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 18 15:01:02 spectre python[11345]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 15:01:02 spectre setroubleshoot[11345]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 15:01:02 spectre setroubleshoot[11345]: signature found in database >Mar 18 15:01:02 spectre setroubleshoot[11345]: sending alert to all clients >Mar 18 15:01:02 spectre setroubleshoot[11345]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.restorecon_source previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.rsync_data previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.kernel_modules previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.bind_ports previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.allow_execheap previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.cvs_data previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.catchall previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.wine previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.catchall_labels previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.samba_share previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.sys_module previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.allow_execmod previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.file previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.sys_resource previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.mmap_zero previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.openvpn previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.mozplugger previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.setenforce previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.dac_override previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.public_content previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.associate previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.xen_image previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.chrome previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.leaks previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.sshd_root previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.mounton previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.allow_execstack previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.restorecon previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.swapfile previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.connect_ports previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.vbetool previously imported >Mar 18 15:01:02 spectre setroubleshoot[11345]: load_plugins() plugins.device previously imported >Mar 18 15:01:02 spectre python[11345]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 15:01:12 spectre setroubleshoot[11345]: received signal=14 >Mar 18 15:01:12 spectre setroubleshoot[11345]: KeyboardInterrupt in RunFaultServer >Mar 18 15:01:12 spectre setroubleshoot[11345]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 18 15:01:12 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 18 15:01:12 spectre dbus-daemon[637]: string index out of range >Mar 18 15:12:55 spectre systemd[1]: Starting dnf makecache... >Mar 18 15:12:55 spectre dnf[11440]: Config time: 0.006 >Mar 18 15:12:55 spectre dnf[11440]: cachedir: /var/cache/dnf/x86_64/21 >Mar 18 15:12:55 spectre dnf[11440]: dnf version: 0.4.17 >Mar 18 15:12:55 spectre dnf[11440]: Making cache files for all metadata files. >Mar 18 15:12:55 spectre dnf[11440]: Metadata cache refreshed recently. >Mar 18 15:12:55 spectre systemd[1]: Started dnf makecache. >Mar 18 16:01:01 spectre systemd[1]: Starting user-0.slice. >Mar 18 16:01:01 spectre systemd[1]: Created slice user-0.slice. >Mar 18 16:01:01 spectre systemd[1]: Starting User Manager for UID 0... >Mar 18 16:01:01 spectre systemd[1]: Starting Session 39 of user root. >Mar 18 16:01:01 spectre systemd[1]: Started Session 39 of user root. >Mar 18 16:01:01 spectre systemd[11451]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 18 16:01:01 spectre systemd[11451]: Starting Paths. >Mar 18 16:01:01 spectre systemd[11451]: Reached target Paths. >Mar 18 16:01:01 spectre systemd[11451]: Starting Timers. >Mar 18 16:01:01 spectre systemd[11451]: Reached target Timers. >Mar 18 16:01:01 spectre systemd[11451]: Starting Sockets. >Mar 18 16:01:01 spectre systemd[11451]: Reached target Sockets. >Mar 18 16:01:01 spectre systemd[11451]: Starting Basic System. >Mar 18 16:01:01 spectre systemd[11451]: Reached target Basic System. >Mar 18 16:01:01 spectre systemd[11451]: Starting Default. >Mar 18 16:01:01 spectre systemd[11451]: Reached target Default. >Mar 18 16:01:01 spectre systemd[11451]: Startup finished in 14ms. >Mar 18 16:01:01 spectre systemd[1]: Started User Manager for UID 0. >Mar 18 16:01:01 spectre CROND[11464]: (root) CMD (run-parts /etc/cron.hourly) >Mar 18 16:01:01 spectre run-parts[11468]: (/etc/cron.hourly) starting 0anacron >Mar 18 16:01:01 spectre run-parts[11475]: (/etc/cron.hourly) finished 0anacron >Mar 18 16:01:01 spectre run-parts[11478]: (/etc/cron.hourly) starting mcelog.cron >Mar 18 16:01:01 spectre run-parts[11483]: (/etc/cron.hourly) finished mcelog.cron >Mar 18 16:01:01 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 18 16:01:01 spectre systemd[11451]: Stopping Default. >Mar 18 16:01:01 spectre systemd[11451]: Stopped target Default. >Mar 18 16:01:01 spectre systemd[11451]: Stopping Basic System. >Mar 18 16:01:01 spectre systemd[11451]: Stopped target Basic System. >Mar 18 16:01:01 spectre systemd[11451]: Stopping Paths. >Mar 18 16:01:01 spectre systemd[11451]: Stopped target Paths. >Mar 18 16:01:01 spectre systemd[11451]: Stopping Timers. >Mar 18 16:01:01 spectre systemd[11451]: Stopped target Timers. >Mar 18 16:01:01 spectre systemd[11451]: Stopping Sockets. >Mar 18 16:01:01 spectre systemd[11451]: Stopped target Sockets. >Mar 18 16:01:01 spectre systemd[11451]: Starting Shutdown. >Mar 18 16:01:01 spectre systemd[11451]: Reached target Shutdown. >Mar 18 16:01:01 spectre systemd[11451]: Starting Exit the Session... >Mar 18 16:01:01 spectre systemd[11451]: Received SIGRTMIN+24 from PID 11488 (kill). >Mar 18 16:01:01 spectre systemd[11459]: pam_unix(systemd-user:session): session closed for user root >Mar 18 16:01:01 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 18 16:01:01 spectre systemd[1]: Stopping user-0.slice. >Mar 18 16:01:01 spectre systemd[1]: Removed slice user-0.slice. >Mar 18 16:01:01 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 18 16:01:01 spectre systemd-logind[635]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 18 16:01:01 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 18 16:01:01 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 18 16:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 18 16:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 18 16:01:01 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 18 16:01:01 spectre setroubleshoot[11499]: RunFaultServer(10) >Mar 18 16:01:01 spectre setroubleshoot[11499]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 18 16:01:01 spectre setroubleshoot[11499]: database version 3.0 compatible with current 3.0 version >Mar 18 16:01:01 spectre setroubleshoot[11499]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 16:01:01 spectre setroubleshoot[11499]: Number of Plugins = 46 >Mar 18 16:01:01 spectre setroubleshoot[11499]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 18 16:01:01 spectre setroubleshoot[11499]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 18 16:01:01 spectre setroubleshoot[11499]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 18 16:01:01 spectre setroubleshoot[11499]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 18 16:01:01 spectre setroubleshoot[11499]: dbus avc(node=spectre type=AVC msg=audit(1395172861.258:1127): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395172861.258:1127): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528dc50 a1=f0800 a2=0 a3=fffffffffffffbc8 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395172861.258:1127): >) called: 1 Connections >Mar 18 16:01:01 spectre setroubleshoot[11499]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395172861.258:1127): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 18 16:01:01 spectre setroubleshoot[11499]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395172861.258:1127): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528dc50 a1=f0800 a2=0 a3=fffffffffffffbc8 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 16:01:01 spectre setroubleshoot[11499]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395172861.258:1127): >Mar 18 16:01:01 spectre setroubleshoot[11499]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 18 16:01:01 spectre setroubleshoot[11499]: dbus avc(node=spectre type=AVC msg=audit(1395172861.258:1128): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395172861.258:1128): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528dc50 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395172861.258:1128): >) called: 1 Connections >Mar 18 16:01:01 spectre setroubleshoot[11499]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395172861.258:1128): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 18 16:01:01 spectre setroubleshoot[11499]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395172861.258:1128): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528dc50 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 16:01:01 spectre setroubleshoot[11499]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395172861.258:1128): >Mar 18 16:01:01 spectre setroubleshoot[11499]: dbus avc(node=spectre type=AVC msg=audit(1395172861.258:1129): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395172861.258:1129): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528dc50 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395172861.258:1129): >) called: 1 Connections >Mar 18 16:01:01 spectre setroubleshoot[11499]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395172861.258:1129): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 18 16:01:01 spectre setroubleshoot[11499]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395172861.258:1129): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528dc50 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 16:01:01 spectre setroubleshoot[11499]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395172861.258:1129): >Mar 18 16:01:01 spectre setroubleshoot[11499]: Plugin Exception restorecon_source >Mar 18 16:01:01 spectre setroubleshoot[11499]: Plugin Exception restorecon >Mar 18 16:01:01 spectre setroubleshoot[11499]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 16:01:01 spectre setroubleshoot[11499]: signature found in database >Mar 18 16:01:01 spectre setroubleshoot[11499]: sending alert to all clients >Mar 18 16:01:01 spectre setroubleshoot[11499]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 18 16:01:01 spectre setroubleshoot[11499]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 16:01:01 spectre setroubleshoot[11499]: load_plugins() plugins.restorecon_source previously imported >Mar 18 16:01:01 spectre setroubleshoot[11499]: load_plugins() plugins.rsync_data previously imported >Mar 18 16:01:01 spectre setroubleshoot[11499]: load_plugins() plugins.kernel_modules previously imported >Mar 18 16:01:01 spectre setroubleshoot[11499]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 16:01:01 spectre setroubleshoot[11499]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 16:01:01 spectre setroubleshoot[11499]: load_plugins() plugins.bind_ports previously imported >Mar 18 16:01:01 spectre setroubleshoot[11499]: load_plugins() plugins.allow_execheap previously imported >Mar 18 16:01:01 spectre setroubleshoot[11499]: load_plugins() plugins.cvs_data previously imported >Mar 18 16:01:01 spectre setroubleshoot[11499]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 16:01:01 spectre setroubleshoot[11499]: load_plugins() plugins.catchall previously imported >Mar 18 16:01:01 spectre setroubleshoot[11499]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 16:01:01 spectre setroubleshoot[11499]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 16:01:01 spectre setroubleshoot[11499]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 16:01:01 spectre setroubleshoot[11499]: load_plugins() plugins.wine previously imported >Mar 18 16:01:01 spectre setroubleshoot[11499]: load_plugins() plugins.catchall_labels previously imported >Mar 18 16:01:01 spectre setroubleshoot[11499]: load_plugins() plugins.samba_share previously imported >Mar 18 16:01:01 spectre setroubleshoot[11499]: load_plugins() plugins.sys_module previously imported >Mar 18 16:01:01 spectre setroubleshoot[11499]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 16:01:01 spectre setroubleshoot[11499]: load_plugins() plugins.allow_execmod previously imported >Mar 18 16:01:01 spectre setroubleshoot[11499]: load_plugins() plugins.file previously imported >Mar 18 16:01:01 spectre setroubleshoot[11499]: load_plugins() plugins.sys_resource previously imported >Mar 18 16:01:01 spectre setroubleshoot[11499]: load_plugins() plugins.mmap_zero previously imported >Mar 18 16:01:01 spectre setroubleshoot[11499]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 16:01:01 spectre setroubleshoot[11499]: load_plugins() plugins.openvpn previously imported >Mar 18 16:01:01 spectre setroubleshoot[11499]: load_plugins() plugins.mozplugger previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.setenforce previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.dac_override previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.public_content previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.associate previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.xen_image previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.chrome previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.leaks previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.sshd_root previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.mounton previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.allow_execstack previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.restorecon previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.swapfile previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.connect_ports previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.vbetool previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.device previously imported >Mar 18 16:01:02 spectre python[11499]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 16:01:02 spectre setroubleshoot[11499]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 18 16:01:02 spectre setroubleshoot[11499]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 16:01:02 spectre setroubleshoot[11499]: signature found in database >Mar 18 16:01:02 spectre setroubleshoot[11499]: sending alert to all clients >Mar 18 16:01:02 spectre setroubleshoot[11499]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.restorecon_source previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.rsync_data previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.kernel_modules previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.bind_ports previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.allow_execheap previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.cvs_data previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.catchall previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.wine previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.catchall_labels previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.samba_share previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.sys_module previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.allow_execmod previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.file previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.sys_resource previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.mmap_zero previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.openvpn previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.mozplugger previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.setenforce previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.dac_override previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.public_content previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.associate previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.xen_image previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.chrome previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.leaks previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.sshd_root previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.mounton previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.allow_execstack previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.restorecon previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.swapfile previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.connect_ports previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.vbetool previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.device previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 18 16:01:02 spectre python[11499]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 16:01:02 spectre setroubleshoot[11499]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 16:01:02 spectre setroubleshoot[11499]: signature found in database >Mar 18 16:01:02 spectre setroubleshoot[11499]: sending alert to all clients >Mar 18 16:01:02 spectre setroubleshoot[11499]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.restorecon_source previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.rsync_data previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.kernel_modules previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.bind_ports previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.allow_execheap previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.cvs_data previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.catchall previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.wine previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.catchall_labels previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.samba_share previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.sys_module previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.allow_execmod previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.file previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.sys_resource previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.mmap_zero previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.openvpn previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.mozplugger previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.setenforce previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.dac_override previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.public_content previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.associate previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.xen_image previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.chrome previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.leaks previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.sshd_root previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.mounton previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.allow_execstack previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.restorecon previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.swapfile previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.connect_ports previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.vbetool previously imported >Mar 18 16:01:02 spectre setroubleshoot[11499]: load_plugins() plugins.device previously imported >Mar 18 16:01:02 spectre python[11499]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 16:01:11 spectre setroubleshoot[11499]: received signal=14 >Mar 18 16:01:11 spectre setroubleshoot[11499]: KeyboardInterrupt in RunFaultServer >Mar 18 16:01:11 spectre setroubleshoot[11499]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 18 16:01:11 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 18 16:01:11 spectre dbus-daemon[637]: string index out of range >Mar 18 16:12:56 spectre systemd[1]: Starting dnf makecache... >Mar 18 16:12:57 spectre dnf[11576]: Config time: 0.006 >Mar 18 16:12:57 spectre dnf[11576]: cachedir: /var/cache/dnf/x86_64/21 >Mar 18 16:12:57 spectre dnf[11576]: dnf version: 0.4.17 >Mar 18 16:12:57 spectre dnf[11576]: Making cache files for all metadata files. >Mar 18 16:12:57 spectre dnf[11576]: rawhide: metadata will expire after 10759 seconds and will be refreshed now >Mar 18 16:12:57 spectre dnf[11576]: reviving: 'rawhide' can be revived. >Mar 18 16:12:57 spectre dnf[11576]: hawkey sack setup time: 0.684 >Mar 18 16:12:57 spectre dnf[11576]: Metadata cache created. >Mar 18 16:12:57 spectre systemd[1]: Started dnf makecache. >Mar 18 17:01:01 spectre systemd[1]: Starting user-0.slice. >Mar 18 17:01:01 spectre systemd[1]: Created slice user-0.slice. >Mar 18 17:01:01 spectre systemd[1]: Starting User Manager for UID 0... >Mar 18 17:01:01 spectre systemd[1]: Starting Session 40 of user root. >Mar 18 17:01:01 spectre systemd[1]: Started Session 40 of user root. >Mar 18 17:01:01 spectre systemd[11609]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 18 17:01:01 spectre systemd[11609]: Starting Paths. >Mar 18 17:01:01 spectre systemd[11609]: Reached target Paths. >Mar 18 17:01:01 spectre systemd[11609]: Starting Timers. >Mar 18 17:01:01 spectre systemd[11609]: Reached target Timers. >Mar 18 17:01:01 spectre systemd[11609]: Starting Sockets. >Mar 18 17:01:01 spectre systemd[11609]: Reached target Sockets. >Mar 18 17:01:01 spectre systemd[11609]: Starting Basic System. >Mar 18 17:01:01 spectre systemd[11609]: Reached target Basic System. >Mar 18 17:01:01 spectre systemd[11609]: Starting Default. >Mar 18 17:01:01 spectre systemd[11609]: Reached target Default. >Mar 18 17:01:01 spectre systemd[11609]: Startup finished in 11ms. >Mar 18 17:01:01 spectre systemd[1]: Started User Manager for UID 0. >Mar 18 17:01:01 spectre CROND[11620]: (root) CMD (run-parts /etc/cron.hourly) >Mar 18 17:01:01 spectre run-parts[11624]: (/etc/cron.hourly) starting 0anacron >Mar 18 17:01:01 spectre run-parts[11632]: (/etc/cron.hourly) finished 0anacron >Mar 18 17:01:01 spectre run-parts[11634]: (/etc/cron.hourly) starting mcelog.cron >Mar 18 17:01:01 spectre run-parts[11639]: (/etc/cron.hourly) finished mcelog.cron >Mar 18 17:01:01 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 18 17:01:01 spectre systemd[11609]: Stopping Default. >Mar 18 17:01:01 spectre systemd[11609]: Stopped target Default. >Mar 18 17:01:01 spectre systemd[11609]: Stopping Basic System. >Mar 18 17:01:01 spectre systemd[11609]: Stopped target Basic System. >Mar 18 17:01:01 spectre systemd[11609]: Stopping Paths. >Mar 18 17:01:01 spectre systemd[11609]: Stopped target Paths. >Mar 18 17:01:01 spectre systemd[11609]: Stopping Timers. >Mar 18 17:01:01 spectre systemd[11609]: Stopped target Timers. >Mar 18 17:01:01 spectre systemd[11609]: Stopping Sockets. >Mar 18 17:01:01 spectre systemd[11609]: Stopped target Sockets. >Mar 18 17:01:01 spectre systemd[11609]: Starting Shutdown. >Mar 18 17:01:01 spectre systemd[11609]: Reached target Shutdown. >Mar 18 17:01:01 spectre systemd[11609]: Starting Exit the Session... >Mar 18 17:01:01 spectre systemd[11609]: Received SIGRTMIN+24 from PID 11645 (kill). >Mar 18 17:01:01 spectre systemd[11616]: pam_unix(systemd-user:session): session closed for user root >Mar 18 17:01:01 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 18 17:01:01 spectre systemd[1]: Stopping user-0.slice. >Mar 18 17:01:01 spectre systemd[1]: Removed slice user-0.slice. >Mar 18 17:01:01 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 18 17:01:01 spectre systemd-logind[635]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 18 17:01:01 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 18 17:01:01 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 18 17:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 18 17:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 18 17:01:01 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 18 17:01:01 spectre setroubleshoot[11655]: RunFaultServer(10) >Mar 18 17:01:01 spectre setroubleshoot[11655]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 18 17:01:01 spectre setroubleshoot[11655]: database version 3.0 compatible with current 3.0 version >Mar 18 17:01:01 spectre setroubleshoot[11655]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 17:01:01 spectre setroubleshoot[11655]: Number of Plugins = 46 >Mar 18 17:01:01 spectre setroubleshoot[11655]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 18 17:01:01 spectre setroubleshoot[11655]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 18 17:01:01 spectre setroubleshoot[11655]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 18 17:01:01 spectre setroubleshoot[11655]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 18 17:01:01 spectre setroubleshoot[11655]: dbus avc(node=spectre type=AVC msg=audit(1395176461.425:1144): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395176461.425:1144): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528dc50 a1=f0800 a2=0 a3=fffffffffffff528 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395176461.425:1144): >) called: 1 Connections >Mar 18 17:01:01 spectre setroubleshoot[11655]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395176461.425:1144): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 18 17:01:01 spectre setroubleshoot[11655]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395176461.425:1144): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528dc50 a1=f0800 a2=0 a3=fffffffffffff528 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 17:01:01 spectre setroubleshoot[11655]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395176461.425:1144): >Mar 18 17:01:01 spectre setroubleshoot[11655]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 18 17:01:01 spectre setroubleshoot[11655]: dbus avc(node=spectre type=AVC msg=audit(1395176461.425:1145): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395176461.425:1145): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528dc50 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395176461.425:1145): >) called: 1 Connections >Mar 18 17:01:01 spectre setroubleshoot[11655]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395176461.425:1145): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 18 17:01:01 spectre setroubleshoot[11655]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395176461.425:1145): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528dc50 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 17:01:01 spectre setroubleshoot[11655]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395176461.425:1145): >Mar 18 17:01:01 spectre setroubleshoot[11655]: dbus avc(node=spectre type=AVC msg=audit(1395176461.425:1146): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395176461.425:1146): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528dc50 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395176461.425:1146): >) called: 1 Connections >Mar 18 17:01:01 spectre setroubleshoot[11655]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395176461.425:1146): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 18 17:01:01 spectre setroubleshoot[11655]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395176461.425:1146): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528dc50 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 17:01:01 spectre setroubleshoot[11655]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395176461.425:1146): >Mar 18 17:01:02 spectre setroubleshoot[11655]: Plugin Exception restorecon_source >Mar 18 17:01:02 spectre setroubleshoot[11655]: Plugin Exception restorecon >Mar 18 17:01:02 spectre setroubleshoot[11655]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 17:01:02 spectre setroubleshoot[11655]: signature found in database >Mar 18 17:01:02 spectre setroubleshoot[11655]: sending alert to all clients >Mar 18 17:01:02 spectre setroubleshoot[11655]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.restorecon_source previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.rsync_data previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.kernel_modules previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.bind_ports previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.allow_execheap previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.cvs_data previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.catchall previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.wine previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.catchall_labels previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.samba_share previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.sys_module previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.allow_execmod previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.file previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.sys_resource previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.mmap_zero previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.openvpn previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.mozplugger previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.setenforce previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.dac_override previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.public_content previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.associate previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.xen_image previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.chrome previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.leaks previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.sshd_root previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.mounton previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.allow_execstack previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.restorecon previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.swapfile previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.connect_ports previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.vbetool previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.device previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 18 17:01:02 spectre python[11655]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 17:01:02 spectre setroubleshoot[11655]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 17:01:02 spectre setroubleshoot[11655]: signature found in database >Mar 18 17:01:02 spectre setroubleshoot[11655]: sending alert to all clients >Mar 18 17:01:02 spectre setroubleshoot[11655]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.restorecon_source previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.rsync_data previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.kernel_modules previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.bind_ports previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.allow_execheap previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.cvs_data previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.catchall previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.wine previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.catchall_labels previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.samba_share previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.sys_module previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.allow_execmod previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.file previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.sys_resource previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.mmap_zero previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.openvpn previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.mozplugger previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.setenforce previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.dac_override previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.public_content previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.associate previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.xen_image previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.chrome previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.leaks previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.sshd_root previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.mounton previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.allow_execstack previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.restorecon previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.swapfile previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.connect_ports previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.vbetool previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.device previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 18 17:01:02 spectre python[11655]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 17:01:02 spectre setroubleshoot[11655]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 17:01:02 spectre setroubleshoot[11655]: signature found in database >Mar 18 17:01:02 spectre setroubleshoot[11655]: sending alert to all clients >Mar 18 17:01:02 spectre setroubleshoot[11655]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.restorecon_source previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.rsync_data previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.kernel_modules previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.bind_ports previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.allow_execheap previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.cvs_data previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.catchall previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.wine previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.catchall_labels previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.samba_share previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.sys_module previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.allow_execmod previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.file previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.sys_resource previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.mmap_zero previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.openvpn previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.mozplugger previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.setenforce previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.dac_override previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.public_content previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.associate previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.xen_image previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.chrome previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.leaks previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.sshd_root previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.mounton previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.allow_execstack previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.restorecon previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.swapfile previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.connect_ports previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.vbetool previously imported >Mar 18 17:01:02 spectre setroubleshoot[11655]: load_plugins() plugins.device previously imported >Mar 18 17:01:02 spectre python[11655]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 17:01:12 spectre setroubleshoot[11655]: received signal=14 >Mar 18 17:01:12 spectre setroubleshoot[11655]: KeyboardInterrupt in RunFaultServer >Mar 18 17:01:12 spectre setroubleshoot[11655]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 18 17:01:12 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 18 17:01:12 spectre dbus-daemon[637]: string index out of range >Mar 18 17:12:59 spectre systemd[1]: Starting dnf makecache... >Mar 18 17:12:59 spectre dnf[11734]: Config time: 0.006 >Mar 18 17:12:59 spectre dnf[11734]: cachedir: /var/cache/dnf/x86_64/21 >Mar 18 17:12:59 spectre dnf[11734]: dnf version: 0.4.17 >Mar 18 17:12:59 spectre dnf[11734]: Making cache files for all metadata files. >Mar 18 17:12:59 spectre dnf[11734]: Metadata cache refreshed recently. >Mar 18 17:12:59 spectre systemd[1]: Started dnf makecache. >Mar 18 18:01:01 spectre systemd[1]: Starting user-0.slice. >Mar 18 18:01:01 spectre systemd[1]: Created slice user-0.slice. >Mar 18 18:01:01 spectre systemd[1]: Starting User Manager for UID 0... >Mar 18 18:01:01 spectre systemd[1]: Starting Session 41 of user root. >Mar 18 18:01:01 spectre systemd[1]: Started Session 41 of user root. >Mar 18 18:01:01 spectre systemd[11741]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 18 18:01:01 spectre systemd[11741]: Starting Paths. >Mar 18 18:01:01 spectre systemd[11741]: Reached target Paths. >Mar 18 18:01:01 spectre systemd[11741]: Starting Timers. >Mar 18 18:01:01 spectre systemd[11741]: Reached target Timers. >Mar 18 18:01:01 spectre systemd[11741]: Starting Sockets. >Mar 18 18:01:01 spectre systemd[11741]: Reached target Sockets. >Mar 18 18:01:01 spectre systemd[11741]: Starting Basic System. >Mar 18 18:01:01 spectre systemd[11741]: Reached target Basic System. >Mar 18 18:01:01 spectre systemd[11741]: Starting Default. >Mar 18 18:01:01 spectre systemd[11741]: Reached target Default. >Mar 18 18:01:01 spectre systemd[11741]: Startup finished in 11ms. >Mar 18 18:01:01 spectre systemd[1]: Started User Manager for UID 0. >Mar 18 18:01:01 spectre CROND[11755]: (root) CMD (run-parts /etc/cron.hourly) >Mar 18 18:01:01 spectre run-parts[11759]: (/etc/cron.hourly) starting 0anacron >Mar 18 18:01:01 spectre run-parts[11767]: (/etc/cron.hourly) finished 0anacron >Mar 18 18:01:01 spectre run-parts[11769]: (/etc/cron.hourly) starting mcelog.cron >Mar 18 18:01:01 spectre run-parts[11775]: (/etc/cron.hourly) finished mcelog.cron >Mar 18 18:01:01 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 18 18:01:01 spectre systemd[11741]: Stopping Default. >Mar 18 18:01:01 spectre systemd[11741]: Stopped target Default. >Mar 18 18:01:01 spectre systemd[11741]: Stopping Basic System. >Mar 18 18:01:01 spectre systemd[11741]: Stopped target Basic System. >Mar 18 18:01:01 spectre systemd[11741]: Stopping Paths. >Mar 18 18:01:01 spectre systemd[11741]: Stopped target Paths. >Mar 18 18:01:01 spectre systemd[11741]: Stopping Timers. >Mar 18 18:01:01 spectre systemd[11741]: Stopped target Timers. >Mar 18 18:01:01 spectre systemd[11741]: Stopping Sockets. >Mar 18 18:01:01 spectre systemd[11741]: Stopped target Sockets. >Mar 18 18:01:01 spectre systemd[11741]: Starting Shutdown. >Mar 18 18:01:01 spectre systemd[11741]: Reached target Shutdown. >Mar 18 18:01:01 spectre systemd[11741]: Starting Exit the Session... >Mar 18 18:01:01 spectre systemd[11741]: Received SIGRTMIN+24 from PID 11781 (kill). >Mar 18 18:01:01 spectre systemd[11750]: pam_unix(systemd-user:session): session closed for user root >Mar 18 18:01:01 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 18 18:01:01 spectre systemd[1]: Stopping user-0.slice. >Mar 18 18:01:01 spectre systemd[1]: Removed slice user-0.slice. >Mar 18 18:01:01 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 18 18:01:01 spectre systemd-logind[635]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 18 18:01:01 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 18 18:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 18 18:01:01 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 18 18:01:02 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 18 18:01:02 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 18 18:01:02 spectre setroubleshoot[11791]: RunFaultServer(10) >Mar 18 18:01:02 spectre setroubleshoot[11791]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 18 18:01:02 spectre setroubleshoot[11791]: database version 3.0 compatible with current 3.0 version >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 18:01:02 spectre setroubleshoot[11791]: Number of Plugins = 46 >Mar 18 18:01:02 spectre setroubleshoot[11791]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 18 18:01:02 spectre setroubleshoot[11791]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 18 18:01:02 spectre setroubleshoot[11791]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 18 18:01:02 spectre setroubleshoot[11791]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 18 18:01:02 spectre setroubleshoot[11791]: dbus avc(node=spectre type=AVC msg=audit(1395180061.599:1161): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395180061.599:1161): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528dc50 a1=f0800 a2=0 a3=fffffffffffff118 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395180061.599:1161): >) called: 1 Connections >Mar 18 18:01:02 spectre setroubleshoot[11791]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395180061.599:1161): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 18 18:01:02 spectre setroubleshoot[11791]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395180061.599:1161): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528dc50 a1=f0800 a2=0 a3=fffffffffffff118 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 18:01:02 spectre setroubleshoot[11791]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395180061.599:1161): >Mar 18 18:01:02 spectre setroubleshoot[11791]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 18 18:01:02 spectre setroubleshoot[11791]: dbus avc(node=spectre type=AVC msg=audit(1395180061.599:1162): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395180061.599:1162): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528dc50 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395180061.599:1162): >) called: 1 Connections >Mar 18 18:01:02 spectre setroubleshoot[11791]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395180061.599:1162): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 18 18:01:02 spectre setroubleshoot[11791]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395180061.599:1162): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528dc50 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 18:01:02 spectre setroubleshoot[11791]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395180061.599:1162): >Mar 18 18:01:02 spectre setroubleshoot[11791]: dbus avc(node=spectre type=AVC msg=audit(1395180061.599:1163): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395180061.599:1163): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528dc50 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395180061.599:1163): >) called: 1 Connections >Mar 18 18:01:02 spectre setroubleshoot[11791]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395180061.599:1163): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 18 18:01:02 spectre setroubleshoot[11791]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395180061.599:1163): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528dc50 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 18:01:02 spectre setroubleshoot[11791]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395180061.599:1163): >Mar 18 18:01:02 spectre setroubleshoot[11791]: Plugin Exception restorecon_source >Mar 18 18:01:02 spectre setroubleshoot[11791]: Plugin Exception restorecon >Mar 18 18:01:02 spectre setroubleshoot[11791]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 18:01:02 spectre setroubleshoot[11791]: signature found in database >Mar 18 18:01:02 spectre setroubleshoot[11791]: sending alert to all clients >Mar 18 18:01:02 spectre setroubleshoot[11791]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.restorecon_source previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.rsync_data previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.kernel_modules previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.bind_ports previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.allow_execheap previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.cvs_data previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.catchall previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.wine previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.catchall_labels previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.samba_share previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.sys_module previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.allow_execmod previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.file previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.sys_resource previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.mmap_zero previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.openvpn previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.mozplugger previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.setenforce previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.dac_override previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.public_content previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.associate previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.xen_image previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.chrome previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.leaks previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.sshd_root previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.mounton previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.allow_execstack previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.restorecon previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.swapfile previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.connect_ports previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.vbetool previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.device previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 18 18:01:02 spectre python[11791]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 18:01:02 spectre setroubleshoot[11791]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 18:01:02 spectre setroubleshoot[11791]: signature found in database >Mar 18 18:01:02 spectre setroubleshoot[11791]: sending alert to all clients >Mar 18 18:01:02 spectre setroubleshoot[11791]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.restorecon_source previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.rsync_data previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.kernel_modules previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.bind_ports previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.allow_execheap previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.cvs_data previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.catchall previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.wine previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.catchall_labels previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.samba_share previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.sys_module previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.allow_execmod previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.file previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.sys_resource previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.mmap_zero previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.openvpn previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.mozplugger previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.setenforce previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.dac_override previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.public_content previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.associate previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.xen_image previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.chrome previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.leaks previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.sshd_root previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.mounton previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.allow_execstack previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.restorecon previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.swapfile previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.connect_ports previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.vbetool previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.device previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 18 18:01:02 spectre python[11791]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 18:01:02 spectre setroubleshoot[11791]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 18:01:02 spectre setroubleshoot[11791]: signature found in database >Mar 18 18:01:02 spectre setroubleshoot[11791]: sending alert to all clients >Mar 18 18:01:02 spectre setroubleshoot[11791]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.restorecon_source previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.rsync_data previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.kernel_modules previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.bind_ports previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.allow_execheap previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.cvs_data previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.catchall previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.wine previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.catchall_labels previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.samba_share previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.sys_module previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.allow_execmod previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.file previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.sys_resource previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.mmap_zero previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.openvpn previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.mozplugger previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.setenforce previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.dac_override previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.public_content previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.associate previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.xen_image previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.chrome previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.leaks previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.sshd_root previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.mounton previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.allow_execstack previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.restorecon previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.swapfile previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.connect_ports previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.vbetool previously imported >Mar 18 18:01:02 spectre setroubleshoot[11791]: load_plugins() plugins.device previously imported >Mar 18 18:01:02 spectre python[11791]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 18:01:12 spectre setroubleshoot[11791]: received signal=14 >Mar 18 18:01:12 spectre setroubleshoot[11791]: KeyboardInterrupt in RunFaultServer >Mar 18 18:01:12 spectre setroubleshoot[11791]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 18 18:01:12 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 18 18:01:12 spectre dbus-daemon[637]: string index out of range >Mar 18 18:13:19 spectre systemd[1]: Starting dnf makecache... >Mar 18 18:13:19 spectre dnf[11887]: Config time: 0.006 >Mar 18 18:13:19 spectre dnf[11887]: cachedir: /var/cache/dnf/x86_64/21 >Mar 18 18:13:19 spectre dnf[11887]: dnf version: 0.4.17 >Mar 18 18:13:19 spectre dnf[11887]: Making cache files for all metadata files. >Mar 18 18:13:19 spectre dnf[11887]: Metadata cache refreshed recently. >Mar 18 18:13:19 spectre systemd[1]: Started dnf makecache. >Mar 18 19:01:01 spectre systemd[1]: Starting user-0.slice. >Mar 18 19:01:01 spectre systemd[1]: Created slice user-0.slice. >Mar 18 19:01:01 spectre systemd[1]: Starting User Manager for UID 0... >Mar 18 19:01:01 spectre systemd[1]: Starting Session 42 of user root. >Mar 18 19:01:01 spectre systemd[1]: Started Session 42 of user root. >Mar 18 19:01:01 spectre systemd[11896]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 18 19:01:01 spectre systemd[11896]: Starting Paths. >Mar 18 19:01:01 spectre systemd[11896]: Reached target Paths. >Mar 18 19:01:01 spectre systemd[11896]: Starting Timers. >Mar 18 19:01:01 spectre systemd[11896]: Reached target Timers. >Mar 18 19:01:01 spectre systemd[11896]: Starting Sockets. >Mar 18 19:01:01 spectre systemd[11896]: Reached target Sockets. >Mar 18 19:01:01 spectre systemd[11896]: Starting Basic System. >Mar 18 19:01:01 spectre systemd[11896]: Reached target Basic System. >Mar 18 19:01:01 spectre systemd[11896]: Starting Default. >Mar 18 19:01:01 spectre systemd[11896]: Reached target Default. >Mar 18 19:01:01 spectre systemd[11896]: Startup finished in 10ms. >Mar 18 19:01:01 spectre systemd[1]: Started User Manager for UID 0. >Mar 18 19:01:01 spectre CROND[11909]: (root) CMD (run-parts /etc/cron.hourly) >Mar 18 19:01:01 spectre run-parts[11913]: (/etc/cron.hourly) starting 0anacron >Mar 18 19:01:01 spectre run-parts[11921]: (/etc/cron.hourly) finished 0anacron >Mar 18 19:01:01 spectre run-parts[11923]: (/etc/cron.hourly) starting mcelog.cron >Mar 18 19:01:01 spectre run-parts[11928]: (/etc/cron.hourly) finished mcelog.cron >Mar 18 19:01:01 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 18 19:01:01 spectre systemd[11896]: Stopping Default. >Mar 18 19:01:01 spectre systemd[11896]: Stopped target Default. >Mar 18 19:01:01 spectre systemd[11896]: Stopping Basic System. >Mar 18 19:01:01 spectre systemd[11896]: Stopped target Basic System. >Mar 18 19:01:01 spectre systemd[11896]: Stopping Paths. >Mar 18 19:01:01 spectre systemd[11896]: Stopped target Paths. >Mar 18 19:01:01 spectre systemd[11896]: Stopping Timers. >Mar 18 19:01:01 spectre systemd[11896]: Stopped target Timers. >Mar 18 19:01:01 spectre systemd[11896]: Stopping Sockets. >Mar 18 19:01:01 spectre systemd[11896]: Stopped target Sockets. >Mar 18 19:01:01 spectre systemd[11896]: Starting Shutdown. >Mar 18 19:01:01 spectre systemd[11896]: Reached target Shutdown. >Mar 18 19:01:01 spectre systemd[11896]: Starting Exit the Session... >Mar 18 19:01:01 spectre systemd[11896]: Received SIGRTMIN+24 from PID 11934 (kill). >Mar 18 19:01:01 spectre systemd[11904]: pam_unix(systemd-user:session): session closed for user root >Mar 18 19:01:01 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 18 19:01:01 spectre systemd[1]: Stopping user-0.slice. >Mar 18 19:01:01 spectre systemd[1]: Removed slice user-0.slice. >Mar 18 19:01:01 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 18 19:01:01 spectre systemd-logind[635]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 18 19:01:01 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 18 19:01:01 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 18 19:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 18 19:01:02 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 18 19:01:02 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 18 19:01:02 spectre setroubleshoot[11941]: RunFaultServer(10) >Mar 18 19:01:02 spectre setroubleshoot[11941]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 18 19:01:02 spectre setroubleshoot[11941]: database version 3.0 compatible with current 3.0 version >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 19:01:02 spectre setroubleshoot[11941]: Number of Plugins = 46 >Mar 18 19:01:02 spectre setroubleshoot[11941]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 18 19:01:02 spectre setroubleshoot[11941]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 18 19:01:02 spectre setroubleshoot[11941]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 18 19:01:02 spectre setroubleshoot[11941]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 18 19:01:02 spectre setroubleshoot[11941]: dbus avc(node=spectre type=AVC msg=audit(1395183661.765:1178): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395183661.765:1178): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528ffb0 a1=f0800 a2=0 a3=fffffffffffff598 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395183661.765:1178): >) called: 1 Connections >Mar 18 19:01:02 spectre setroubleshoot[11941]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395183661.765:1178): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 18 19:01:02 spectre setroubleshoot[11941]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395183661.765:1178): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528ffb0 a1=f0800 a2=0 a3=fffffffffffff598 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 19:01:02 spectre setroubleshoot[11941]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395183661.765:1178): >Mar 18 19:01:02 spectre setroubleshoot[11941]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 18 19:01:02 spectre setroubleshoot[11941]: dbus avc(node=spectre type=AVC msg=audit(1395183661.765:1179): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395183661.765:1179): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528ffb0 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395183661.765:1179): >) called: 1 Connections >Mar 18 19:01:02 spectre setroubleshoot[11941]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395183661.765:1179): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 18 19:01:02 spectre setroubleshoot[11941]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395183661.765:1179): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528ffb0 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 19:01:02 spectre setroubleshoot[11941]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395183661.765:1179): >Mar 18 19:01:02 spectre setroubleshoot[11941]: dbus avc(node=spectre type=AVC msg=audit(1395183661.765:1180): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395183661.765:1180): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528ffb0 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395183661.765:1180): >) called: 1 Connections >Mar 18 19:01:02 spectre setroubleshoot[11941]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395183661.765:1180): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 18 19:01:02 spectre setroubleshoot[11941]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395183661.765:1180): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528ffb0 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 19:01:02 spectre setroubleshoot[11941]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395183661.765:1180): >Mar 18 19:01:02 spectre setroubleshoot[11941]: Plugin Exception restorecon_source >Mar 18 19:01:02 spectre setroubleshoot[11941]: Plugin Exception restorecon >Mar 18 19:01:02 spectre setroubleshoot[11941]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 19:01:02 spectre setroubleshoot[11941]: signature found in database >Mar 18 19:01:02 spectre setroubleshoot[11941]: sending alert to all clients >Mar 18 19:01:02 spectre setroubleshoot[11941]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.restorecon_source previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.rsync_data previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.kernel_modules previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.bind_ports previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.allow_execheap previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.cvs_data previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.catchall previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.wine previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.catchall_labels previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.samba_share previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.sys_module previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.allow_execmod previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.file previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.sys_resource previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.mmap_zero previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.openvpn previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.mozplugger previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.setenforce previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.dac_override previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.public_content previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.associate previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.xen_image previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.chrome previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.leaks previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.sshd_root previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.mounton previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.allow_execstack previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.restorecon previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.swapfile previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.connect_ports previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.vbetool previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.device previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 18 19:01:02 spectre python[11941]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 19:01:02 spectre setroubleshoot[11941]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 19:01:02 spectre setroubleshoot[11941]: signature found in database >Mar 18 19:01:02 spectre setroubleshoot[11941]: sending alert to all clients >Mar 18 19:01:02 spectre setroubleshoot[11941]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.restorecon_source previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.rsync_data previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.kernel_modules previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.bind_ports previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.allow_execheap previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.cvs_data previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.catchall previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.wine previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.catchall_labels previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.samba_share previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.sys_module previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.allow_execmod previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.file previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.sys_resource previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.mmap_zero previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.openvpn previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.mozplugger previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.setenforce previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.dac_override previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.public_content previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.associate previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.xen_image previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.chrome previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.leaks previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.sshd_root previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.mounton previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.allow_execstack previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.restorecon previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.swapfile previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.connect_ports previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.vbetool previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.device previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 18 19:01:02 spectre python[11941]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 19:01:02 spectre setroubleshoot[11941]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 19:01:02 spectre setroubleshoot[11941]: signature found in database >Mar 18 19:01:02 spectre setroubleshoot[11941]: sending alert to all clients >Mar 18 19:01:02 spectre setroubleshoot[11941]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.restorecon_source previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.rsync_data previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.kernel_modules previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.bind_ports previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.allow_execheap previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.cvs_data previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.catchall previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.wine previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.catchall_labels previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.samba_share previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.sys_module previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.allow_execmod previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.file previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.sys_resource previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.mmap_zero previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.openvpn previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.mozplugger previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.setenforce previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.dac_override previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.public_content previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.associate previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.xen_image previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.chrome previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.leaks previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.sshd_root previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.mounton previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.allow_execstack previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.restorecon previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.swapfile previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.connect_ports previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.vbetool previously imported >Mar 18 19:01:02 spectre setroubleshoot[11941]: load_plugins() plugins.device previously imported >Mar 18 19:01:02 spectre python[11941]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 19:01:12 spectre setroubleshoot[11941]: received signal=14 >Mar 18 19:01:12 spectre setroubleshoot[11941]: KeyboardInterrupt in RunFaultServer >Mar 18 19:01:12 spectre setroubleshoot[11941]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 18 19:01:12 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 18 19:01:12 spectre dbus-daemon[637]: string index out of range >Mar 18 19:13:29 spectre systemd[1]: Starting dnf makecache... >Mar 18 19:13:29 spectre dnf[12044]: Config time: 0.006 >Mar 18 19:13:29 spectre dnf[12044]: cachedir: /var/cache/dnf/x86_64/21 >Mar 18 19:13:29 spectre dnf[12044]: dnf version: 0.4.17 >Mar 18 19:13:29 spectre dnf[12044]: Making cache files for all metadata files. >Mar 18 19:13:29 spectre dnf[12044]: rawhide: will expire after 32367 seconds. >Mar 18 19:13:29 spectre dnf[12044]: repo: using cache for: rawhide >Mar 18 19:13:29 spectre dnf[12044]: hawkey sack setup time: 0.129 >Mar 18 19:13:29 spectre dnf[12044]: Metadata cache created. >Mar 18 19:13:29 spectre systemd[1]: Started dnf makecache. >Mar 18 20:01:01 spectre systemd[1]: Starting user-0.slice. >Mar 18 20:01:01 spectre systemd[1]: Created slice user-0.slice. >Mar 18 20:01:01 spectre systemd[1]: Starting User Manager for UID 0... >Mar 18 20:01:01 spectre systemd[1]: Starting Session 43 of user root. >Mar 18 20:01:01 spectre systemd[1]: Started Session 43 of user root. >Mar 18 20:01:01 spectre systemd[12054]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 18 20:01:01 spectre systemd[12054]: Starting Paths. >Mar 18 20:01:01 spectre systemd[12054]: Reached target Paths. >Mar 18 20:01:01 spectre systemd[12054]: Starting Timers. >Mar 18 20:01:01 spectre systemd[12054]: Reached target Timers. >Mar 18 20:01:01 spectre systemd[12054]: Starting Sockets. >Mar 18 20:01:01 spectre systemd[12054]: Reached target Sockets. >Mar 18 20:01:01 spectre systemd[12054]: Starting Basic System. >Mar 18 20:01:01 spectre systemd[12054]: Reached target Basic System. >Mar 18 20:01:01 spectre systemd[12054]: Starting Default. >Mar 18 20:01:01 spectre systemd[12054]: Reached target Default. >Mar 18 20:01:01 spectre systemd[12054]: Startup finished in 10ms. >Mar 18 20:01:01 spectre systemd[1]: Started User Manager for UID 0. >Mar 18 20:01:01 spectre CROND[12065]: (root) CMD (run-parts /etc/cron.hourly) >Mar 18 20:01:01 spectre run-parts[12069]: (/etc/cron.hourly) starting 0anacron >Mar 18 20:01:01 spectre run-parts[12077]: (/etc/cron.hourly) finished 0anacron >Mar 18 20:01:01 spectre run-parts[12080]: (/etc/cron.hourly) starting mcelog.cron >Mar 18 20:01:01 spectre run-parts[12084]: (/etc/cron.hourly) finished mcelog.cron >Mar 18 20:01:01 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 18 20:01:01 spectre systemd[12054]: Stopping Default. >Mar 18 20:01:01 spectre systemd[12054]: Stopped target Default. >Mar 18 20:01:01 spectre systemd[12054]: Stopping Basic System. >Mar 18 20:01:01 spectre systemd[12054]: Stopped target Basic System. >Mar 18 20:01:01 spectre systemd[12054]: Stopping Paths. >Mar 18 20:01:01 spectre systemd[12054]: Stopped target Paths. >Mar 18 20:01:01 spectre systemd[12054]: Stopping Timers. >Mar 18 20:01:01 spectre systemd[12054]: Stopped target Timers. >Mar 18 20:01:01 spectre systemd[12054]: Stopping Sockets. >Mar 18 20:01:01 spectre systemd[12054]: Stopped target Sockets. >Mar 18 20:01:01 spectre systemd[12054]: Starting Shutdown. >Mar 18 20:01:01 spectre systemd[12054]: Reached target Shutdown. >Mar 18 20:01:01 spectre systemd[12054]: Starting Exit the Session... >Mar 18 20:01:01 spectre systemd[12054]: Received SIGRTMIN+24 from PID 12091 (kill). >Mar 18 20:01:01 spectre systemd[12062]: pam_unix(systemd-user:session): session closed for user root >Mar 18 20:01:01 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 18 20:01:01 spectre systemd[1]: Stopping user-0.slice. >Mar 18 20:01:01 spectre systemd[1]: Removed slice user-0.slice. >Mar 18 20:01:01 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 18 20:01:01 spectre systemd-logind[635]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 18 20:01:01 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 18 20:01:01 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 18 20:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 18 20:01:02 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 18 20:01:02 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 18 20:01:02 spectre setroubleshoot[12099]: RunFaultServer(10) >Mar 18 20:01:02 spectre setroubleshoot[12099]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 18 20:01:02 spectre setroubleshoot[12099]: database version 3.0 compatible with current 3.0 version >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 20:01:02 spectre setroubleshoot[12099]: Number of Plugins = 46 >Mar 18 20:01:02 spectre setroubleshoot[12099]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 18 20:01:02 spectre setroubleshoot[12099]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 18 20:01:02 spectre setroubleshoot[12099]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 18 20:01:02 spectre setroubleshoot[12099]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 18 20:01:02 spectre setroubleshoot[12099]: dbus avc(node=spectre type=AVC msg=audit(1395187261.933:1195): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395187261.933:1195): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528ffb0 a1=f0800 a2=0 a3=fffffffffffffc98 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395187261.933:1195): >) called: 1 Connections >Mar 18 20:01:02 spectre setroubleshoot[12099]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395187261.933:1195): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 18 20:01:02 spectre setroubleshoot[12099]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395187261.933:1195): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528ffb0 a1=f0800 a2=0 a3=fffffffffffffc98 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 20:01:02 spectre setroubleshoot[12099]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395187261.933:1195): >Mar 18 20:01:02 spectre setroubleshoot[12099]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 18 20:01:02 spectre setroubleshoot[12099]: dbus avc(node=spectre type=AVC msg=audit(1395187261.933:1196): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395187261.933:1196): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528ffb0 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395187261.933:1196): >) called: 1 Connections >Mar 18 20:01:02 spectre setroubleshoot[12099]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395187261.933:1196): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 18 20:01:02 spectre setroubleshoot[12099]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395187261.933:1196): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528ffb0 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 20:01:02 spectre setroubleshoot[12099]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395187261.933:1196): >Mar 18 20:01:02 spectre setroubleshoot[12099]: dbus avc(node=spectre type=AVC msg=audit(1395187261.933:1197): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395187261.933:1197): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528ffb0 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395187261.933:1197): >) called: 1 Connections >Mar 18 20:01:02 spectre setroubleshoot[12099]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395187261.933:1197): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 18 20:01:02 spectre setroubleshoot[12099]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395187261.933:1197): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528ffb0 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 20:01:02 spectre setroubleshoot[12099]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395187261.933:1197): >Mar 18 20:01:02 spectre setroubleshoot[12099]: Plugin Exception restorecon_source >Mar 18 20:01:02 spectre setroubleshoot[12099]: Plugin Exception restorecon >Mar 18 20:01:02 spectre setroubleshoot[12099]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 20:01:02 spectre setroubleshoot[12099]: signature found in database >Mar 18 20:01:02 spectre setroubleshoot[12099]: sending alert to all clients >Mar 18 20:01:02 spectre setroubleshoot[12099]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.restorecon_source previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.rsync_data previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.kernel_modules previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.bind_ports previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.allow_execheap previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.cvs_data previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.catchall previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.wine previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.catchall_labels previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.samba_share previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.sys_module previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.allow_execmod previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.file previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.sys_resource previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.mmap_zero previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.openvpn previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.mozplugger previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.setenforce previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.dac_override previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.public_content previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.associate previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.xen_image previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.chrome previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.leaks previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.sshd_root previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.mounton previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.allow_execstack previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.restorecon previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.swapfile previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.connect_ports previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.vbetool previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.device previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 18 20:01:02 spectre python[12099]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 20:01:02 spectre setroubleshoot[12099]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 20:01:02 spectre setroubleshoot[12099]: signature found in database >Mar 18 20:01:02 spectre setroubleshoot[12099]: sending alert to all clients >Mar 18 20:01:02 spectre setroubleshoot[12099]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.restorecon_source previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.rsync_data previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.kernel_modules previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.bind_ports previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.allow_execheap previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.cvs_data previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.catchall previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.wine previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.catchall_labels previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.samba_share previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.sys_module previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.allow_execmod previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.file previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.sys_resource previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.mmap_zero previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.openvpn previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.mozplugger previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.setenforce previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.dac_override previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.public_content previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.associate previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.xen_image previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.chrome previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.leaks previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.sshd_root previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.mounton previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.allow_execstack previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.restorecon previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.swapfile previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.connect_ports previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.vbetool previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.device previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 18 20:01:02 spectre python[12099]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 20:01:02 spectre setroubleshoot[12099]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 20:01:02 spectre setroubleshoot[12099]: signature found in database >Mar 18 20:01:02 spectre setroubleshoot[12099]: sending alert to all clients >Mar 18 20:01:02 spectre setroubleshoot[12099]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.restorecon_source previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.rsync_data previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.kernel_modules previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.bind_ports previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.allow_execheap previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.cvs_data previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.catchall previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.wine previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.catchall_labels previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.samba_share previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.sys_module previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.allow_execmod previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.file previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.sys_resource previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.mmap_zero previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.openvpn previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.mozplugger previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.setenforce previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.dac_override previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.public_content previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.associate previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.xen_image previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.chrome previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.leaks previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.sshd_root previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.mounton previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.allow_execstack previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.restorecon previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.swapfile previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.connect_ports previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.vbetool previously imported >Mar 18 20:01:02 spectre setroubleshoot[12099]: load_plugins() plugins.device previously imported >Mar 18 20:01:02 spectre python[12099]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 20:01:12 spectre setroubleshoot[12099]: received signal=14 >Mar 18 20:01:12 spectre setroubleshoot[12099]: KeyboardInterrupt in RunFaultServer >Mar 18 20:01:12 spectre setroubleshoot[12099]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 18 20:01:12 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 18 20:01:12 spectre dbus-daemon[637]: string index out of range >Mar 18 20:13:31 spectre systemd[1]: Starting dnf makecache... >Mar 18 20:13:31 spectre dnf[12200]: Config time: 0.006 >Mar 18 20:13:31 spectre dnf[12200]: cachedir: /var/cache/dnf/x86_64/21 >Mar 18 20:13:31 spectre dnf[12200]: dnf version: 0.4.17 >Mar 18 20:13:31 spectre dnf[12200]: Making cache files for all metadata files. >Mar 18 20:13:31 spectre dnf[12200]: Metadata cache refreshed recently. >Mar 18 20:13:31 spectre systemd[1]: Started dnf makecache. >Mar 18 21:01:01 spectre systemd[1]: Starting user-0.slice. >Mar 18 21:01:01 spectre systemd[1]: Created slice user-0.slice. >Mar 18 21:01:01 spectre systemd[1]: Starting User Manager for UID 0... >Mar 18 21:01:01 spectre systemd[1]: Starting Session 44 of user root. >Mar 18 21:01:01 spectre systemd[1]: Started Session 44 of user root. >Mar 18 21:01:02 spectre systemd[12208]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 18 21:01:02 spectre systemd[12208]: Starting Paths. >Mar 18 21:01:02 spectre systemd[12208]: Reached target Paths. >Mar 18 21:01:02 spectre systemd[12208]: Starting Timers. >Mar 18 21:01:02 spectre systemd[12208]: Reached target Timers. >Mar 18 21:01:02 spectre systemd[12208]: Starting Sockets. >Mar 18 21:01:02 spectre systemd[12208]: Reached target Sockets. >Mar 18 21:01:02 spectre systemd[12208]: Starting Basic System. >Mar 18 21:01:02 spectre systemd[12208]: Reached target Basic System. >Mar 18 21:01:02 spectre systemd[12208]: Starting Default. >Mar 18 21:01:02 spectre systemd[12208]: Reached target Default. >Mar 18 21:01:02 spectre systemd[12208]: Startup finished in 10ms. >Mar 18 21:01:02 spectre systemd[1]: Started User Manager for UID 0. >Mar 18 21:01:02 spectre CROND[12219]: (root) CMD (run-parts /etc/cron.hourly) >Mar 18 21:01:02 spectre run-parts[12224]: (/etc/cron.hourly) starting 0anacron >Mar 18 21:01:02 spectre run-parts[12232]: (/etc/cron.hourly) finished 0anacron >Mar 18 21:01:02 spectre run-parts[12234]: (/etc/cron.hourly) starting mcelog.cron >Mar 18 21:01:02 spectre run-parts[12239]: (/etc/cron.hourly) finished mcelog.cron >Mar 18 21:01:02 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 18 21:01:02 spectre systemd[12208]: Stopping Default. >Mar 18 21:01:02 spectre systemd[12208]: Stopped target Default. >Mar 18 21:01:02 spectre systemd[12208]: Stopping Basic System. >Mar 18 21:01:02 spectre systemd[12208]: Stopped target Basic System. >Mar 18 21:01:02 spectre systemd[12208]: Stopping Paths. >Mar 18 21:01:02 spectre systemd[12208]: Stopped target Paths. >Mar 18 21:01:02 spectre systemd[12208]: Stopping Timers. >Mar 18 21:01:02 spectre systemd[12208]: Stopped target Timers. >Mar 18 21:01:02 spectre systemd[12208]: Stopping Sockets. >Mar 18 21:01:02 spectre systemd[12208]: Stopped target Sockets. >Mar 18 21:01:02 spectre systemd[12208]: Starting Shutdown. >Mar 18 21:01:02 spectre systemd[12208]: Reached target Shutdown. >Mar 18 21:01:02 spectre systemd[12208]: Starting Exit the Session... >Mar 18 21:01:02 spectre systemd[12208]: Received SIGRTMIN+24 from PID 12245 (kill). >Mar 18 21:01:02 spectre systemd[12215]: pam_unix(systemd-user:session): session closed for user root >Mar 18 21:01:02 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 18 21:01:02 spectre systemd[1]: Stopping user-0.slice. >Mar 18 21:01:02 spectre systemd[1]: Removed slice user-0.slice. >Mar 18 21:01:02 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 18 21:01:02 spectre systemd-logind[635]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 18 21:01:02 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 18 21:01:02 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 18 21:01:02 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 18 21:01:02 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 18 21:01:02 spectre setroubleshoot[12255]: RunFaultServer(10) >Mar 18 21:01:02 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 18 21:01:02 spectre setroubleshoot[12255]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 18 21:01:02 spectre setroubleshoot[12255]: database version 3.0 compatible with current 3.0 version >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 21:01:02 spectre setroubleshoot[12255]: Number of Plugins = 46 >Mar 18 21:01:02 spectre setroubleshoot[12255]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 18 21:01:02 spectre setroubleshoot[12255]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 18 21:01:02 spectre setroubleshoot[12255]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 18 21:01:02 spectre setroubleshoot[12255]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 18 21:01:02 spectre setroubleshoot[12255]: dbus avc(node=spectre type=AVC msg=audit(1395190862.118:1212): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395190862.118:1212): arch=c000003e syscall=2 success=no exit=-13 a0=7fa915291e50 a1=f0800 a2=0 a3=fffffffffffffc98 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395190862.118:1212): >) called: 1 Connections >Mar 18 21:01:02 spectre setroubleshoot[12255]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395190862.118:1212): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 18 21:01:02 spectre setroubleshoot[12255]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395190862.118:1212): arch=c000003e syscall=2 success=no exit=-13 a0=7fa915291e50 a1=f0800 a2=0 a3=fffffffffffffc98 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 21:01:02 spectre setroubleshoot[12255]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395190862.118:1212): >Mar 18 21:01:02 spectre setroubleshoot[12255]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 18 21:01:02 spectre setroubleshoot[12255]: dbus avc(node=spectre type=AVC msg=audit(1395190862.118:1213): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395190862.118:1213): arch=c000003e syscall=166 success=no exit=-13 a0=7fa915291e50 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395190862.118:1213): >) called: 1 Connections >Mar 18 21:01:02 spectre setroubleshoot[12255]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395190862.118:1213): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 18 21:01:02 spectre setroubleshoot[12255]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395190862.118:1213): arch=c000003e syscall=166 success=no exit=-13 a0=7fa915291e50 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 21:01:02 spectre setroubleshoot[12255]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395190862.118:1213): >Mar 18 21:01:02 spectre setroubleshoot[12255]: dbus avc(node=spectre type=AVC msg=audit(1395190862.119:1214): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395190862.119:1214): arch=c000003e syscall=2 success=no exit=-13 a0=7fa915291e50 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395190862.119:1214): >) called: 1 Connections >Mar 18 21:01:02 spectre setroubleshoot[12255]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395190862.119:1214): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 18 21:01:02 spectre setroubleshoot[12255]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395190862.119:1214): arch=c000003e syscall=2 success=no exit=-13 a0=7fa915291e50 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 21:01:02 spectre setroubleshoot[12255]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395190862.119:1214): >Mar 18 21:01:02 spectre setroubleshoot[12255]: Plugin Exception restorecon_source >Mar 18 21:01:02 spectre setroubleshoot[12255]: Plugin Exception restorecon >Mar 18 21:01:02 spectre setroubleshoot[12255]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 21:01:02 spectre setroubleshoot[12255]: signature found in database >Mar 18 21:01:02 spectre setroubleshoot[12255]: sending alert to all clients >Mar 18 21:01:02 spectre setroubleshoot[12255]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.restorecon_source previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.rsync_data previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.kernel_modules previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.bind_ports previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.allow_execheap previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.cvs_data previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.catchall previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.wine previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.catchall_labels previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.samba_share previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.sys_module previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.allow_execmod previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.file previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.sys_resource previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.mmap_zero previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.openvpn previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.mozplugger previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.setenforce previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.dac_override previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.public_content previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.associate previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.xen_image previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.chrome previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.leaks previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.sshd_root previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.mounton previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.allow_execstack previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.restorecon previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.swapfile previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.connect_ports previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.vbetool previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.device previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 18 21:01:02 spectre python[12255]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 21:01:02 spectre setroubleshoot[12255]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 21:01:02 spectre setroubleshoot[12255]: signature found in database >Mar 18 21:01:02 spectre setroubleshoot[12255]: sending alert to all clients >Mar 18 21:01:02 spectre setroubleshoot[12255]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.restorecon_source previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.rsync_data previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.kernel_modules previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.bind_ports previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.allow_execheap previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.cvs_data previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.catchall previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.wine previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.catchall_labels previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.samba_share previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.sys_module previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.allow_execmod previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.file previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.sys_resource previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.mmap_zero previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.openvpn previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.mozplugger previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.setenforce previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.dac_override previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.public_content previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.associate previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.xen_image previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.chrome previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.leaks previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.sshd_root previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.mounton previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.allow_execstack previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.restorecon previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.swapfile previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.connect_ports previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.vbetool previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.device previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 18 21:01:02 spectre python[12255]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 21:01:02 spectre setroubleshoot[12255]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 21:01:02 spectre setroubleshoot[12255]: signature found in database >Mar 18 21:01:02 spectre setroubleshoot[12255]: sending alert to all clients >Mar 18 21:01:02 spectre setroubleshoot[12255]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.restorecon_source previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.rsync_data previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.kernel_modules previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.bind_ports previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.allow_execheap previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.cvs_data previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.catchall previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.wine previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.catchall_labels previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.samba_share previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.sys_module previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.allow_execmod previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.file previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.sys_resource previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.mmap_zero previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.openvpn previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.mozplugger previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.setenforce previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.dac_override previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.public_content previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.associate previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.xen_image previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.chrome previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.leaks previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.sshd_root previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.mounton previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.allow_execstack previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.restorecon previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.swapfile previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.connect_ports previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.vbetool previously imported >Mar 18 21:01:02 spectre setroubleshoot[12255]: load_plugins() plugins.device previously imported >Mar 18 21:01:02 spectre python[12255]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 21:01:12 spectre setroubleshoot[12255]: received signal=14 >Mar 18 21:01:12 spectre setroubleshoot[12255]: KeyboardInterrupt in RunFaultServer >Mar 18 21:01:12 spectre setroubleshoot[12255]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 18 21:01:12 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 18 21:01:12 spectre dbus-daemon[637]: string index out of range >Mar 18 21:13:32 spectre systemd[1]: Starting dnf makecache... >Mar 18 21:13:32 spectre dnf[12354]: Config time: 0.006 >Mar 18 21:13:32 spectre dnf[12354]: cachedir: /var/cache/dnf/x86_64/21 >Mar 18 21:13:32 spectre dnf[12354]: dnf version: 0.4.17 >Mar 18 21:13:32 spectre dnf[12354]: Making cache files for all metadata files. >Mar 18 21:13:32 spectre dnf[12354]: Metadata cache refreshed recently. >Mar 18 21:13:32 spectre systemd[1]: Started dnf makecache. >Mar 18 22:01:01 spectre systemd[1]: Starting user-0.slice. >Mar 18 22:01:01 spectre systemd[1]: Created slice user-0.slice. >Mar 18 22:01:01 spectre systemd[1]: Starting User Manager for UID 0... >Mar 18 22:01:01 spectre systemd[1]: Starting Session 45 of user root. >Mar 18 22:01:01 spectre systemd[1]: Started Session 45 of user root. >Mar 18 22:01:01 spectre systemd[12365]: Starting Paths. >Mar 18 22:01:01 spectre systemd[12365]: Reached target Paths. >Mar 18 22:01:01 spectre systemd[12365]: Starting Timers. >Mar 18 22:01:01 spectre systemd[12365]: Reached target Timers. >Mar 18 22:01:01 spectre systemd[12365]: Starting Sockets. >Mar 18 22:01:01 spectre systemd[12365]: Reached target Sockets. >Mar 18 22:01:01 spectre systemd[12365]: Starting Basic System. >Mar 18 22:01:01 spectre systemd[12365]: Reached target Basic System. >Mar 18 22:01:01 spectre systemd[12365]: Starting Default. >Mar 18 22:01:01 spectre systemd[12365]: Reached target Default. >Mar 18 22:01:01 spectre systemd[12365]: Startup finished in 34ms. >Mar 18 22:01:01 spectre systemd[1]: Started User Manager for UID 0. >Mar 18 22:01:01 spectre systemd[12365]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 18 22:01:01 spectre CROND[12382]: (root) CMD (run-parts /etc/cron.hourly) >Mar 18 22:01:01 spectre run-parts[12387]: (/etc/cron.hourly) starting 0anacron >Mar 18 22:01:01 spectre run-parts[12395]: (/etc/cron.hourly) finished 0anacron >Mar 18 22:01:01 spectre run-parts[12397]: (/etc/cron.hourly) starting mcelog.cron >Mar 18 22:01:01 spectre run-parts[12402]: (/etc/cron.hourly) finished mcelog.cron >Mar 18 22:01:01 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 18 22:01:01 spectre systemd[12365]: Stopping Default. >Mar 18 22:01:01 spectre systemd[12365]: Stopped target Default. >Mar 18 22:01:01 spectre systemd[12365]: Stopping Basic System. >Mar 18 22:01:01 spectre systemd[12365]: Stopped target Basic System. >Mar 18 22:01:01 spectre systemd[12365]: Stopping Paths. >Mar 18 22:01:01 spectre systemd[12365]: Stopped target Paths. >Mar 18 22:01:01 spectre systemd[12365]: Stopping Timers. >Mar 18 22:01:01 spectre systemd[12365]: Stopped target Timers. >Mar 18 22:01:01 spectre systemd[12365]: Stopping Sockets. >Mar 18 22:01:01 spectre systemd[12365]: Stopped target Sockets. >Mar 18 22:01:01 spectre systemd[12365]: Starting Shutdown. >Mar 18 22:01:01 spectre systemd[12365]: Reached target Shutdown. >Mar 18 22:01:01 spectre systemd[12365]: Starting Exit the Session... >Mar 18 22:01:01 spectre systemd[12365]: Received SIGRTMIN+24 from PID 12408 (kill). >Mar 18 22:01:01 spectre systemd[12374]: pam_unix(systemd-user:session): session closed for user root >Mar 18 22:01:01 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 18 22:01:01 spectre systemd[1]: Stopping user-0.slice. >Mar 18 22:01:01 spectre systemd[1]: Removed slice user-0.slice. >Mar 18 22:01:01 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 18 22:01:01 spectre systemd-logind[635]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 18 22:01:01 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 18 22:01:01 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 18 22:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 18 22:01:01 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 18 22:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 18 22:01:01 spectre setroubleshoot[12418]: RunFaultServer(10) >Mar 18 22:01:01 spectre setroubleshoot[12418]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 18 22:01:01 spectre setroubleshoot[12418]: database version 3.0 compatible with current 3.0 version >Mar 18 22:01:01 spectre setroubleshoot[12418]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 22:01:01 spectre setroubleshoot[12418]: Number of Plugins = 46 >Mar 18 22:01:01 spectre setroubleshoot[12418]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 18 22:01:01 spectre setroubleshoot[12418]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 18 22:01:01 spectre setroubleshoot[12418]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 18 22:01:01 spectre setroubleshoot[12418]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 18 22:01:01 spectre setroubleshoot[12418]: dbus avc(node=spectre type=AVC msg=audit(1395194461.305:1229): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395194461.305:1229): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528ffb0 a1=f0800 a2=0 a3=7fa912e81680 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395194461.305:1229): >) called: 1 Connections >Mar 18 22:01:01 spectre setroubleshoot[12418]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395194461.305:1229): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 18 22:01:01 spectre setroubleshoot[12418]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395194461.305:1229): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528ffb0 a1=f0800 a2=0 a3=7fa912e81680 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 22:01:01 spectre setroubleshoot[12418]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395194461.305:1229): >Mar 18 22:01:01 spectre setroubleshoot[12418]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 18 22:01:01 spectre setroubleshoot[12418]: dbus avc(node=spectre type=AVC msg=audit(1395194461.305:1230): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395194461.305:1230): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528ffb0 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395194461.305:1230): >) called: 1 Connections >Mar 18 22:01:01 spectre setroubleshoot[12418]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395194461.305:1230): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 18 22:01:01 spectre setroubleshoot[12418]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395194461.305:1230): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528ffb0 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 22:01:01 spectre setroubleshoot[12418]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395194461.305:1230): >Mar 18 22:01:01 spectre setroubleshoot[12418]: dbus avc(node=spectre type=AVC msg=audit(1395194461.305:1231): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395194461.305:1231): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528ffb0 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395194461.305:1231): >) called: 1 Connections >Mar 18 22:01:01 spectre setroubleshoot[12418]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395194461.305:1231): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 18 22:01:01 spectre setroubleshoot[12418]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395194461.305:1231): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528ffb0 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 22:01:01 spectre setroubleshoot[12418]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395194461.305:1231): >Mar 18 22:01:01 spectre setroubleshoot[12418]: Plugin Exception restorecon_source >Mar 18 22:01:01 spectre setroubleshoot[12418]: Plugin Exception restorecon >Mar 18 22:01:01 spectre setroubleshoot[12418]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 22:01:01 spectre setroubleshoot[12418]: signature found in database >Mar 18 22:01:01 spectre setroubleshoot[12418]: sending alert to all clients >Mar 18 22:01:01 spectre setroubleshoot[12418]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 18 22:01:01 spectre setroubleshoot[12418]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 22:01:01 spectre setroubleshoot[12418]: load_plugins() plugins.restorecon_source previously imported >Mar 18 22:01:01 spectre setroubleshoot[12418]: load_plugins() plugins.rsync_data previously imported >Mar 18 22:01:01 spectre setroubleshoot[12418]: load_plugins() plugins.kernel_modules previously imported >Mar 18 22:01:01 spectre setroubleshoot[12418]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 22:01:01 spectre setroubleshoot[12418]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 22:01:01 spectre setroubleshoot[12418]: load_plugins() plugins.bind_ports previously imported >Mar 18 22:01:01 spectre setroubleshoot[12418]: load_plugins() plugins.allow_execheap previously imported >Mar 18 22:01:01 spectre setroubleshoot[12418]: load_plugins() plugins.cvs_data previously imported >Mar 18 22:01:01 spectre setroubleshoot[12418]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 22:01:01 spectre setroubleshoot[12418]: load_plugins() plugins.catchall previously imported >Mar 18 22:01:01 spectre setroubleshoot[12418]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 22:01:01 spectre setroubleshoot[12418]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 22:01:01 spectre setroubleshoot[12418]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 22:01:01 spectre setroubleshoot[12418]: load_plugins() plugins.wine previously imported >Mar 18 22:01:01 spectre setroubleshoot[12418]: load_plugins() plugins.catchall_labels previously imported >Mar 18 22:01:01 spectre setroubleshoot[12418]: load_plugins() plugins.samba_share previously imported >Mar 18 22:01:01 spectre setroubleshoot[12418]: load_plugins() plugins.sys_module previously imported >Mar 18 22:01:01 spectre setroubleshoot[12418]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 22:01:01 spectre setroubleshoot[12418]: load_plugins() plugins.allow_execmod previously imported >Mar 18 22:01:01 spectre setroubleshoot[12418]: load_plugins() plugins.file previously imported >Mar 18 22:01:01 spectre setroubleshoot[12418]: load_plugins() plugins.sys_resource previously imported >Mar 18 22:01:01 spectre setroubleshoot[12418]: load_plugins() plugins.mmap_zero previously imported >Mar 18 22:01:01 spectre setroubleshoot[12418]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 22:01:01 spectre setroubleshoot[12418]: load_plugins() plugins.openvpn previously imported >Mar 18 22:01:01 spectre setroubleshoot[12418]: load_plugins() plugins.mozplugger previously imported >Mar 18 22:01:01 spectre setroubleshoot[12418]: load_plugins() plugins.setenforce previously imported >Mar 18 22:01:01 spectre setroubleshoot[12418]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 22:01:01 spectre setroubleshoot[12418]: load_plugins() plugins.dac_override previously imported >Mar 18 22:01:01 spectre setroubleshoot[12418]: load_plugins() plugins.public_content previously imported >Mar 18 22:01:01 spectre setroubleshoot[12418]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 22:01:01 spectre setroubleshoot[12418]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 22:01:01 spectre setroubleshoot[12418]: load_plugins() plugins.associate previously imported >Mar 18 22:01:01 spectre setroubleshoot[12418]: load_plugins() plugins.xen_image previously imported >Mar 18 22:01:01 spectre setroubleshoot[12418]: load_plugins() plugins.chrome previously imported >Mar 18 22:01:01 spectre setroubleshoot[12418]: load_plugins() plugins.leaks previously imported >Mar 18 22:01:01 spectre setroubleshoot[12418]: load_plugins() plugins.sshd_root previously imported >Mar 18 22:01:01 spectre setroubleshoot[12418]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 22:01:01 spectre setroubleshoot[12418]: load_plugins() plugins.mounton previously imported >Mar 18 22:01:01 spectre setroubleshoot[12418]: load_plugins() plugins.allow_execstack previously imported >Mar 18 22:01:01 spectre setroubleshoot[12418]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 22:01:01 spectre setroubleshoot[12418]: load_plugins() plugins.restorecon previously imported >Mar 18 22:01:01 spectre setroubleshoot[12418]: load_plugins() plugins.swapfile previously imported >Mar 18 22:01:01 spectre setroubleshoot[12418]: load_plugins() plugins.connect_ports previously imported >Mar 18 22:01:01 spectre setroubleshoot[12418]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 22:01:01 spectre setroubleshoot[12418]: load_plugins() plugins.vbetool previously imported >Mar 18 22:01:01 spectre setroubleshoot[12418]: load_plugins() plugins.device previously imported >Mar 18 22:01:01 spectre setroubleshoot[12418]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 18 22:01:01 spectre python[12418]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 22:01:02 spectre setroubleshoot[12418]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 22:01:02 spectre setroubleshoot[12418]: signature found in database >Mar 18 22:01:02 spectre setroubleshoot[12418]: sending alert to all clients >Mar 18 22:01:02 spectre setroubleshoot[12418]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.restorecon_source previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.rsync_data previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.kernel_modules previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.bind_ports previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.allow_execheap previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.cvs_data previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.catchall previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.wine previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.catchall_labels previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.samba_share previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.sys_module previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.allow_execmod previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.file previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.sys_resource previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.mmap_zero previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.openvpn previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.mozplugger previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.setenforce previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.dac_override previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.public_content previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.associate previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.xen_image previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.chrome previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.leaks previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.sshd_root previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.mounton previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.allow_execstack previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.restorecon previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.swapfile previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.connect_ports previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.vbetool previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.device previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 18 22:01:02 spectre python[12418]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 22:01:02 spectre setroubleshoot[12418]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 22:01:02 spectre setroubleshoot[12418]: signature found in database >Mar 18 22:01:02 spectre setroubleshoot[12418]: sending alert to all clients >Mar 18 22:01:02 spectre setroubleshoot[12418]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.restorecon_source previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.rsync_data previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.kernel_modules previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.bind_ports previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.allow_execheap previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.cvs_data previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.catchall previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.wine previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.catchall_labels previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.samba_share previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.sys_module previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.allow_execmod previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.file previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.sys_resource previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.mmap_zero previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.openvpn previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.mozplugger previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.setenforce previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.dac_override previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.public_content previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.associate previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.xen_image previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.chrome previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.leaks previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.sshd_root previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.mounton previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.allow_execstack previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.restorecon previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.swapfile previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.connect_ports previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.vbetool previously imported >Mar 18 22:01:02 spectre setroubleshoot[12418]: load_plugins() plugins.device previously imported >Mar 18 22:01:02 spectre python[12418]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 22:01:11 spectre setroubleshoot[12418]: received signal=14 >Mar 18 22:01:11 spectre setroubleshoot[12418]: KeyboardInterrupt in RunFaultServer >Mar 18 22:01:11 spectre setroubleshoot[12418]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 18 22:01:11 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 18 22:01:11 spectre dbus-daemon[637]: string index out of range >Mar 18 22:13:33 spectre systemd[1]: Starting dnf makecache... >Mar 18 22:13:33 spectre dnf[12490]: Config time: 0.006 >Mar 18 22:13:33 spectre dnf[12490]: cachedir: /var/cache/dnf/x86_64/21 >Mar 18 22:13:33 spectre dnf[12490]: dnf version: 0.4.17 >Mar 18 22:13:33 spectre dnf[12490]: Making cache files for all metadata files. >Mar 18 22:13:33 spectre dnf[12490]: rawhide: will expire after 21563 seconds. >Mar 18 22:13:33 spectre dnf[12490]: repo: using cache for: rawhide >Mar 18 22:13:33 spectre dnf[12490]: hawkey sack setup time: 0.127 >Mar 18 22:13:33 spectre dnf[12490]: Metadata cache created. >Mar 18 22:13:33 spectre systemd[1]: Started dnf makecache. >Mar 18 23:01:01 spectre systemd[1]: Starting user-0.slice. >Mar 18 23:01:01 spectre systemd[1]: Created slice user-0.slice. >Mar 18 23:01:01 spectre systemd[1]: Starting User Manager for UID 0... >Mar 18 23:01:01 spectre systemd[1]: Starting Session 46 of user root. >Mar 18 23:01:01 spectre systemd[1]: Started Session 46 of user root. >Mar 18 23:01:01 spectre systemd[12500]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 18 23:01:01 spectre systemd[12500]: Starting Paths. >Mar 18 23:01:01 spectre systemd[12500]: Reached target Paths. >Mar 18 23:01:01 spectre systemd[12500]: Starting Timers. >Mar 18 23:01:01 spectre systemd[12500]: Reached target Timers. >Mar 18 23:01:01 spectre systemd[12500]: Starting Sockets. >Mar 18 23:01:01 spectre systemd[12500]: Reached target Sockets. >Mar 18 23:01:01 spectre systemd[12500]: Starting Basic System. >Mar 18 23:01:01 spectre systemd[12500]: Reached target Basic System. >Mar 18 23:01:01 spectre systemd[12500]: Starting Default. >Mar 18 23:01:01 spectre systemd[12500]: Reached target Default. >Mar 18 23:01:01 spectre systemd[12500]: Startup finished in 11ms. >Mar 18 23:01:01 spectre systemd[1]: Started User Manager for UID 0. >Mar 18 23:01:01 spectre CROND[12513]: (root) CMD (run-parts /etc/cron.hourly) >Mar 18 23:01:01 spectre run-parts[12518]: (/etc/cron.hourly) starting 0anacron >Mar 18 23:01:01 spectre run-parts[12525]: (/etc/cron.hourly) finished 0anacron >Mar 18 23:01:01 spectre run-parts[12528]: (/etc/cron.hourly) starting mcelog.cron >Mar 18 23:01:01 spectre run-parts[12532]: (/etc/cron.hourly) finished mcelog.cron >Mar 18 23:01:01 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 18 23:01:01 spectre systemd[12500]: Stopping Default. >Mar 18 23:01:01 spectre systemd[12500]: Stopped target Default. >Mar 18 23:01:01 spectre systemd[12500]: Stopping Basic System. >Mar 18 23:01:01 spectre systemd[12500]: Stopped target Basic System. >Mar 18 23:01:01 spectre systemd[12500]: Stopping Paths. >Mar 18 23:01:01 spectre systemd[12500]: Stopped target Paths. >Mar 18 23:01:01 spectre systemd[12500]: Stopping Timers. >Mar 18 23:01:01 spectre systemd[12500]: Stopped target Timers. >Mar 18 23:01:01 spectre systemd[12500]: Stopping Sockets. >Mar 18 23:01:01 spectre systemd[12500]: Stopped target Sockets. >Mar 18 23:01:01 spectre systemd[12500]: Starting Shutdown. >Mar 18 23:01:01 spectre systemd[12500]: Reached target Shutdown. >Mar 18 23:01:01 spectre systemd[12500]: Starting Exit the Session... >Mar 18 23:01:01 spectre systemd[12500]: Received SIGRTMIN+24 from PID 12539 (kill). >Mar 18 23:01:01 spectre systemd[12508]: pam_unix(systemd-user:session): session closed for user root >Mar 18 23:01:01 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 18 23:01:01 spectre systemd[1]: Stopping user-0.slice. >Mar 18 23:01:01 spectre systemd[1]: Removed slice user-0.slice. >Mar 18 23:01:01 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 18 23:01:01 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 18 23:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 18 23:01:01 spectre systemd-logind[635]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 18 23:01:01 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 18 23:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 18 23:01:01 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 18 23:01:01 spectre setroubleshoot[12549]: RunFaultServer(10) >Mar 18 23:01:01 spectre setroubleshoot[12549]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 18 23:01:01 spectre setroubleshoot[12549]: database version 3.0 compatible with current 3.0 version >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 23:01:02 spectre setroubleshoot[12549]: Number of Plugins = 46 >Mar 18 23:01:02 spectre setroubleshoot[12549]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 18 23:01:02 spectre setroubleshoot[12549]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 18 23:01:02 spectre setroubleshoot[12549]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 18 23:01:02 spectre setroubleshoot[12549]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 18 23:01:02 spectre setroubleshoot[12549]: dbus avc(node=spectre type=AVC msg=audit(1395198061.470:1246): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395198061.470:1246): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528dbd0 a1=f0800 a2=0 a3=7fa912e81680 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395198061.470:1246): >) called: 1 Connections >Mar 18 23:01:02 spectre setroubleshoot[12549]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395198061.470:1246): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 18 23:01:02 spectre setroubleshoot[12549]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395198061.470:1246): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528dbd0 a1=f0800 a2=0 a3=7fa912e81680 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 23:01:02 spectre setroubleshoot[12549]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395198061.470:1246): >Mar 18 23:01:02 spectre setroubleshoot[12549]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 18 23:01:02 spectre setroubleshoot[12549]: dbus avc(node=spectre type=AVC msg=audit(1395198061.472:1247): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395198061.472:1247): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528dbd0 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395198061.472:1247): >) called: 1 Connections >Mar 18 23:01:02 spectre setroubleshoot[12549]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395198061.472:1247): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 18 23:01:02 spectre setroubleshoot[12549]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395198061.472:1247): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528dbd0 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 23:01:02 spectre setroubleshoot[12549]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395198061.472:1247): >Mar 18 23:01:02 spectre setroubleshoot[12549]: dbus avc(node=spectre type=AVC msg=audit(1395198061.473:1248): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395198061.473:1248): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528dbd0 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395198061.473:1248): >) called: 1 Connections >Mar 18 23:01:02 spectre setroubleshoot[12549]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395198061.473:1248): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 18 23:01:02 spectre setroubleshoot[12549]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395198061.473:1248): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528dbd0 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 18 23:01:02 spectre setroubleshoot[12549]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395198061.473:1248): >Mar 18 23:01:02 spectre setroubleshoot[12549]: Plugin Exception restorecon_source >Mar 18 23:01:02 spectre setroubleshoot[12549]: Plugin Exception restorecon >Mar 18 23:01:02 spectre setroubleshoot[12549]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 23:01:02 spectre setroubleshoot[12549]: signature found in database >Mar 18 23:01:02 spectre setroubleshoot[12549]: sending alert to all clients >Mar 18 23:01:02 spectre setroubleshoot[12549]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.restorecon_source previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.rsync_data previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.kernel_modules previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.bind_ports previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.allow_execheap previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.cvs_data previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.catchall previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.wine previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.catchall_labels previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.samba_share previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.sys_module previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.allow_execmod previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.file previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.sys_resource previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.mmap_zero previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.openvpn previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.mozplugger previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.setenforce previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.dac_override previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.public_content previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.associate previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.xen_image previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.chrome previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.leaks previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.sshd_root previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.mounton previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.allow_execstack previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.restorecon previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.swapfile previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.connect_ports previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.vbetool previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.device previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 18 23:01:02 spectre python[12549]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 23:01:02 spectre setroubleshoot[12549]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 23:01:02 spectre setroubleshoot[12549]: signature found in database >Mar 18 23:01:02 spectre setroubleshoot[12549]: sending alert to all clients >Mar 18 23:01:02 spectre setroubleshoot[12549]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.restorecon_source previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.rsync_data previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.kernel_modules previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.bind_ports previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.allow_execheap previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.cvs_data previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.catchall previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.wine previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.catchall_labels previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.samba_share previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.sys_module previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.allow_execmod previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.file previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.sys_resource previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.mmap_zero previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.openvpn previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.mozplugger previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.setenforce previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.dac_override previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.public_content previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.associate previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.xen_image previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.chrome previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.leaks previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.sshd_root previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.mounton previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.allow_execstack previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.restorecon previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.swapfile previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.connect_ports previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.vbetool previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.device previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 18 23:01:02 spectre python[12549]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 23:01:02 spectre setroubleshoot[12549]: lookup_signature: found 1 matches with scores 1.00 >Mar 18 23:01:02 spectre setroubleshoot[12549]: signature found in database >Mar 18 23:01:02 spectre setroubleshoot[12549]: sending alert to all clients >Mar 18 23:01:02 spectre setroubleshoot[12549]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.restorecon_source previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.rsync_data previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.kernel_modules previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.catchall_boolean previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.automount_exec_config previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.bind_ports previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.allow_execheap previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.cvs_data previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.mozplugger_remove previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.catchall previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.sandbox_connect previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.httpd_write_content previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.wine previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.catchall_labels previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.samba_share previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.sys_module previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.qemu_blk_image previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.allow_execmod previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.file previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.sys_resource previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.mmap_zero previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.openvpn previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.mozplugger previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.setenforce previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.disable_ipv6 previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.dac_override previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.public_content previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.allow_anon_write previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.selinuxpolicy previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.associate previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.xen_image previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.chrome previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.leaks previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.sshd_root previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.qemu_file_image previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.mounton previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.allow_execstack previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.filesystem_associate previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.restorecon previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.swapfile previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.connect_ports previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.vbetool previously imported >Mar 18 23:01:02 spectre setroubleshoot[12549]: load_plugins() plugins.device previously imported >Mar 18 23:01:02 spectre python[12549]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 18 23:01:12 spectre setroubleshoot[12549]: received signal=14 >Mar 18 23:01:12 spectre setroubleshoot[12549]: KeyboardInterrupt in RunFaultServer >Mar 18 23:01:12 spectre setroubleshoot[12549]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 18 23:01:12 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 18 23:01:12 spectre dbus-daemon[637]: string index out of range >Mar 18 23:13:34 spectre systemd[1]: Starting dnf makecache... >Mar 18 23:13:34 spectre dnf[12648]: Config time: 0.006 >Mar 18 23:13:34 spectre dnf[12648]: cachedir: /var/cache/dnf/x86_64/21 >Mar 18 23:13:34 spectre dnf[12648]: dnf version: 0.4.17 >Mar 18 23:13:34 spectre dnf[12648]: Making cache files for all metadata files. >Mar 18 23:13:34 spectre dnf[12648]: Metadata cache refreshed recently. >Mar 18 23:13:34 spectre systemd[1]: Started dnf makecache. >Mar 19 00:01:01 spectre systemd[1]: Starting user-0.slice. >Mar 19 00:01:01 spectre systemd[1]: Created slice user-0.slice. >Mar 19 00:01:01 spectre systemd[1]: Starting User Manager for UID 0... >Mar 19 00:01:01 spectre systemd[1]: Starting Session 47 of user root. >Mar 19 00:01:01 spectre systemd[1]: Started Session 47 of user root. >Mar 19 00:01:01 spectre systemd[12656]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 19 00:01:01 spectre systemd[12656]: Starting Paths. >Mar 19 00:01:01 spectre systemd[12656]: Reached target Paths. >Mar 19 00:01:01 spectre systemd[12656]: Starting Timers. >Mar 19 00:01:01 spectre systemd[12656]: Reached target Timers. >Mar 19 00:01:01 spectre systemd[12656]: Starting Sockets. >Mar 19 00:01:01 spectre systemd[12656]: Reached target Sockets. >Mar 19 00:01:01 spectre systemd[12656]: Starting Basic System. >Mar 19 00:01:01 spectre systemd[12656]: Reached target Basic System. >Mar 19 00:01:01 spectre systemd[12656]: Starting Default. >Mar 19 00:01:01 spectre systemd[12656]: Reached target Default. >Mar 19 00:01:01 spectre systemd[12656]: Startup finished in 10ms. >Mar 19 00:01:01 spectre systemd[1]: Started User Manager for UID 0. >Mar 19 00:01:01 spectre CROND[12668]: (root) CMD (run-parts /etc/cron.hourly) >Mar 19 00:01:01 spectre run-parts[12672]: (/etc/cron.hourly) starting 0anacron >Mar 19 00:01:01 spectre anacron[12681]: Anacron started on 2014-03-19 >Mar 19 00:01:01 spectre anacron[12681]: Normal exit (0 jobs run) >Mar 19 00:01:01 spectre run-parts[12684]: (/etc/cron.hourly) finished 0anacron >Mar 19 00:01:01 spectre run-parts[12686]: (/etc/cron.hourly) starting mcelog.cron >Mar 19 00:01:01 spectre run-parts[12691]: (/etc/cron.hourly) finished mcelog.cron >Mar 19 00:01:01 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 19 00:01:01 spectre systemd[12656]: Stopping Default. >Mar 19 00:01:01 spectre systemd[12656]: Stopped target Default. >Mar 19 00:01:01 spectre systemd[12656]: Stopping Basic System. >Mar 19 00:01:01 spectre systemd[12656]: Stopped target Basic System. >Mar 19 00:01:01 spectre systemd[12656]: Stopping Paths. >Mar 19 00:01:01 spectre systemd[12656]: Stopped target Paths. >Mar 19 00:01:01 spectre systemd[12656]: Stopping Timers. >Mar 19 00:01:01 spectre systemd[12656]: Stopped target Timers. >Mar 19 00:01:01 spectre systemd[12656]: Stopping Sockets. >Mar 19 00:01:01 spectre systemd[12656]: Stopped target Sockets. >Mar 19 00:01:01 spectre systemd[12656]: Starting Shutdown. >Mar 19 00:01:01 spectre systemd[12656]: Reached target Shutdown. >Mar 19 00:01:01 spectre systemd[12656]: Starting Exit the Session... >Mar 19 00:01:01 spectre systemd[12656]: Received SIGRTMIN+24 from PID 12696 (kill). >Mar 19 00:01:01 spectre systemd[12663]: pam_unix(systemd-user:session): session closed for user root >Mar 19 00:01:01 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 19 00:01:01 spectre systemd[1]: Stopping user-0.slice. >Mar 19 00:01:01 spectre systemd[1]: Removed slice user-0.slice. >Mar 19 00:01:01 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 19 00:01:01 spectre systemd-logind[635]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 19 00:01:01 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 19 00:01:01 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 19 00:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 19 00:01:02 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 19 00:01:02 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 19 00:01:02 spectre setroubleshoot[12708]: RunFaultServer(10) >Mar 19 00:01:02 spectre setroubleshoot[12708]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 19 00:01:02 spectre setroubleshoot[12708]: database version 3.0 compatible with current 3.0 version >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 00:01:02 spectre setroubleshoot[12708]: Number of Plugins = 46 >Mar 19 00:01:02 spectre setroubleshoot[12708]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 19 00:01:02 spectre setroubleshoot[12708]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 19 00:01:02 spectre setroubleshoot[12708]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 19 00:01:02 spectre setroubleshoot[12708]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 19 00:01:02 spectre setroubleshoot[12708]: dbus avc(node=spectre type=AVC msg=audit(1395201661.674:1263): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395201661.674:1263): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528dd60 a1=f0800 a2=0 a3=fffffffffffff978 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395201661.674:1263): >) called: 1 Connections >Mar 19 00:01:02 spectre setroubleshoot[12708]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395201661.674:1263): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 19 00:01:02 spectre setroubleshoot[12708]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395201661.674:1263): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528dd60 a1=f0800 a2=0 a3=fffffffffffff978 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 00:01:02 spectre setroubleshoot[12708]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395201661.674:1263): >Mar 19 00:01:02 spectre setroubleshoot[12708]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 19 00:01:02 spectre setroubleshoot[12708]: dbus avc(node=spectre type=AVC msg=audit(1395201661.675:1264): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395201661.675:1264): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528dd60 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395201661.675:1264): >) called: 1 Connections >Mar 19 00:01:02 spectre setroubleshoot[12708]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395201661.675:1264): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 19 00:01:02 spectre setroubleshoot[12708]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395201661.675:1264): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528dd60 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 00:01:02 spectre setroubleshoot[12708]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395201661.675:1264): >Mar 19 00:01:02 spectre setroubleshoot[12708]: dbus avc(node=spectre type=AVC msg=audit(1395201661.675:1265): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395201661.675:1265): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528dd60 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395201661.675:1265): >) called: 1 Connections >Mar 19 00:01:02 spectre setroubleshoot[12708]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395201661.675:1265): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 19 00:01:02 spectre setroubleshoot[12708]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395201661.675:1265): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528dd60 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 00:01:02 spectre setroubleshoot[12708]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395201661.675:1265): >Mar 19 00:01:02 spectre setroubleshoot[12708]: Plugin Exception restorecon_source >Mar 19 00:01:02 spectre setroubleshoot[12708]: Plugin Exception restorecon >Mar 19 00:01:02 spectre setroubleshoot[12708]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 00:01:02 spectre setroubleshoot[12708]: signature found in database >Mar 19 00:01:02 spectre setroubleshoot[12708]: sending alert to all clients >Mar 19 00:01:02 spectre setroubleshoot[12708]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.restorecon_source previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.rsync_data previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.kernel_modules previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.bind_ports previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.allow_execheap previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.cvs_data previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.catchall previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.wine previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.catchall_labels previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.samba_share previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.sys_module previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.allow_execmod previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.file previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.sys_resource previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.mmap_zero previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.openvpn previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.mozplugger previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.setenforce previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.dac_override previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.public_content previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.associate previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.xen_image previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.chrome previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.leaks previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.sshd_root previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.mounton previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.allow_execstack previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.restorecon previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.swapfile previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.connect_ports previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.vbetool previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.device previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 19 00:01:02 spectre python[12708]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 00:01:02 spectre setroubleshoot[12708]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 00:01:02 spectre setroubleshoot[12708]: signature found in database >Mar 19 00:01:02 spectre setroubleshoot[12708]: sending alert to all clients >Mar 19 00:01:02 spectre setroubleshoot[12708]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.restorecon_source previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.rsync_data previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.kernel_modules previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.bind_ports previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.allow_execheap previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.cvs_data previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.catchall previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.wine previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.catchall_labels previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.samba_share previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.sys_module previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.allow_execmod previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.file previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.sys_resource previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.mmap_zero previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.openvpn previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.mozplugger previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.setenforce previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.dac_override previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.public_content previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.associate previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.xen_image previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.chrome previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.leaks previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.sshd_root previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.mounton previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.allow_execstack previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.restorecon previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.swapfile previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.connect_ports previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.vbetool previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.device previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 19 00:01:02 spectre python[12708]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 00:01:02 spectre setroubleshoot[12708]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 00:01:02 spectre setroubleshoot[12708]: signature found in database >Mar 19 00:01:02 spectre setroubleshoot[12708]: sending alert to all clients >Mar 19 00:01:02 spectre setroubleshoot[12708]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.restorecon_source previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.rsync_data previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.kernel_modules previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.bind_ports previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.allow_execheap previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.cvs_data previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.catchall previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.wine previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.catchall_labels previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.samba_share previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.sys_module previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.allow_execmod previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.file previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.sys_resource previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.mmap_zero previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.openvpn previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.mozplugger previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.setenforce previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.dac_override previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.public_content previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.associate previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.xen_image previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.chrome previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.leaks previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.sshd_root previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.mounton previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.allow_execstack previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.restorecon previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.swapfile previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.connect_ports previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.vbetool previously imported >Mar 19 00:01:02 spectre setroubleshoot[12708]: load_plugins() plugins.device previously imported >Mar 19 00:01:02 spectre python[12708]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 00:01:12 spectre setroubleshoot[12708]: received signal=14 >Mar 19 00:01:12 spectre setroubleshoot[12708]: KeyboardInterrupt in RunFaultServer >Mar 19 00:01:12 spectre setroubleshoot[12708]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 19 00:01:12 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 19 00:01:12 spectre dbus-daemon[637]: string index out of range >Mar 19 00:13:35 spectre systemd[1]: Starting dnf makecache... >Mar 19 00:13:36 spectre dnf[12806]: Config time: 0.005 >Mar 19 00:13:36 spectre dnf[12806]: cachedir: /var/cache/dnf/x86_64/21 >Mar 19 00:13:36 spectre dnf[12806]: dnf version: 0.4.17 >Mar 19 00:13:36 spectre dnf[12806]: Making cache files for all metadata files. >Mar 19 00:13:36 spectre dnf[12806]: Metadata cache refreshed recently. >Mar 19 00:13:36 spectre systemd[1]: Started dnf makecache. >Mar 19 01:01:01 spectre systemd[1]: Starting user-0.slice. >Mar 19 01:01:01 spectre systemd[1]: Created slice user-0.slice. >Mar 19 01:01:01 spectre systemd[1]: Starting User Manager for UID 0... >Mar 19 01:01:01 spectre systemd[1]: Starting Session 48 of user root. >Mar 19 01:01:01 spectre systemd[1]: Started Session 48 of user root. >Mar 19 01:01:01 spectre systemd[12816]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 19 01:01:01 spectre systemd[12816]: Starting Paths. >Mar 19 01:01:01 spectre systemd[12816]: Reached target Paths. >Mar 19 01:01:01 spectre systemd[12816]: Starting Timers. >Mar 19 01:01:01 spectre systemd[12816]: Reached target Timers. >Mar 19 01:01:01 spectre systemd[12816]: Starting Sockets. >Mar 19 01:01:01 spectre systemd[12816]: Reached target Sockets. >Mar 19 01:01:01 spectre systemd[12816]: Starting Basic System. >Mar 19 01:01:01 spectre systemd[12816]: Reached target Basic System. >Mar 19 01:01:01 spectre systemd[12816]: Starting Default. >Mar 19 01:01:01 spectre systemd[12816]: Reached target Default. >Mar 19 01:01:01 spectre systemd[12816]: Startup finished in 11ms. >Mar 19 01:01:01 spectre systemd[1]: Started User Manager for UID 0. >Mar 19 01:01:01 spectre CROND[12829]: (root) CMD (run-parts /etc/cron.hourly) >Mar 19 01:01:01 spectre run-parts[12834]: (/etc/cron.hourly) starting 0anacron >Mar 19 01:01:01 spectre anacron[12843]: Anacron started on 2014-03-19 >Mar 19 01:01:01 spectre anacron[12843]: Normal exit (0 jobs run) >Mar 19 01:01:01 spectre run-parts[12845]: (/etc/cron.hourly) finished 0anacron >Mar 19 01:01:01 spectre run-parts[12848]: (/etc/cron.hourly) starting mcelog.cron >Mar 19 01:01:01 spectre run-parts[12853]: (/etc/cron.hourly) finished mcelog.cron >Mar 19 01:01:01 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 19 01:01:01 spectre systemd[12816]: Stopping Default. >Mar 19 01:01:01 spectre systemd[12816]: Stopped target Default. >Mar 19 01:01:01 spectre systemd[12816]: Stopping Basic System. >Mar 19 01:01:01 spectre systemd[12816]: Stopped target Basic System. >Mar 19 01:01:01 spectre systemd[12816]: Stopping Paths. >Mar 19 01:01:01 spectre systemd[12816]: Stopped target Paths. >Mar 19 01:01:01 spectre systemd[12816]: Stopping Timers. >Mar 19 01:01:01 spectre systemd[12816]: Stopped target Timers. >Mar 19 01:01:01 spectre systemd[12816]: Stopping Sockets. >Mar 19 01:01:01 spectre systemd[12816]: Stopped target Sockets. >Mar 19 01:01:01 spectre systemd[12816]: Starting Shutdown. >Mar 19 01:01:01 spectre systemd[12816]: Reached target Shutdown. >Mar 19 01:01:01 spectre systemd[12816]: Starting Exit the Session... >Mar 19 01:01:01 spectre systemd[12816]: Received SIGRTMIN+24 from PID 12859 (kill). >Mar 19 01:01:01 spectre systemd[12825]: pam_unix(systemd-user:session): session closed for user root >Mar 19 01:01:01 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 19 01:01:01 spectre systemd[1]: Stopping user-0.slice. >Mar 19 01:01:01 spectre systemd[1]: Removed slice user-0.slice. >Mar 19 01:01:01 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 19 01:01:01 spectre systemd-logind[635]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 19 01:01:01 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 19 01:01:01 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 19 01:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 19 01:01:02 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 19 01:01:02 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 19 01:01:02 spectre setroubleshoot[12870]: RunFaultServer(10) >Mar 19 01:01:02 spectre setroubleshoot[12870]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 19 01:01:02 spectre setroubleshoot[12870]: database version 3.0 compatible with current 3.0 version >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 01:01:02 spectre setroubleshoot[12870]: Number of Plugins = 46 >Mar 19 01:01:02 spectre setroubleshoot[12870]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 19 01:01:02 spectre setroubleshoot[12870]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 19 01:01:02 spectre setroubleshoot[12870]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 19 01:01:02 spectre setroubleshoot[12870]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 19 01:01:02 spectre setroubleshoot[12870]: dbus avc(node=spectre type=AVC msg=audit(1395205261.865:1280): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395205261.865:1280): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528dd60 a1=f0800 a2=0 a3=7fa912e81680 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395205261.865:1280): >) called: 1 Connections >Mar 19 01:01:02 spectre setroubleshoot[12870]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395205261.865:1280): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 19 01:01:02 spectre setroubleshoot[12870]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395205261.865:1280): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528dd60 a1=f0800 a2=0 a3=7fa912e81680 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 01:01:02 spectre setroubleshoot[12870]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395205261.865:1280): >Mar 19 01:01:02 spectre setroubleshoot[12870]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 19 01:01:02 spectre setroubleshoot[12870]: dbus avc(node=spectre type=AVC msg=audit(1395205261.865:1281): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395205261.865:1281): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528dd60 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395205261.865:1281): >) called: 1 Connections >Mar 19 01:01:02 spectre setroubleshoot[12870]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395205261.865:1281): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 19 01:01:02 spectre setroubleshoot[12870]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395205261.865:1281): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528dd60 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 01:01:02 spectre setroubleshoot[12870]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395205261.865:1281): >Mar 19 01:01:02 spectre setroubleshoot[12870]: dbus avc(node=spectre type=AVC msg=audit(1395205261.865:1282): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395205261.865:1282): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528dd60 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395205261.865:1282): >) called: 1 Connections >Mar 19 01:01:02 spectre setroubleshoot[12870]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395205261.865:1282): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 19 01:01:02 spectre setroubleshoot[12870]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395205261.865:1282): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528dd60 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 01:01:02 spectre setroubleshoot[12870]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395205261.865:1282): >Mar 19 01:01:02 spectre setroubleshoot[12870]: Plugin Exception restorecon_source >Mar 19 01:01:02 spectre setroubleshoot[12870]: Plugin Exception restorecon >Mar 19 01:01:02 spectre setroubleshoot[12870]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 01:01:02 spectre setroubleshoot[12870]: signature found in database >Mar 19 01:01:02 spectre setroubleshoot[12870]: sending alert to all clients >Mar 19 01:01:02 spectre setroubleshoot[12870]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.restorecon_source previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.rsync_data previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.kernel_modules previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.bind_ports previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.allow_execheap previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.cvs_data previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.catchall previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.wine previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.catchall_labels previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.samba_share previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.sys_module previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.allow_execmod previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.file previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.sys_resource previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.mmap_zero previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.openvpn previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.mozplugger previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.setenforce previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.dac_override previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.public_content previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.associate previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.xen_image previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.chrome previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.leaks previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.sshd_root previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.mounton previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.allow_execstack previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.restorecon previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.swapfile previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.connect_ports previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.vbetool previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.device previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 19 01:01:02 spectre python[12870]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 01:01:02 spectre setroubleshoot[12870]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 01:01:02 spectre setroubleshoot[12870]: signature found in database >Mar 19 01:01:02 spectre setroubleshoot[12870]: sending alert to all clients >Mar 19 01:01:02 spectre setroubleshoot[12870]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.restorecon_source previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.rsync_data previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.kernel_modules previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.bind_ports previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.allow_execheap previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.cvs_data previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.catchall previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.wine previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.catchall_labels previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.samba_share previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.sys_module previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.allow_execmod previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.file previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.sys_resource previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.mmap_zero previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.openvpn previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.mozplugger previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.setenforce previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.dac_override previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.public_content previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.associate previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.xen_image previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.chrome previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.leaks previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.sshd_root previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.mounton previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.allow_execstack previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.restorecon previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.swapfile previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.connect_ports previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.vbetool previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.device previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 19 01:01:02 spectre python[12870]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 01:01:02 spectre setroubleshoot[12870]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 01:01:02 spectre setroubleshoot[12870]: signature found in database >Mar 19 01:01:02 spectre setroubleshoot[12870]: sending alert to all clients >Mar 19 01:01:02 spectre setroubleshoot[12870]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.restorecon_source previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.rsync_data previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.kernel_modules previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.bind_ports previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.allow_execheap previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.cvs_data previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.catchall previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.wine previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.catchall_labels previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.samba_share previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.sys_module previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.allow_execmod previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.file previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.sys_resource previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.mmap_zero previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.openvpn previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.mozplugger previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.setenforce previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.dac_override previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.public_content previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.associate previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.xen_image previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.chrome previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.leaks previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.sshd_root previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.mounton previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.allow_execstack previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.restorecon previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.swapfile previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.connect_ports previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.vbetool previously imported >Mar 19 01:01:02 spectre setroubleshoot[12870]: load_plugins() plugins.device previously imported >Mar 19 01:01:02 spectre python[12870]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 01:01:12 spectre setroubleshoot[12870]: received signal=14 >Mar 19 01:01:12 spectre setroubleshoot[12870]: KeyboardInterrupt in RunFaultServer >Mar 19 01:01:12 spectre setroubleshoot[12870]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 19 01:01:12 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 19 01:01:12 spectre dbus-daemon[637]: string index out of range >Mar 19 01:13:36 spectre systemd[1]: Starting dnf makecache... >Mar 19 01:13:36 spectre dnf[12945]: Config time: 0.006 >Mar 19 01:13:36 spectre dnf[12945]: cachedir: /var/cache/dnf/x86_64/21 >Mar 19 01:13:36 spectre dnf[12945]: dnf version: 0.4.17 >Mar 19 01:13:36 spectre dnf[12945]: Making cache files for all metadata files. >Mar 19 01:13:36 spectre dnf[12945]: rawhide: metadata will expire after 10760 seconds and will be refreshed now >Mar 19 01:13:37 spectre dnf[12945]: reviving: failed for 'rawhide', mismatched sha256 sum. >Mar 19 01:13:37 spectre dnf[12945]: repo: downloading from remote: rawhide >Mar 19 01:13:38 spectre dnf[12945]: Error: Problem with repo 'rawhide': Cannot download repomd.xml: Curl error: Access denied to remote resource for ftp://mirror.uoregon.edu/fedora/development/rawhide/x86_64/os/repodata/repomd.xml >Mar 19 01:13:38 spectre systemd[1]: dnf-makecache.service: main process exited, code=exited, status=1/FAILURE >Mar 19 01:13:38 spectre systemd[1]: Failed to start dnf makecache. >Mar 19 01:13:38 spectre systemd[1]: Unit dnf-makecache.service entered failed state. >Mar 19 02:01:01 spectre systemd[1]: Starting user-0.slice. >Mar 19 02:01:01 spectre systemd[1]: Created slice user-0.slice. >Mar 19 02:01:01 spectre systemd[1]: Starting User Manager for UID 0... >Mar 19 02:01:01 spectre systemd[1]: Starting Session 49 of user root. >Mar 19 02:01:01 spectre systemd[1]: Started Session 49 of user root. >Mar 19 02:01:01 spectre systemd[12956]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 19 02:01:01 spectre systemd[12956]: Starting Paths. >Mar 19 02:01:01 spectre systemd[12956]: Reached target Paths. >Mar 19 02:01:01 spectre systemd[12956]: Starting Timers. >Mar 19 02:01:01 spectre systemd[12956]: Reached target Timers. >Mar 19 02:01:01 spectre systemd[12956]: Starting Sockets. >Mar 19 02:01:01 spectre systemd[12956]: Reached target Sockets. >Mar 19 02:01:01 spectre systemd[12956]: Starting Basic System. >Mar 19 02:01:01 spectre systemd[12956]: Reached target Basic System. >Mar 19 02:01:01 spectre systemd[12956]: Starting Default. >Mar 19 02:01:01 spectre systemd[12956]: Reached target Default. >Mar 19 02:01:01 spectre systemd[12956]: Startup finished in 11ms. >Mar 19 02:01:01 spectre systemd[1]: Started User Manager for UID 0. >Mar 19 02:01:01 spectre CROND[12969]: (root) CMD (run-parts /etc/cron.hourly) >Mar 19 02:01:01 spectre run-parts[12974]: (/etc/cron.hourly) starting 0anacron >Mar 19 02:01:01 spectre anacron[12983]: Anacron started on 2014-03-19 >Mar 19 02:01:01 spectre anacron[12983]: Normal exit (0 jobs run) >Mar 19 02:01:01 spectre run-parts[12985]: (/etc/cron.hourly) finished 0anacron >Mar 19 02:01:01 spectre run-parts[12988]: (/etc/cron.hourly) starting mcelog.cron >Mar 19 02:01:01 spectre run-parts[12993]: (/etc/cron.hourly) finished mcelog.cron >Mar 19 02:01:02 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 19 02:01:02 spectre systemd[12956]: Stopping Default. >Mar 19 02:01:02 spectre systemd[12956]: Stopped target Default. >Mar 19 02:01:02 spectre systemd[12956]: Stopping Basic System. >Mar 19 02:01:02 spectre systemd[12956]: Stopped target Basic System. >Mar 19 02:01:02 spectre systemd[12956]: Stopping Paths. >Mar 19 02:01:02 spectre systemd[12956]: Stopped target Paths. >Mar 19 02:01:02 spectre systemd[12956]: Stopping Timers. >Mar 19 02:01:02 spectre systemd[12956]: Stopped target Timers. >Mar 19 02:01:02 spectre systemd[12956]: Stopping Sockets. >Mar 19 02:01:02 spectre systemd[12956]: Stopped target Sockets. >Mar 19 02:01:02 spectre systemd[12956]: Starting Shutdown. >Mar 19 02:01:02 spectre systemd[12956]: Reached target Shutdown. >Mar 19 02:01:02 spectre systemd[12956]: Starting Exit the Session... >Mar 19 02:01:02 spectre systemd[12956]: Received SIGRTMIN+24 from PID 12997 (kill). >Mar 19 02:01:02 spectre systemd[12965]: pam_unix(systemd-user:session): session closed for user root >Mar 19 02:01:02 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 19 02:01:02 spectre systemd[1]: Stopping user-0.slice. >Mar 19 02:01:02 spectre systemd[1]: Removed slice user-0.slice. >Mar 19 02:01:02 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 19 02:01:02 spectre systemd-logind[635]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 19 02:01:02 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 19 02:01:02 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 19 02:01:02 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 19 02:01:02 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 19 02:01:02 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 19 02:01:02 spectre setroubleshoot[13006]: RunFaultServer(10) >Mar 19 02:01:02 spectre setroubleshoot[13006]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 19 02:01:02 spectre setroubleshoot[13006]: database version 3.0 compatible with current 3.0 version >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 02:01:02 spectre setroubleshoot[13006]: Number of Plugins = 46 >Mar 19 02:01:02 spectre setroubleshoot[13006]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 19 02:01:02 spectre setroubleshoot[13006]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 19 02:01:02 spectre setroubleshoot[13006]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 19 02:01:02 spectre setroubleshoot[13006]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 19 02:01:02 spectre setroubleshoot[13006]: dbus avc(node=spectre type=AVC msg=audit(1395208862.042:1296): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395208862.042:1296): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528fa40 a1=f0800 a2=0 a3=fffffffffffffc98 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395208862.042:1296): >) called: 1 Connections >Mar 19 02:01:02 spectre setroubleshoot[13006]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395208862.42:1296): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 19 02:01:02 spectre setroubleshoot[13006]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395208862.42:1296): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528fa40 a1=f0800 a2=0 a3=fffffffffffffc98 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 02:01:02 spectre setroubleshoot[13006]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395208862.42:1296): >Mar 19 02:01:02 spectre setroubleshoot[13006]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 19 02:01:02 spectre setroubleshoot[13006]: dbus avc(node=spectre type=AVC msg=audit(1395208862.043:1297): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395208862.043:1297): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528fa40 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395208862.043:1297): >) called: 1 Connections >Mar 19 02:01:02 spectre setroubleshoot[13006]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395208862.43:1297): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 19 02:01:02 spectre setroubleshoot[13006]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395208862.43:1297): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528fa40 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 02:01:02 spectre setroubleshoot[13006]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395208862.43:1297): >Mar 19 02:01:02 spectre setroubleshoot[13006]: dbus avc(node=spectre type=AVC msg=audit(1395208862.043:1298): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395208862.043:1298): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528fa40 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395208862.043:1298): >) called: 1 Connections >Mar 19 02:01:02 spectre setroubleshoot[13006]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395208862.43:1298): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 19 02:01:02 spectre setroubleshoot[13006]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395208862.43:1298): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528fa40 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 02:01:02 spectre setroubleshoot[13006]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395208862.43:1298): >Mar 19 02:01:02 spectre setroubleshoot[13006]: Plugin Exception restorecon_source >Mar 19 02:01:02 spectre setroubleshoot[13006]: Plugin Exception restorecon >Mar 19 02:01:02 spectre setroubleshoot[13006]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 02:01:02 spectre setroubleshoot[13006]: signature found in database >Mar 19 02:01:02 spectre setroubleshoot[13006]: sending alert to all clients >Mar 19 02:01:02 spectre setroubleshoot[13006]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.restorecon_source previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.rsync_data previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.kernel_modules previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.bind_ports previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.allow_execheap previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.cvs_data previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.catchall previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.wine previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.catchall_labels previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.samba_share previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.sys_module previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.allow_execmod previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.file previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.sys_resource previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.mmap_zero previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.openvpn previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.mozplugger previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.setenforce previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.dac_override previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.public_content previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.associate previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.xen_image previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.chrome previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.leaks previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.sshd_root previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.mounton previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.allow_execstack previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.restorecon previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.swapfile previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.connect_ports previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.vbetool previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.device previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 19 02:01:02 spectre python[13006]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 02:01:02 spectre setroubleshoot[13006]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 02:01:02 spectre setroubleshoot[13006]: signature found in database >Mar 19 02:01:02 spectre setroubleshoot[13006]: sending alert to all clients >Mar 19 02:01:02 spectre setroubleshoot[13006]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.restorecon_source previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.rsync_data previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.kernel_modules previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.bind_ports previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.allow_execheap previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.cvs_data previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.catchall previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.wine previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.catchall_labels previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.samba_share previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.sys_module previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.allow_execmod previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.file previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.sys_resource previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.mmap_zero previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.openvpn previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.mozplugger previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.setenforce previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.dac_override previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.public_content previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.associate previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.xen_image previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.chrome previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.leaks previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.sshd_root previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.mounton previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.allow_execstack previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.restorecon previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.swapfile previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.connect_ports previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.vbetool previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.device previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 19 02:01:02 spectre python[13006]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 02:01:02 spectre setroubleshoot[13006]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 02:01:02 spectre setroubleshoot[13006]: signature found in database >Mar 19 02:01:02 spectre setroubleshoot[13006]: sending alert to all clients >Mar 19 02:01:02 spectre setroubleshoot[13006]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.restorecon_source previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.rsync_data previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.kernel_modules previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.bind_ports previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.allow_execheap previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.cvs_data previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.catchall previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.wine previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.catchall_labels previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.samba_share previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.sys_module previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.allow_execmod previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.file previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.sys_resource previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.mmap_zero previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.openvpn previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.mozplugger previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.setenforce previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.dac_override previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.public_content previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.associate previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.xen_image previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.chrome previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.leaks previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.sshd_root previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.mounton previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.allow_execstack previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.restorecon previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.swapfile previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.connect_ports previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.vbetool previously imported >Mar 19 02:01:02 spectre setroubleshoot[13006]: load_plugins() plugins.device previously imported >Mar 19 02:01:02 spectre python[13006]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 02:01:12 spectre setroubleshoot[13006]: received signal=14 >Mar 19 02:01:12 spectre setroubleshoot[13006]: KeyboardInterrupt in RunFaultServer >Mar 19 02:01:12 spectre setroubleshoot[13006]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 19 02:01:12 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 19 02:01:12 spectre dbus-daemon[637]: string index out of range >Mar 19 02:13:39 spectre systemd[1]: Starting dnf makecache... >Mar 19 02:13:39 spectre dnf[13104]: Config time: 0.006 >Mar 19 02:13:39 spectre dnf[13104]: cachedir: /var/cache/dnf/x86_64/21 >Mar 19 02:13:39 spectre dnf[13104]: dnf version: 0.4.17 >Mar 19 02:13:39 spectre dnf[13104]: Making cache files for all metadata files. >Mar 19 02:13:39 spectre dnf[13104]: Metadata cache refreshed recently. >Mar 19 02:13:39 spectre systemd[1]: Started dnf makecache. >Mar 19 03:01:01 spectre systemd[1]: Starting user-0.slice. >Mar 19 03:01:01 spectre systemd[1]: Created slice user-0.slice. >Mar 19 03:01:01 spectre systemd[1]: Starting User Manager for UID 0... >Mar 19 03:01:01 spectre systemd[1]: Starting Session 50 of user root. >Mar 19 03:01:01 spectre systemd[1]: Started Session 50 of user root. >Mar 19 03:01:01 spectre systemd[13113]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 19 03:01:01 spectre systemd[13113]: Starting Paths. >Mar 19 03:01:01 spectre systemd[13113]: Reached target Paths. >Mar 19 03:01:01 spectre systemd[13113]: Starting Timers. >Mar 19 03:01:01 spectre systemd[13113]: Reached target Timers. >Mar 19 03:01:01 spectre systemd[13113]: Starting Sockets. >Mar 19 03:01:01 spectre systemd[13113]: Reached target Sockets. >Mar 19 03:01:01 spectre systemd[13113]: Starting Basic System. >Mar 19 03:01:01 spectre systemd[13113]: Reached target Basic System. >Mar 19 03:01:01 spectre systemd[13113]: Starting Default. >Mar 19 03:01:01 spectre systemd[13113]: Reached target Default. >Mar 19 03:01:01 spectre systemd[13113]: Startup finished in 11ms. >Mar 19 03:01:01 spectre systemd[1]: Started User Manager for UID 0. >Mar 19 03:01:01 spectre CROND[13125]: (root) CMD (run-parts /etc/cron.hourly) >Mar 19 03:01:01 spectre run-parts[13129]: (/etc/cron.hourly) starting 0anacron >Mar 19 03:01:01 spectre anacron[13138]: Anacron started on 2014-03-19 >Mar 19 03:01:01 spectre anacron[13138]: Will run job `cron.daily' in 10 min. >Mar 19 03:01:01 spectre anacron[13138]: Jobs will be executed sequentially >Mar 19 03:01:01 spectre run-parts[13140]: (/etc/cron.hourly) finished 0anacron >Mar 19 03:01:01 spectre run-parts[13143]: (/etc/cron.hourly) starting mcelog.cron >Mar 19 03:01:01 spectre run-parts[13148]: (/etc/cron.hourly) finished mcelog.cron >Mar 19 03:11:01 spectre anacron[13138]: Job `cron.daily' started >Mar 19 03:11:01 spectre run-parts[13257]: (/etc/cron.daily) starting logrotate >Mar 19 03:11:01 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 19 03:11:01 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 19 03:11:01 spectre run-parts[13264]: (/etc/cron.daily) finished logrotate >Mar 19 03:11:01 spectre run-parts[13266]: (/etc/cron.daily) starting man-db.cron >Mar 19 03:11:01 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 19 03:11:01 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 19 03:11:01 spectre setroubleshoot[13262]: RunFaultServer(10) >Mar 19 03:11:01 spectre setroubleshoot[13262]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 19 03:11:01 spectre setroubleshoot[13262]: database version 3.0 compatible with current 3.0 version >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 03:11:01 spectre setroubleshoot[13262]: Number of Plugins = 46 >Mar 19 03:11:01 spectre setroubleshoot[13262]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 19 03:11:01 spectre setroubleshoot[13262]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 19 03:11:01 spectre setroubleshoot[13262]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 19 03:11:01 spectre setroubleshoot[13262]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 19 03:11:01 spectre setroubleshoot[13262]: dbus avc(node=spectre type=AVC msg=audit(1395213061.186:1311): avc: denied { write } for pid=13260 comm="logrotate" path=2F72756E2F73797374656D642F73657373696F6E732F35302E726566202864656C6574656429 dev="tmpfs" ino=185901 scontext=system_u:system_r:logrotate_t:s0-s0:c0.c1023 tcontext=system_u:object_r:systemd_logind_sessions_t:s0 tclass=fifo_file >node=spectre type=SYSCALL msg=audit(1395213061.186:1311): arch=c000003e syscall=59 success=yes exit=0 a0=120d5e0 a1=120c5e0 a2=120bf80 a3=8 items=0 ppid=13258 pid=13260 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=50 comm="logrotate" exe="/usr/sbin/logrotate" subj=system_u:system_r:logrotate_t:s0-s0:c0.c1023 key=(null) >node=spectre type=EOE msg=audit(1395213061.186:1311): >) called: 1 Connections >Mar 19 03:11:01 spectre setroubleshoot[13262]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395213061.186:1311): avc: denied { write } for pid=13260 comm="logrotate" path=2F72756E2F73797374656D642F73657373696F6E732F35302E726566202864656C6574656429 dev="tmpfs" ino=185901 scontext=system_u:system_r:logrotate_t:s0-s0:c0.c1023 tcontext=system_u:object_r:systemd_logind_sessions_t:s0 tclass=fifo_file >Mar 19 03:11:01 spectre setroubleshoot[13262]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395213061.186:1311): arch=c000003e syscall=59 success=yes exit=0 a0=120d5e0 a1=120c5e0 a2=120bf80 a3=8 items=0 ppid=13258 pid=13260 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=50 comm="logrotate" exe="/usr/sbin/logrotate" subj=system_u:system_r:logrotate_t:s0-s0:c0.c1023 key=(null) >Mar 19 03:11:01 spectre setroubleshoot[13262]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395213061.186:1311): >Mar 19 03:11:01 spectre setroubleshoot[13262]: analyze_avc() avc=scontext=system_u:system_r:logrotate_t:s0-s0:c0.c1023 tcontext=system_u:object_r:systemd_logind_sessions_t:s0 access=['write'] tclass=fifo_file tpath= >Mar 19 03:11:01 spectre setroubleshoot[13262]: dbus avc(node=spectre type=AVC msg=audit(1395213061.259:1312): avc: denied { write } for pid=13267 comm="man-db.cron" path=2F72756E2F73797374656D642F73657373696F6E732F35302E726566202864656C6574656429 dev="tmpfs" ino=185901 scontext=system_u:system_r:mandb_t:s0-s0:c0.c1023 tcontext=system_u:object_r:systemd_logind_sessions_t:s0 tclass=fifo_file >node=spectre type=SYSCALL msg=audit(1395213061.259:1312): arch=c000003e syscall=59 success=yes exit=0 a0=eaacc0 a1=ea57f0 a2=ea2f60 a3=8 items=0 ppid=13254 pid=13267 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=50 comm="man-db.cron" exe="/usr/bin/bash" subj=system_u:system_r:mandb_t:s0-s0:c0.c1023 key=(null) >node=spectre type=EOE msg=audit(1395213061.259:1312): >) called: 1 Connections >Mar 19 03:11:01 spectre setroubleshoot[13262]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395213061.259:1312): avc: denied { write } for pid=13267 comm="man-db.cron" path=2F72756E2F73797374656D642F73657373696F6E732F35302E726566202864656C6574656429 dev="tmpfs" ino=185901 scontext=system_u:system_r:mandb_t:s0-s0:c0.c1023 tcontext=system_u:object_r:systemd_logind_sessions_t:s0 tclass=fifo_file >Mar 19 03:11:01 spectre setroubleshoot[13262]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395213061.259:1312): arch=c000003e syscall=59 success=yes exit=0 a0=eaacc0 a1=ea57f0 a2=ea2f60 a3=8 items=0 ppid=13254 pid=13267 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=50 comm="man-db.cron" exe="/usr/bin/bash" subj=system_u:system_r:mandb_t:s0-s0:c0.c1023 key=(null) >Mar 19 03:11:01 spectre setroubleshoot[13262]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395213061.259:1312): >Mar 19 03:11:01 spectre setroubleshoot[13262]: Plugin Exception restorecon_source >Mar 19 03:11:01 spectre setroubleshoot[13262]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 03:11:01 spectre setroubleshoot[13262]: signature found in database >Mar 19 03:11:01 spectre setroubleshoot[13262]: sending alert to all clients >Mar 19 03:11:01 spectre setroubleshoot[13262]: SELinux is preventing /usr/sbin/logrotate from write access on the fifo_file . For complete SELinux messages. run sealert -l 301b536e-8c6c-427a-bc27-36034acc1338 >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.restorecon_source previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.rsync_data previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.kernel_modules previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.bind_ports previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.allow_execheap previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.cvs_data previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.catchall previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.wine previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.catchall_labels previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.samba_share previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.sys_module previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.allow_execmod previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.file previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.sys_resource previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.mmap_zero previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.openvpn previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.mozplugger previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.setenforce previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.dac_override previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.public_content previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.associate previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.xen_image previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.chrome previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.leaks previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.sshd_root previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.mounton previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.allow_execstack previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.restorecon previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.swapfile previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.connect_ports previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.vbetool previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.device previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: analyze_avc() avc=scontext=system_u:system_r:mandb_t:s0-s0:c0.c1023 tcontext=system_u:object_r:systemd_logind_sessions_t:s0 access=['write'] tclass=fifo_file tpath= >Mar 19 03:11:01 spectre python[13262]: SELinux is preventing /usr/sbin/logrotate from write access on the fifo_file . > >***** Plugin leaks (86.2 confidence) suggests ***************************** > >If you want to ignore logrotate trying to write access the fifo_file, because you believe it should not need this access. >Then you should report this as a bug. >You can generate a local policy module to dontaudit this access. >Do ># grep /usr/sbin/logrotate /var/log/audit/audit.log | audit2allow -D -M mypol ># semodule -i mypol.pp > >***** Plugin catchall (14.7 confidence) suggests ************************** > >If you believe that logrotate should be allowed write access on the fifo_file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep logrotate /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 03:11:01 spectre setroubleshoot[13262]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 03:11:01 spectre setroubleshoot[13262]: signature found in database >Mar 19 03:11:01 spectre setroubleshoot[13262]: sending alert to all clients >Mar 19 03:11:01 spectre setroubleshoot[13262]: SELinux is preventing /usr/bin/bash from write access on the fifo_file . For complete SELinux messages. run sealert -l 7f66a60f-0426-430e-a44a-4d6a87d3ccc1 >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.restorecon_source previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.rsync_data previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.kernel_modules previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.bind_ports previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.allow_execheap previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.cvs_data previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.catchall previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.wine previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.catchall_labels previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.samba_share previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.sys_module previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.allow_execmod previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.file previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.sys_resource previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.mmap_zero previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.openvpn previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.mozplugger previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.setenforce previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.dac_override previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.public_content previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.associate previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.xen_image previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.chrome previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.leaks previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.sshd_root previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.mounton previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.allow_execstack previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.restorecon previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.swapfile previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.connect_ports previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.vbetool previously imported >Mar 19 03:11:01 spectre setroubleshoot[13262]: load_plugins() plugins.device previously imported >Mar 19 03:11:01 spectre python[13262]: SELinux is preventing /usr/bin/bash from write access on the fifo_file . > >***** Plugin leaks (86.2 confidence) suggests ***************************** > >If you want to ignore bash trying to write access the fifo_file, because you believe it should not need this access. >Then you should report this as a bug. >You can generate a local policy module to dontaudit this access. >Do ># grep /usr/bin/bash /var/log/audit/audit.log | audit2allow -D -M mypol ># semodule -i mypol.pp > >***** Plugin catchall (14.7 confidence) suggests ************************** > >If you believe that bash should be allowed write access on the fifo_file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep man-db.cron /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 03:11:11 spectre setroubleshoot[13262]: received signal=14 >Mar 19 03:11:11 spectre setroubleshoot[13262]: KeyboardInterrupt in RunFaultServer >Mar 19 03:11:11 spectre setroubleshoot[13262]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=2 >Mar 19 03:11:11 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 19 03:11:11 spectre run-parts[13292]: (/etc/cron.daily) finished man-db.cron >Mar 19 03:11:11 spectre run-parts[13294]: (/etc/cron.daily) starting mlocate >Mar 19 03:11:11 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 19 03:11:11 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 19 03:11:11 spectre run-parts[13307]: (/etc/cron.daily) finished mlocate >Mar 19 03:11:11 spectre run-parts[13309]: (/etc/cron.daily) starting prelink >Mar 19 03:11:12 spectre run-parts[13319]: (/etc/cron.daily) finished prelink >Mar 19 03:11:12 spectre anacron[13138]: Job `cron.daily' terminated >Mar 19 03:11:12 spectre anacron[13138]: Normal exit (1 job run) >Mar 19 03:11:12 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 19 03:11:12 spectre systemd[13113]: Stopping Default. >Mar 19 03:11:12 spectre systemd[13113]: Stopped target Default. >Mar 19 03:11:12 spectre systemd[13113]: Stopping Basic System. >Mar 19 03:11:12 spectre systemd[13113]: Stopped target Basic System. >Mar 19 03:11:12 spectre systemd[13113]: Stopping Paths. >Mar 19 03:11:12 spectre systemd[13113]: Stopped target Paths. >Mar 19 03:11:12 spectre systemd[13113]: Stopping Timers. >Mar 19 03:11:12 spectre systemd[13113]: Stopped target Timers. >Mar 19 03:11:12 spectre systemd[13113]: Stopping Sockets. >Mar 19 03:11:12 spectre systemd[13113]: Stopped target Sockets. >Mar 19 03:11:12 spectre systemd[13113]: Starting Shutdown. >Mar 19 03:11:12 spectre systemd[13113]: Reached target Shutdown. >Mar 19 03:11:12 spectre systemd[13113]: Starting Exit the Session... >Mar 19 03:11:12 spectre systemd[13113]: Received SIGRTMIN+24 from PID 13322 (kill). >Mar 19 03:11:12 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 19 03:11:12 spectre systemd[1]: Stopping user-0.slice. >Mar 19 03:11:12 spectre systemd[1]: Removed slice user-0.slice. >Mar 19 03:11:12 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 19 03:11:12 spectre systemd-logind[635]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 19 03:11:12 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 19 03:11:12 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 19 03:11:12 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 19 03:11:12 spectre setroubleshoot[13298]: RunFaultServer(10) >Mar 19 03:11:12 spectre setroubleshoot[13298]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 19 03:11:12 spectre setroubleshoot[13298]: database version 3.0 compatible with current 3.0 version >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 03:11:12 spectre setroubleshoot[13298]: Number of Plugins = 46 >Mar 19 03:11:12 spectre setroubleshoot[13298]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 19 03:11:12 spectre setroubleshoot[13298]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 19 03:11:12 spectre setroubleshoot[13298]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 19 03:11:12 spectre setroubleshoot[13298]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 19 03:11:12 spectre setroubleshoot[13298]: dbus avc(node=spectre type=AVC msg=audit(1395213071.813:1313): avc: denied { write } for pid=13295 comm="mlocate" path=2F72756E2F73797374656D642F73657373696F6E732F35302E726566202864656C6574656429 dev="tmpfs" ino=185901 scontext=system_u:system_r:locate_t:s0-s0:c0.c1023 tcontext=system_u:object_r:systemd_logind_sessions_t:s0 tclass=fifo_file >node=spectre type=SYSCALL msg=audit(1395213071.813:1313): arch=c000003e syscall=59 success=yes exit=0 a0=ea5790 a1=ea57f0 a2=ea2f60 a3=8 items=0 ppid=13254 pid=13295 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=50 comm="mlocate" exe="/usr/bin/bash" subj=system_u:system_r:locate_t:s0-s0:c0.c1023 key=(null) >node=spectre type=EOE msg=audit(1395213071.813:1313): >) called: 1 Connections >Mar 19 03:11:12 spectre setroubleshoot[13298]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395213071.813:1313): avc: denied { write } for pid=13295 comm="mlocate" path=2F72756E2F73797374656D642F73657373696F6E732F35302E726566202864656C6574656429 dev="tmpfs" ino=185901 scontext=system_u:system_r:locate_t:s0-s0:c0.c1023 tcontext=system_u:object_r:systemd_logind_sessions_t:s0 tclass=fifo_file >Mar 19 03:11:12 spectre setroubleshoot[13298]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395213071.813:1313): arch=c000003e syscall=59 success=yes exit=0 a0=ea5790 a1=ea57f0 a2=ea2f60 a3=8 items=0 ppid=13254 pid=13295 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=50 comm="mlocate" exe="/usr/bin/bash" subj=system_u:system_r:locate_t:s0-s0:c0.c1023 key=(null) >Mar 19 03:11:12 spectre setroubleshoot[13298]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395213071.813:1313): >Mar 19 03:11:12 spectre setroubleshoot[13298]: analyze_avc() avc=scontext=system_u:system_r:locate_t:s0-s0:c0.c1023 tcontext=system_u:object_r:systemd_logind_sessions_t:s0 access=['write'] tclass=fifo_file tpath= >Mar 19 03:11:12 spectre setroubleshoot[13298]: dbus avc(node=spectre type=AVC msg=audit(1395213071.994:1314): avc: denied { write } for pid=13310 comm="prelink" path=2F72756E2F73797374656D642F73657373696F6E732F35302E726566202864656C6574656429 dev="tmpfs" ino=185901 scontext=system_u:system_r:prelink_cron_system_t:s0-s0:c0.c1023 tcontext=system_u:object_r:systemd_logind_sessions_t:s0 tclass=fifo_file >node=spectre type=SYSCALL msg=audit(1395213071.994:1314): arch=c000003e syscall=59 success=yes exit=0 a0=eaa790 a1=ea57f0 a2=ea2f60 a3=8 items=0 ppid=13254 pid=13310 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=50 comm="prelink" exe="/usr/bin/bash" subj=system_u:system_r:prelink_cron_system_t:s0-s0:c0.c1023 key=(null) >node=spectre type=EOE msg=audit(1395213071.994:1314): >) called: 1 Connections >Mar 19 03:11:12 spectre setroubleshoot[13298]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395213071.994:1314): avc: denied { write } for pid=13310 comm="prelink" path=2F72756E2F73797374656D642F73657373696F6E732F35302E726566202864656C6574656429 dev="tmpfs" ino=185901 scontext=system_u:system_r:prelink_cron_system_t:s0-s0:c0.c1023 tcontext=system_u:object_r:systemd_logind_sessions_t:s0 tclass=fifo_file >Mar 19 03:11:12 spectre setroubleshoot[13298]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395213071.994:1314): arch=c000003e syscall=59 success=yes exit=0 a0=eaa790 a1=ea57f0 a2=ea2f60 a3=8 items=0 ppid=13254 pid=13310 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=50 comm="prelink" exe="/usr/bin/bash" subj=system_u:system_r:prelink_cron_system_t:s0-s0:c0.c1023 key=(null) >Mar 19 03:11:12 spectre setroubleshoot[13298]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395213071.994:1314): >Mar 19 03:11:12 spectre setroubleshoot[13298]: dbus avc(node=spectre type=AVC msg=audit(1395213072.079:1316): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395213072.079:1316): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528fa60 a1=f0800 a2=0 a3=fffffffffffffc98 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395213072.079:1316): >) called: 1 Connections >Mar 19 03:11:12 spectre setroubleshoot[13298]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395213072.79:1316): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 19 03:11:12 spectre setroubleshoot[13298]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395213072.79:1316): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528fa60 a1=f0800 a2=0 a3=fffffffffffffc98 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 03:11:12 spectre setroubleshoot[13298]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395213072.79:1316): >Mar 19 03:11:12 spectre setroubleshoot[13298]: dbus avc(node=spectre type=AVC msg=audit(1395213072.080:1317): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395213072.080:1317): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528fa60 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395213072.080:1317): >) called: 1 Connections >Mar 19 03:11:12 spectre setroubleshoot[13298]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395213072.80:1317): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 19 03:11:12 spectre setroubleshoot[13298]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395213072.80:1317): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528fa60 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 03:11:12 spectre setroubleshoot[13298]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395213072.80:1317): >Mar 19 03:11:12 spectre setroubleshoot[13298]: dbus avc(node=spectre type=AVC msg=audit(1395213072.080:1318): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395213072.080:1318): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528fa60 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395213072.080:1318): >) called: 1 Connections >Mar 19 03:11:12 spectre setroubleshoot[13298]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395213072.80:1318): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 19 03:11:12 spectre setroubleshoot[13298]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395213072.80:1318): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528fa60 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 03:11:12 spectre setroubleshoot[13298]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395213072.80:1318): >Mar 19 03:11:12 spectre setroubleshoot[13298]: Plugin Exception restorecon_source >Mar 19 03:11:12 spectre setroubleshoot[13298]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 03:11:12 spectre setroubleshoot[13298]: signature found in database >Mar 19 03:11:12 spectre setroubleshoot[13298]: sending alert to all clients >Mar 19 03:11:12 spectre setroubleshoot[13298]: SELinux is preventing /usr/bin/bash from write access on the fifo_file . For complete SELinux messages. run sealert -l c1880770-e7ea-4b51-a75e-f499036c15ec >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.restorecon_source previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.rsync_data previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.kernel_modules previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.bind_ports previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.allow_execheap previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.cvs_data previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.catchall previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.wine previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.catchall_labels previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.samba_share previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.sys_module previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.allow_execmod previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.file previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.sys_resource previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.mmap_zero previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.openvpn previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.mozplugger previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.setenforce previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.dac_override previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.public_content previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.associate previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.xen_image previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.chrome previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.leaks previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.sshd_root previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.mounton previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.allow_execstack previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.restorecon previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.swapfile previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.connect_ports previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.vbetool previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.device previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: analyze_avc() avc=scontext=system_u:system_r:prelink_cron_system_t:s0-s0:c0.c1023 tcontext=system_u:object_r:systemd_logind_sessions_t:s0 access=['write'] tclass=fifo_file tpath= >Mar 19 03:11:12 spectre python[13298]: SELinux is preventing /usr/bin/bash from write access on the fifo_file . > >***** Plugin leaks (86.2 confidence) suggests ***************************** > >If you want to ignore bash trying to write access the fifo_file, because you believe it should not need this access. >Then you should report this as a bug. >You can generate a local policy module to dontaudit this access. >Do ># grep /usr/bin/bash /var/log/audit/audit.log | audit2allow -D -M mypol ># semodule -i mypol.pp > >***** Plugin catchall (14.7 confidence) suggests ************************** > >If you believe that bash should be allowed write access on the fifo_file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep mlocate /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 03:11:12 spectre setroubleshoot[13298]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 03:11:12 spectre setroubleshoot[13298]: signature found in database >Mar 19 03:11:12 spectre setroubleshoot[13298]: sending alert to all clients >Mar 19 03:11:12 spectre setroubleshoot[13298]: SELinux is preventing /usr/bin/bash from write access on the fifo_file . For complete SELinux messages. run sealert -l f60c2f79-fe8f-47e9-ad83-72fd7ebd491a >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.restorecon_source previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.rsync_data previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.kernel_modules previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.bind_ports previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.allow_execheap previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.cvs_data previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.catchall previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.wine previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.catchall_labels previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.samba_share previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.sys_module previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.allow_execmod previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.file previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.sys_resource previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.mmap_zero previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.openvpn previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.mozplugger previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.setenforce previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.dac_override previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.public_content previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.associate previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.xen_image previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.chrome previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.leaks previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.sshd_root previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.mounton previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.allow_execstack previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.restorecon previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.swapfile previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.connect_ports previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.vbetool previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.device previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 19 03:11:12 spectre python[13298]: SELinux is preventing /usr/bin/bash from write access on the fifo_file . > >***** Plugin leaks (86.2 confidence) suggests ***************************** > >If you want to ignore bash trying to write access the fifo_file, because you believe it should not need this access. >Then you should report this as a bug. >You can generate a local policy module to dontaudit this access. >Do ># grep /usr/bin/bash /var/log/audit/audit.log | audit2allow -D -M mypol ># semodule -i mypol.pp > >***** Plugin catchall (14.7 confidence) suggests ************************** > >If you believe that bash should be allowed write access on the fifo_file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep prelink /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 03:11:12 spectre setroubleshoot[13298]: Plugin Exception restorecon >Mar 19 03:11:12 spectre setroubleshoot[13298]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 03:11:12 spectre setroubleshoot[13298]: signature found in database >Mar 19 03:11:12 spectre setroubleshoot[13298]: sending alert to all clients >Mar 19 03:11:12 spectre setroubleshoot[13298]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.restorecon_source previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.rsync_data previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.kernel_modules previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.bind_ports previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.allow_execheap previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.cvs_data previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.catchall previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.wine previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.catchall_labels previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.samba_share previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.sys_module previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.allow_execmod previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.file previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.sys_resource previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.mmap_zero previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.openvpn previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.mozplugger previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.setenforce previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.dac_override previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.public_content previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.associate previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.xen_image previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.chrome previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.leaks previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.sshd_root previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.mounton previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.allow_execstack previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.restorecon previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.swapfile previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.connect_ports previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.vbetool previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.device previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 19 03:11:12 spectre python[13298]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 03:11:12 spectre setroubleshoot[13298]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 03:11:12 spectre setroubleshoot[13298]: signature found in database >Mar 19 03:11:12 spectre setroubleshoot[13298]: sending alert to all clients >Mar 19 03:11:12 spectre setroubleshoot[13298]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.restorecon_source previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.rsync_data previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.kernel_modules previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.bind_ports previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.allow_execheap previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.cvs_data previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.catchall previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.wine previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.catchall_labels previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.samba_share previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.sys_module previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.allow_execmod previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.file previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.sys_resource previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.mmap_zero previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.openvpn previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.mozplugger previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.setenforce previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.dac_override previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.public_content previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.associate previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.xen_image previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.chrome previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.leaks previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.sshd_root previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.mounton previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.allow_execstack previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.restorecon previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.swapfile previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.connect_ports previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.vbetool previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.device previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 19 03:11:12 spectre python[13298]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 03:11:12 spectre setroubleshoot[13298]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 03:11:12 spectre setroubleshoot[13298]: signature found in database >Mar 19 03:11:12 spectre setroubleshoot[13298]: sending alert to all clients >Mar 19 03:11:12 spectre setroubleshoot[13298]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.restorecon_source previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.rsync_data previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.kernel_modules previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.bind_ports previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.allow_execheap previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.cvs_data previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.catchall previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.wine previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.catchall_labels previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.samba_share previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.sys_module previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.allow_execmod previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.file previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.sys_resource previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.mmap_zero previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.openvpn previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.mozplugger previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.setenforce previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.dac_override previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.public_content previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.associate previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.xen_image previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.chrome previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.leaks previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.sshd_root previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.mounton previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.allow_execstack previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.restorecon previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.swapfile previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.connect_ports previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.vbetool previously imported >Mar 19 03:11:12 spectre setroubleshoot[13298]: load_plugins() plugins.device previously imported >Mar 19 03:11:12 spectre python[13298]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 03:11:22 spectre setroubleshoot[13298]: received signal=14 >Mar 19 03:11:22 spectre setroubleshoot[13298]: KeyboardInterrupt in RunFaultServer >Mar 19 03:11:22 spectre setroubleshoot[13298]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=5 >Mar 19 03:11:22 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 19 03:11:22 spectre dbus-daemon[637]: string index out of range >Mar 19 03:13:59 spectre systemd[1]: Starting dnf makecache... >Mar 19 03:13:59 spectre dnf[13452]: Config time: 0.006 >Mar 19 03:13:59 spectre dnf[13452]: cachedir: /var/cache/dnf/x86_64/21 >Mar 19 03:13:59 spectre dnf[13452]: dnf version: 0.4.17 >Mar 19 03:13:59 spectre dnf[13452]: Making cache files for all metadata files. >Mar 19 03:13:59 spectre dnf[13452]: Metadata cache refreshed recently. >Mar 19 03:13:59 spectre systemd[1]: Started dnf makecache. >Mar 19 04:01:01 spectre systemd[1]: Starting user-0.slice. >Mar 19 04:01:01 spectre systemd[1]: Created slice user-0.slice. >Mar 19 04:01:01 spectre systemd[1]: Starting User Manager for UID 0... >Mar 19 04:01:01 spectre systemd[1]: Starting Session 51 of user root. >Mar 19 04:01:01 spectre systemd[1]: Started Session 51 of user root. >Mar 19 04:01:01 spectre systemd[13463]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 19 04:01:01 spectre systemd[13463]: Starting Paths. >Mar 19 04:01:01 spectre systemd[13463]: Reached target Paths. >Mar 19 04:01:01 spectre systemd[13463]: Starting Timers. >Mar 19 04:01:01 spectre systemd[13463]: Reached target Timers. >Mar 19 04:01:01 spectre systemd[13463]: Starting Sockets. >Mar 19 04:01:01 spectre systemd[13463]: Reached target Sockets. >Mar 19 04:01:01 spectre systemd[13463]: Starting Basic System. >Mar 19 04:01:01 spectre systemd[13463]: Reached target Basic System. >Mar 19 04:01:01 spectre systemd[13463]: Starting Default. >Mar 19 04:01:01 spectre systemd[13463]: Reached target Default. >Mar 19 04:01:01 spectre systemd[13463]: Startup finished in 14ms. >Mar 19 04:01:01 spectre systemd[1]: Started User Manager for UID 0. >Mar 19 04:01:01 spectre CROND[13476]: (root) CMD (run-parts /etc/cron.hourly) >Mar 19 04:01:01 spectre run-parts[13480]: (/etc/cron.hourly) starting 0anacron >Mar 19 04:01:01 spectre run-parts[13488]: (/etc/cron.hourly) finished 0anacron >Mar 19 04:01:01 spectre run-parts[13491]: (/etc/cron.hourly) starting mcelog.cron >Mar 19 04:01:01 spectre run-parts[13495]: (/etc/cron.hourly) finished mcelog.cron >Mar 19 04:01:01 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 19 04:01:01 spectre systemd[13463]: Stopping Default. >Mar 19 04:01:01 spectre systemd[13463]: Stopped target Default. >Mar 19 04:01:01 spectre systemd[13463]: Stopping Basic System. >Mar 19 04:01:01 spectre systemd[13463]: Stopped target Basic System. >Mar 19 04:01:01 spectre systemd[13463]: Stopping Paths. >Mar 19 04:01:01 spectre systemd[13463]: Stopped target Paths. >Mar 19 04:01:01 spectre systemd[13463]: Stopping Timers. >Mar 19 04:01:01 spectre systemd[13463]: Stopped target Timers. >Mar 19 04:01:01 spectre systemd[13463]: Stopping Sockets. >Mar 19 04:01:01 spectre systemd[13463]: Stopped target Sockets. >Mar 19 04:01:01 spectre systemd[13463]: Starting Shutdown. >Mar 19 04:01:01 spectre systemd[13463]: Reached target Shutdown. >Mar 19 04:01:01 spectre systemd[13463]: Starting Exit the Session... >Mar 19 04:01:01 spectre systemd[13463]: Received SIGRTMIN+24 from PID 13502 (kill). >Mar 19 04:01:01 spectre systemd[13472]: pam_unix(systemd-user:session): session closed for user root >Mar 19 04:01:01 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 19 04:01:01 spectre systemd[1]: Stopping user-0.slice. >Mar 19 04:01:01 spectre systemd[1]: Removed slice user-0.slice. >Mar 19 04:01:01 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 19 04:01:01 spectre systemd-logind[635]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 19 04:01:01 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 19 04:01:01 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 19 04:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 19 04:01:01 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 19 04:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 19 04:01:01 spectre setroubleshoot[13512]: RunFaultServer(10) >Mar 19 04:01:01 spectre setroubleshoot[13512]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 19 04:01:01 spectre setroubleshoot[13512]: database version 3.0 compatible with current 3.0 version >Mar 19 04:01:01 spectre setroubleshoot[13512]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 04:01:01 spectre setroubleshoot[13512]: Number of Plugins = 46 >Mar 19 04:01:01 spectre setroubleshoot[13512]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 19 04:01:01 spectre setroubleshoot[13512]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 19 04:01:01 spectre setroubleshoot[13512]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 19 04:01:01 spectre setroubleshoot[13512]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 19 04:01:01 spectre setroubleshoot[13512]: dbus avc(node=spectre type=AVC msg=audit(1395216061.417:1333): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395216061.417:1333): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528fa40 a1=f0800 a2=0 a3=7fa912e81680 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395216061.417:1333): >) called: 1 Connections >Mar 19 04:01:01 spectre setroubleshoot[13512]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395216061.417:1333): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 19 04:01:01 spectre setroubleshoot[13512]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395216061.417:1333): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528fa40 a1=f0800 a2=0 a3=7fa912e81680 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 04:01:01 spectre setroubleshoot[13512]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395216061.417:1333): >Mar 19 04:01:01 spectre setroubleshoot[13512]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 19 04:01:01 spectre setroubleshoot[13512]: dbus avc(node=spectre type=AVC msg=audit(1395216061.417:1334): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395216061.417:1334): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528fa40 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395216061.417:1334): >) called: 1 Connections >Mar 19 04:01:01 spectre setroubleshoot[13512]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395216061.417:1334): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 19 04:01:01 spectre setroubleshoot[13512]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395216061.417:1334): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528fa40 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 04:01:01 spectre setroubleshoot[13512]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395216061.417:1334): >Mar 19 04:01:01 spectre setroubleshoot[13512]: dbus avc(node=spectre type=AVC msg=audit(1395216061.418:1335): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395216061.418:1335): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528fa40 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395216061.418:1335): >) called: 1 Connections >Mar 19 04:01:01 spectre setroubleshoot[13512]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395216061.418:1335): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 19 04:01:01 spectre setroubleshoot[13512]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395216061.418:1335): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528fa40 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 04:01:01 spectre setroubleshoot[13512]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395216061.418:1335): >Mar 19 04:01:02 spectre setroubleshoot[13512]: Plugin Exception restorecon_source >Mar 19 04:01:02 spectre setroubleshoot[13512]: Plugin Exception restorecon >Mar 19 04:01:02 spectre setroubleshoot[13512]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 04:01:02 spectre setroubleshoot[13512]: signature found in database >Mar 19 04:01:02 spectre setroubleshoot[13512]: sending alert to all clients >Mar 19 04:01:02 spectre setroubleshoot[13512]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.restorecon_source previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.rsync_data previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.kernel_modules previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.bind_ports previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.allow_execheap previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.cvs_data previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.catchall previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.wine previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.catchall_labels previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.samba_share previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.sys_module previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.allow_execmod previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.file previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.sys_resource previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.mmap_zero previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.openvpn previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.mozplugger previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.setenforce previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.dac_override previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.public_content previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.associate previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.xen_image previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.chrome previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.leaks previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.sshd_root previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.mounton previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.allow_execstack previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.restorecon previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.swapfile previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.connect_ports previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.vbetool previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.device previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 19 04:01:02 spectre python[13512]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 04:01:02 spectre setroubleshoot[13512]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 04:01:02 spectre setroubleshoot[13512]: signature found in database >Mar 19 04:01:02 spectre setroubleshoot[13512]: sending alert to all clients >Mar 19 04:01:02 spectre setroubleshoot[13512]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.restorecon_source previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.rsync_data previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.kernel_modules previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.bind_ports previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.allow_execheap previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.cvs_data previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.catchall previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.wine previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.catchall_labels previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.samba_share previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.sys_module previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.allow_execmod previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.file previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.sys_resource previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.mmap_zero previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.openvpn previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.mozplugger previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.setenforce previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.dac_override previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.public_content previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.associate previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.xen_image previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.chrome previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.leaks previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.sshd_root previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.mounton previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.allow_execstack previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.restorecon previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.swapfile previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.connect_ports previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.vbetool previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.device previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 19 04:01:02 spectre python[13512]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 04:01:02 spectre setroubleshoot[13512]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 04:01:02 spectre setroubleshoot[13512]: signature found in database >Mar 19 04:01:02 spectre setroubleshoot[13512]: sending alert to all clients >Mar 19 04:01:02 spectre setroubleshoot[13512]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.restorecon_source previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.rsync_data previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.kernel_modules previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.bind_ports previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.allow_execheap previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.cvs_data previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.catchall previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.wine previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.catchall_labels previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.samba_share previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.sys_module previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.allow_execmod previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.file previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.sys_resource previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.mmap_zero previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.openvpn previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.mozplugger previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.setenforce previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.dac_override previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.public_content previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.associate previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.xen_image previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.chrome previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.leaks previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.sshd_root previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.mounton previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.allow_execstack previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.restorecon previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.swapfile previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.connect_ports previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.vbetool previously imported >Mar 19 04:01:02 spectre setroubleshoot[13512]: load_plugins() plugins.device previously imported >Mar 19 04:01:02 spectre python[13512]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 04:01:12 spectre setroubleshoot[13512]: received signal=14 >Mar 19 04:01:12 spectre setroubleshoot[13512]: KeyboardInterrupt in RunFaultServer >Mar 19 04:01:12 spectre setroubleshoot[13512]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 19 04:01:12 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 19 04:01:12 spectre dbus-daemon[637]: string index out of range >Mar 19 04:14:08 spectre systemd[1]: Starting dnf makecache... >Mar 19 04:14:08 spectre dnf[13587]: Config time: 0.005 >Mar 19 04:14:08 spectre dnf[13587]: cachedir: /var/cache/dnf/x86_64/21 >Mar 19 04:14:08 spectre dnf[13587]: dnf version: 0.4.17 >Mar 19 04:14:08 spectre dnf[13587]: Making cache files for all metadata files. >Mar 19 04:14:08 spectre dnf[13587]: rawhide: has expired and will be refreshed. >Mar 19 04:14:10 spectre dnf[13587]: reviving: failed for 'rawhide', mismatched sha256 sum. >Mar 19 04:14:10 spectre dnf[13587]: repo: downloading from remote: rawhide >Mar 19 04:14:11 spectre dnf[13587]: Error: Problem with repo 'rawhide': Cannot download repomd.xml: Curl error: Couldn't connect to server for http://mirrors.zimcom.net/pub/fedora/linux/development/rawhide/x86_64/os/repodata/repomd.xml >Mar 19 04:14:11 spectre systemd[1]: dnf-makecache.service: main process exited, code=exited, status=1/FAILURE >Mar 19 04:14:11 spectre systemd[1]: Failed to start dnf makecache. >Mar 19 04:14:11 spectre systemd[1]: Unit dnf-makecache.service entered failed state. >Mar 19 05:01:01 spectre systemd[1]: Starting user-0.slice. >Mar 19 05:01:01 spectre systemd[1]: Created slice user-0.slice. >Mar 19 05:01:01 spectre systemd[1]: Starting User Manager for UID 0... >Mar 19 05:01:01 spectre systemd[1]: Starting Session 52 of user root. >Mar 19 05:01:01 spectre systemd[1]: Started Session 52 of user root. >Mar 19 05:01:01 spectre systemd[13600]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 19 05:01:01 spectre systemd[13600]: Starting Paths. >Mar 19 05:01:01 spectre systemd[13600]: Reached target Paths. >Mar 19 05:01:01 spectre systemd[13600]: Starting Timers. >Mar 19 05:01:01 spectre systemd[13600]: Reached target Timers. >Mar 19 05:01:01 spectre systemd[13600]: Starting Sockets. >Mar 19 05:01:01 spectre systemd[13600]: Reached target Sockets. >Mar 19 05:01:01 spectre systemd[13600]: Starting Basic System. >Mar 19 05:01:01 spectre systemd[13600]: Reached target Basic System. >Mar 19 05:01:01 spectre systemd[13600]: Starting Default. >Mar 19 05:01:01 spectre systemd[13600]: Reached target Default. >Mar 19 05:01:01 spectre systemd[13600]: Startup finished in 10ms. >Mar 19 05:01:01 spectre systemd[1]: Started User Manager for UID 0. >Mar 19 05:01:01 spectre CROND[13612]: (root) CMD (run-parts /etc/cron.hourly) >Mar 19 05:01:01 spectre run-parts[13616]: (/etc/cron.hourly) starting 0anacron >Mar 19 05:01:01 spectre run-parts[13624]: (/etc/cron.hourly) finished 0anacron >Mar 19 05:01:01 spectre run-parts[13627]: (/etc/cron.hourly) starting mcelog.cron >Mar 19 05:01:01 spectre run-parts[13632]: (/etc/cron.hourly) finished mcelog.cron >Mar 19 05:01:01 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 19 05:01:01 spectre systemd[13600]: Stopping Default. >Mar 19 05:01:01 spectre systemd[13600]: Stopped target Default. >Mar 19 05:01:01 spectre systemd[13600]: Stopping Basic System. >Mar 19 05:01:01 spectre systemd[13600]: Stopped target Basic System. >Mar 19 05:01:01 spectre systemd[13600]: Stopping Paths. >Mar 19 05:01:01 spectre systemd[13600]: Stopped target Paths. >Mar 19 05:01:01 spectre systemd[13600]: Stopping Timers. >Mar 19 05:01:01 spectre systemd[13600]: Stopped target Timers. >Mar 19 05:01:01 spectre systemd[13600]: Stopping Sockets. >Mar 19 05:01:01 spectre systemd[13600]: Stopped target Sockets. >Mar 19 05:01:01 spectre systemd[13600]: Starting Shutdown. >Mar 19 05:01:01 spectre systemd[13600]: Reached target Shutdown. >Mar 19 05:01:01 spectre systemd[13600]: Starting Exit the Session... >Mar 19 05:01:01 spectre systemd[13600]: Received SIGRTMIN+24 from PID 13637 (kill). >Mar 19 05:01:01 spectre systemd[13607]: pam_unix(systemd-user:session): session closed for user root >Mar 19 05:01:01 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 19 05:01:01 spectre systemd[1]: Stopping user-0.slice. >Mar 19 05:01:01 spectre systemd[1]: Removed slice user-0.slice. >Mar 19 05:01:01 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 19 05:01:01 spectre systemd-logind[635]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 19 05:01:01 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 19 05:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 19 05:01:01 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 19 05:01:02 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 19 05:01:02 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 19 05:01:02 spectre setroubleshoot[13651]: RunFaultServer(10) >Mar 19 05:01:02 spectre setroubleshoot[13651]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 19 05:01:02 spectre setroubleshoot[13651]: database version 3.0 compatible with current 3.0 version >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 05:01:02 spectre setroubleshoot[13651]: Number of Plugins = 46 >Mar 19 05:01:02 spectre setroubleshoot[13651]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 19 05:01:02 spectre setroubleshoot[13651]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 19 05:01:02 spectre setroubleshoot[13651]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 19 05:01:02 spectre setroubleshoot[13651]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 19 05:01:02 spectre setroubleshoot[13651]: dbus avc(node=spectre type=AVC msg=audit(1395219661.594:1349): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395219661.594:1349): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528f580 a1=f0800 a2=0 a3=fffffffffffff518 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395219661.594:1349): >) called: 1 Connections >Mar 19 05:01:02 spectre setroubleshoot[13651]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395219661.594:1349): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 19 05:01:02 spectre setroubleshoot[13651]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395219661.594:1349): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528f580 a1=f0800 a2=0 a3=fffffffffffff518 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 05:01:02 spectre setroubleshoot[13651]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395219661.594:1349): >Mar 19 05:01:02 spectre setroubleshoot[13651]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 19 05:01:02 spectre setroubleshoot[13651]: dbus avc(node=spectre type=AVC msg=audit(1395219661.595:1350): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395219661.595:1350): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528f580 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395219661.595:1350): >) called: 1 Connections >Mar 19 05:01:02 spectre setroubleshoot[13651]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395219661.595:1350): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 19 05:01:02 spectre setroubleshoot[13651]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395219661.595:1350): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528f580 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 05:01:02 spectre setroubleshoot[13651]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395219661.595:1350): >Mar 19 05:01:02 spectre setroubleshoot[13651]: dbus avc(node=spectre type=AVC msg=audit(1395219661.595:1351): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395219661.595:1351): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528f580 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395219661.595:1351): >) called: 1 Connections >Mar 19 05:01:02 spectre setroubleshoot[13651]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395219661.595:1351): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 19 05:01:02 spectre setroubleshoot[13651]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395219661.595:1351): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528f580 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 05:01:02 spectre setroubleshoot[13651]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395219661.595:1351): >Mar 19 05:01:02 spectre setroubleshoot[13651]: Plugin Exception restorecon_source >Mar 19 05:01:02 spectre setroubleshoot[13651]: Plugin Exception restorecon >Mar 19 05:01:02 spectre setroubleshoot[13651]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 05:01:02 spectre setroubleshoot[13651]: signature found in database >Mar 19 05:01:02 spectre setroubleshoot[13651]: sending alert to all clients >Mar 19 05:01:02 spectre setroubleshoot[13651]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.restorecon_source previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.rsync_data previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.kernel_modules previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.bind_ports previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.allow_execheap previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.cvs_data previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.catchall previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.wine previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.catchall_labels previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.samba_share previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.sys_module previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.allow_execmod previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.file previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.sys_resource previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.mmap_zero previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.openvpn previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.mozplugger previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.setenforce previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.dac_override previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.public_content previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.associate previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.xen_image previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.chrome previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.leaks previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.sshd_root previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.mounton previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.allow_execstack previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.restorecon previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.swapfile previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.connect_ports previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.vbetool previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.device previously imported >Mar 19 05:01:02 spectre python[13651]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 05:01:02 spectre setroubleshoot[13651]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 19 05:01:02 spectre setroubleshoot[13651]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 05:01:02 spectre setroubleshoot[13651]: signature found in database >Mar 19 05:01:02 spectre setroubleshoot[13651]: sending alert to all clients >Mar 19 05:01:02 spectre setroubleshoot[13651]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.restorecon_source previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.rsync_data previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.kernel_modules previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.bind_ports previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.allow_execheap previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.cvs_data previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.catchall previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.wine previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.catchall_labels previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.samba_share previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.sys_module previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.allow_execmod previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.file previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.sys_resource previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.mmap_zero previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.openvpn previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.mozplugger previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.setenforce previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.dac_override previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.public_content previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.associate previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.xen_image previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.chrome previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.leaks previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.sshd_root previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.mounton previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.allow_execstack previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.restorecon previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.swapfile previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.connect_ports previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.vbetool previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.device previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 19 05:01:02 spectre python[13651]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 05:01:02 spectre setroubleshoot[13651]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 05:01:02 spectre setroubleshoot[13651]: signature found in database >Mar 19 05:01:02 spectre setroubleshoot[13651]: sending alert to all clients >Mar 19 05:01:02 spectre setroubleshoot[13651]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.restorecon_source previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.rsync_data previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.kernel_modules previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.bind_ports previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.allow_execheap previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.cvs_data previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.catchall previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.wine previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.catchall_labels previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.samba_share previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.sys_module previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.allow_execmod previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.file previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.sys_resource previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.mmap_zero previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.openvpn previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.mozplugger previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.setenforce previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.dac_override previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.public_content previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.associate previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.xen_image previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.chrome previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.leaks previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.sshd_root previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.mounton previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.allow_execstack previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.restorecon previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.swapfile previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.connect_ports previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.vbetool previously imported >Mar 19 05:01:02 spectre setroubleshoot[13651]: load_plugins() plugins.device previously imported >Mar 19 05:01:02 spectre python[13651]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 05:01:12 spectre setroubleshoot[13651]: received signal=14 >Mar 19 05:01:12 spectre setroubleshoot[13651]: KeyboardInterrupt in RunFaultServer >Mar 19 05:01:12 spectre setroubleshoot[13651]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 19 05:01:12 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 19 05:01:12 spectre dbus-daemon[637]: string index out of range >Mar 19 05:14:29 spectre systemd[1]: Starting dnf makecache... >Mar 19 05:14:29 spectre dnf[13724]: Config time: 0.006 >Mar 19 05:14:29 spectre dnf[13724]: cachedir: /var/cache/dnf/x86_64/21 >Mar 19 05:14:29 spectre dnf[13724]: dnf version: 0.4.17 >Mar 19 05:14:29 spectre dnf[13724]: Making cache files for all metadata files. >Mar 19 05:14:29 spectre dnf[13724]: Metadata cache refreshed recently. >Mar 19 05:14:29 spectre systemd[1]: Started dnf makecache. >Mar 19 06:01:01 spectre systemd[1]: Starting user-0.slice. >Mar 19 06:01:01 spectre systemd[1]: Created slice user-0.slice. >Mar 19 06:01:01 spectre systemd[1]: Starting User Manager for UID 0... >Mar 19 06:01:01 spectre systemd[1]: Starting Session 53 of user root. >Mar 19 06:01:01 spectre systemd[1]: Started Session 53 of user root. >Mar 19 06:01:01 spectre systemd[13735]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 19 06:01:01 spectre systemd[13735]: Starting Paths. >Mar 19 06:01:01 spectre systemd[13735]: Reached target Paths. >Mar 19 06:01:01 spectre systemd[13735]: Starting Timers. >Mar 19 06:01:01 spectre systemd[13735]: Reached target Timers. >Mar 19 06:01:01 spectre systemd[13735]: Starting Sockets. >Mar 19 06:01:01 spectre systemd[13735]: Reached target Sockets. >Mar 19 06:01:01 spectre systemd[13735]: Starting Basic System. >Mar 19 06:01:01 spectre systemd[13735]: Reached target Basic System. >Mar 19 06:01:01 spectre systemd[13735]: Starting Default. >Mar 19 06:01:01 spectre systemd[13735]: Reached target Default. >Mar 19 06:01:01 spectre systemd[13735]: Startup finished in 12ms. >Mar 19 06:01:01 spectre systemd[1]: Started User Manager for UID 0. >Mar 19 06:01:01 spectre CROND[13750]: (root) CMD (run-parts /etc/cron.hourly) >Mar 19 06:01:01 spectre run-parts[13754]: (/etc/cron.hourly) starting 0anacron >Mar 19 06:01:01 spectre run-parts[13762]: (/etc/cron.hourly) finished 0anacron >Mar 19 06:01:01 spectre run-parts[13765]: (/etc/cron.hourly) starting mcelog.cron >Mar 19 06:01:01 spectre run-parts[13769]: (/etc/cron.hourly) finished mcelog.cron >Mar 19 06:01:01 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 19 06:01:01 spectre systemd[13735]: Stopping Default. >Mar 19 06:01:01 spectre systemd[13735]: Stopped target Default. >Mar 19 06:01:01 spectre systemd[13735]: Stopping Basic System. >Mar 19 06:01:01 spectre systemd[13735]: Stopped target Basic System. >Mar 19 06:01:01 spectre systemd[13735]: Stopping Paths. >Mar 19 06:01:01 spectre systemd[13735]: Stopped target Paths. >Mar 19 06:01:01 spectre systemd[13735]: Stopping Timers. >Mar 19 06:01:01 spectre systemd[13735]: Stopped target Timers. >Mar 19 06:01:01 spectre systemd[13735]: Stopping Sockets. >Mar 19 06:01:01 spectre systemd[13735]: Stopped target Sockets. >Mar 19 06:01:01 spectre systemd[13735]: Starting Shutdown. >Mar 19 06:01:01 spectre systemd[13735]: Reached target Shutdown. >Mar 19 06:01:01 spectre systemd[13735]: Starting Exit the Session... >Mar 19 06:01:01 spectre systemd[13735]: Received SIGRTMIN+24 from PID 13774 (kill). >Mar 19 06:01:01 spectre systemd[13746]: pam_unix(systemd-user:session): session closed for user root >Mar 19 06:01:01 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 19 06:01:01 spectre systemd[1]: Stopping user-0.slice. >Mar 19 06:01:01 spectre systemd[1]: Removed slice user-0.slice. >Mar 19 06:01:01 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 19 06:01:01 spectre systemd-logind[635]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 19 06:01:01 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 19 06:01:01 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 19 06:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 19 06:01:02 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 19 06:01:02 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 19 06:01:02 spectre setroubleshoot[13790]: RunFaultServer(10) >Mar 19 06:01:02 spectre setroubleshoot[13790]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 19 06:01:02 spectre setroubleshoot[13790]: database version 3.0 compatible with current 3.0 version >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 06:01:02 spectre setroubleshoot[13790]: Number of Plugins = 46 >Mar 19 06:01:02 spectre setroubleshoot[13790]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 19 06:01:02 spectre setroubleshoot[13790]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 19 06:01:02 spectre setroubleshoot[13790]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 19 06:01:02 spectre setroubleshoot[13790]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 19 06:01:02 spectre setroubleshoot[13790]: dbus avc(node=spectre type=AVC msg=audit(1395223261.786:1366): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395223261.786:1366): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528ff70 a1=f0800 a2=0 a3=fffffffffffffc98 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395223261.786:1366): >) called: 1 Connections >Mar 19 06:01:02 spectre setroubleshoot[13790]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395223261.786:1366): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 19 06:01:02 spectre setroubleshoot[13790]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395223261.786:1366): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528ff70 a1=f0800 a2=0 a3=fffffffffffffc98 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 06:01:02 spectre setroubleshoot[13790]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395223261.786:1366): >Mar 19 06:01:02 spectre setroubleshoot[13790]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 19 06:01:02 spectre setroubleshoot[13790]: dbus avc(node=spectre type=AVC msg=audit(1395223261.786:1367): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395223261.786:1367): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528ff70 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395223261.786:1367): >) called: 1 Connections >Mar 19 06:01:02 spectre setroubleshoot[13790]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395223261.786:1367): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 19 06:01:02 spectre setroubleshoot[13790]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395223261.786:1367): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528ff70 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 06:01:02 spectre setroubleshoot[13790]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395223261.786:1367): >Mar 19 06:01:02 spectre setroubleshoot[13790]: dbus avc(node=spectre type=AVC msg=audit(1395223261.786:1368): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395223261.786:1368): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528ff70 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395223261.786:1368): >) called: 1 Connections >Mar 19 06:01:02 spectre setroubleshoot[13790]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395223261.786:1368): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 19 06:01:02 spectre setroubleshoot[13790]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395223261.786:1368): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528ff70 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 06:01:02 spectre setroubleshoot[13790]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395223261.786:1368): >Mar 19 06:01:02 spectre setroubleshoot[13790]: Plugin Exception restorecon_source >Mar 19 06:01:02 spectre setroubleshoot[13790]: Plugin Exception restorecon >Mar 19 06:01:02 spectre setroubleshoot[13790]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 06:01:02 spectre setroubleshoot[13790]: signature found in database >Mar 19 06:01:02 spectre setroubleshoot[13790]: sending alert to all clients >Mar 19 06:01:02 spectre setroubleshoot[13790]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.restorecon_source previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.rsync_data previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.kernel_modules previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.bind_ports previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.allow_execheap previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.cvs_data previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.catchall previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.wine previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.catchall_labels previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.samba_share previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.sys_module previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.allow_execmod previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.file previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.sys_resource previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.mmap_zero previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.openvpn previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.mozplugger previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.setenforce previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.dac_override previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.public_content previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.associate previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.xen_image previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.chrome previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.leaks previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.sshd_root previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.mounton previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.allow_execstack previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.restorecon previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.swapfile previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.connect_ports previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.vbetool previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.device previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 19 06:01:02 spectre python[13790]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 06:01:02 spectre setroubleshoot[13790]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 06:01:02 spectre setroubleshoot[13790]: signature found in database >Mar 19 06:01:02 spectre setroubleshoot[13790]: sending alert to all clients >Mar 19 06:01:02 spectre setroubleshoot[13790]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.restorecon_source previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.rsync_data previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.kernel_modules previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.bind_ports previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.allow_execheap previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.cvs_data previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.catchall previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.wine previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.catchall_labels previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.samba_share previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.sys_module previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.allow_execmod previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.file previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.sys_resource previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.mmap_zero previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.openvpn previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.mozplugger previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.setenforce previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.dac_override previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.public_content previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.associate previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.xen_image previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.chrome previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.leaks previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.sshd_root previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.mounton previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.allow_execstack previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.restorecon previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.swapfile previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.connect_ports previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.vbetool previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.device previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 19 06:01:02 spectre python[13790]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 06:01:02 spectre setroubleshoot[13790]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 06:01:02 spectre setroubleshoot[13790]: signature found in database >Mar 19 06:01:02 spectre setroubleshoot[13790]: sending alert to all clients >Mar 19 06:01:02 spectre setroubleshoot[13790]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.restorecon_source previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.rsync_data previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.kernel_modules previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.bind_ports previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.allow_execheap previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.cvs_data previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.catchall previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.wine previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.catchall_labels previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.samba_share previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.sys_module previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.allow_execmod previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.file previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.sys_resource previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.mmap_zero previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.openvpn previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.mozplugger previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.setenforce previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.dac_override previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.public_content previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.associate previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.xen_image previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.chrome previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.leaks previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.sshd_root previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.mounton previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.allow_execstack previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.restorecon previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.swapfile previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.connect_ports previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.vbetool previously imported >Mar 19 06:01:02 spectre setroubleshoot[13790]: load_plugins() plugins.device previously imported >Mar 19 06:01:02 spectre python[13790]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 06:01:12 spectre setroubleshoot[13790]: received signal=14 >Mar 19 06:01:12 spectre setroubleshoot[13790]: KeyboardInterrupt in RunFaultServer >Mar 19 06:01:12 spectre setroubleshoot[13790]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 19 06:01:12 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 19 06:01:12 spectre dbus-daemon[637]: string index out of range >Mar 19 06:14:40 spectre systemd[1]: Starting dnf makecache... >Mar 19 06:14:40 spectre dnf[13877]: Config time: 0.006 >Mar 19 06:14:40 spectre dnf[13877]: cachedir: /var/cache/dnf/x86_64/21 >Mar 19 06:14:40 spectre dnf[13877]: dnf version: 0.4.17 >Mar 19 06:14:40 spectre dnf[13877]: Making cache files for all metadata files. >Mar 19 06:14:40 spectre dnf[13877]: Metadata cache refreshed recently. >Mar 19 06:14:40 spectre systemd[1]: Started dnf makecache. >Mar 19 07:01:01 spectre systemd[1]: Starting user-0.slice. >Mar 19 07:01:01 spectre systemd[1]: Created slice user-0.slice. >Mar 19 07:01:01 spectre systemd[1]: Starting User Manager for UID 0... >Mar 19 07:01:01 spectre systemd[1]: Starting Session 54 of user root. >Mar 19 07:01:01 spectre systemd[1]: Started Session 54 of user root. >Mar 19 07:01:01 spectre systemd[13884]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 19 07:01:01 spectre systemd[13884]: Starting Paths. >Mar 19 07:01:01 spectre systemd[13884]: Reached target Paths. >Mar 19 07:01:01 spectre systemd[13884]: Starting Timers. >Mar 19 07:01:01 spectre systemd[13884]: Reached target Timers. >Mar 19 07:01:01 spectre systemd[13884]: Starting Sockets. >Mar 19 07:01:01 spectre systemd[13884]: Reached target Sockets. >Mar 19 07:01:01 spectre systemd[13884]: Starting Basic System. >Mar 19 07:01:01 spectre systemd[13884]: Reached target Basic System. >Mar 19 07:01:01 spectre systemd[13884]: Starting Default. >Mar 19 07:01:01 spectre systemd[13884]: Reached target Default. >Mar 19 07:01:01 spectre systemd[13884]: Startup finished in 10ms. >Mar 19 07:01:01 spectre systemd[1]: Started User Manager for UID 0. >Mar 19 07:01:01 spectre CROND[13896]: (root) CMD (run-parts /etc/cron.hourly) >Mar 19 07:01:01 spectre run-parts[13900]: (/etc/cron.hourly) starting 0anacron >Mar 19 07:01:01 spectre run-parts[13908]: (/etc/cron.hourly) finished 0anacron >Mar 19 07:01:01 spectre run-parts[13910]: (/etc/cron.hourly) starting mcelog.cron >Mar 19 07:01:01 spectre run-parts[13916]: (/etc/cron.hourly) finished mcelog.cron >Mar 19 07:01:01 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 19 07:01:01 spectre systemd[13884]: Stopping Default. >Mar 19 07:01:01 spectre systemd[13884]: Stopped target Default. >Mar 19 07:01:01 spectre systemd[13884]: Stopping Basic System. >Mar 19 07:01:01 spectre systemd[13884]: Stopped target Basic System. >Mar 19 07:01:01 spectre systemd[13884]: Stopping Paths. >Mar 19 07:01:01 spectre systemd[13884]: Stopped target Paths. >Mar 19 07:01:01 spectre systemd[13884]: Stopping Timers. >Mar 19 07:01:01 spectre systemd[13884]: Stopped target Timers. >Mar 19 07:01:01 spectre systemd[13884]: Stopping Sockets. >Mar 19 07:01:01 spectre systemd[13884]: Stopped target Sockets. >Mar 19 07:01:01 spectre systemd[13884]: Starting Shutdown. >Mar 19 07:01:01 spectre systemd[13884]: Reached target Shutdown. >Mar 19 07:01:01 spectre systemd[13884]: Starting Exit the Session... >Mar 19 07:01:01 spectre systemd[13884]: Received SIGRTMIN+24 from PID 13920 (kill). >Mar 19 07:01:01 spectre systemd[13892]: pam_unix(systemd-user:session): session closed for user root >Mar 19 07:01:01 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 19 07:01:01 spectre systemd[1]: Stopping user-0.slice. >Mar 19 07:01:01 spectre systemd[1]: Removed slice user-0.slice. >Mar 19 07:01:01 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 19 07:01:01 spectre systemd-logind[635]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 19 07:01:01 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 19 07:01:02 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 19 07:01:02 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 19 07:01:02 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 19 07:01:02 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 19 07:01:02 spectre setroubleshoot[13943]: RunFaultServer(10) >Mar 19 07:01:02 spectre setroubleshoot[13943]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 19 07:01:02 spectre setroubleshoot[13943]: database version 3.0 compatible with current 3.0 version >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 07:01:02 spectre setroubleshoot[13943]: Number of Plugins = 46 >Mar 19 07:01:02 spectre setroubleshoot[13943]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 19 07:01:02 spectre setroubleshoot[13943]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 19 07:01:02 spectre setroubleshoot[13943]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 19 07:01:02 spectre setroubleshoot[13943]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 19 07:01:02 spectre setroubleshoot[13943]: dbus avc(node=spectre type=AVC msg=audit(1395226861.960:1383): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395226861.960:1383): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528dd60 a1=f0800 a2=0 a3=7fa912e81680 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395226861.960:1383): >) called: 1 Connections >Mar 19 07:01:02 spectre setroubleshoot[13943]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395226861.960:1383): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 19 07:01:02 spectre setroubleshoot[13943]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395226861.960:1383): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528dd60 a1=f0800 a2=0 a3=7fa912e81680 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 07:01:02 spectre setroubleshoot[13943]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395226861.960:1383): >Mar 19 07:01:02 spectre setroubleshoot[13943]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 19 07:01:02 spectre setroubleshoot[13943]: dbus avc(node=spectre type=AVC msg=audit(1395226861.960:1384): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395226861.960:1384): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528dd60 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395226861.960:1384): >) called: 1 Connections >Mar 19 07:01:02 spectre setroubleshoot[13943]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395226861.960:1384): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 19 07:01:02 spectre setroubleshoot[13943]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395226861.960:1384): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528dd60 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 07:01:02 spectre setroubleshoot[13943]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395226861.960:1384): >Mar 19 07:01:02 spectre setroubleshoot[13943]: dbus avc(node=spectre type=AVC msg=audit(1395226861.960:1385): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395226861.960:1385): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528dd60 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395226861.960:1385): >) called: 1 Connections >Mar 19 07:01:02 spectre setroubleshoot[13943]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395226861.960:1385): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 19 07:01:02 spectre setroubleshoot[13943]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395226861.960:1385): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528dd60 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 07:01:02 spectre setroubleshoot[13943]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395226861.960:1385): >Mar 19 07:01:02 spectre setroubleshoot[13943]: Plugin Exception restorecon_source >Mar 19 07:01:02 spectre setroubleshoot[13943]: Plugin Exception restorecon >Mar 19 07:01:02 spectre setroubleshoot[13943]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 07:01:02 spectre setroubleshoot[13943]: signature found in database >Mar 19 07:01:02 spectre setroubleshoot[13943]: sending alert to all clients >Mar 19 07:01:02 spectre setroubleshoot[13943]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.restorecon_source previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.rsync_data previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.kernel_modules previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.bind_ports previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.allow_execheap previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.cvs_data previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.catchall previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.wine previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.catchall_labels previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.samba_share previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.sys_module previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.allow_execmod previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.file previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.sys_resource previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.mmap_zero previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.openvpn previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.mozplugger previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.setenforce previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.dac_override previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.public_content previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.associate previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.xen_image previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.chrome previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.leaks previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.sshd_root previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.mounton previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.allow_execstack previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.restorecon previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.swapfile previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.connect_ports previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.vbetool previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.device previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 19 07:01:02 spectre python[13943]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 07:01:02 spectre setroubleshoot[13943]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 07:01:02 spectre setroubleshoot[13943]: signature found in database >Mar 19 07:01:02 spectre setroubleshoot[13943]: sending alert to all clients >Mar 19 07:01:02 spectre setroubleshoot[13943]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.restorecon_source previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.rsync_data previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.kernel_modules previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.bind_ports previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.allow_execheap previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.cvs_data previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.catchall previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.wine previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.catchall_labels previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.samba_share previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.sys_module previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.allow_execmod previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.file previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.sys_resource previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.mmap_zero previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.openvpn previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.mozplugger previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.setenforce previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.dac_override previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.public_content previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.associate previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.xen_image previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.chrome previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.leaks previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.sshd_root previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.mounton previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.allow_execstack previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.restorecon previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.swapfile previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.connect_ports previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.vbetool previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.device previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 19 07:01:02 spectre python[13943]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 07:01:02 spectre setroubleshoot[13943]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 07:01:02 spectre setroubleshoot[13943]: signature found in database >Mar 19 07:01:02 spectre setroubleshoot[13943]: sending alert to all clients >Mar 19 07:01:02 spectre setroubleshoot[13943]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.restorecon_source previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.rsync_data previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.kernel_modules previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.bind_ports previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.allow_execheap previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.cvs_data previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.catchall previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.wine previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.catchall_labels previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.samba_share previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.sys_module previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.allow_execmod previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.file previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.sys_resource previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.mmap_zero previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.openvpn previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.mozplugger previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.setenforce previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.dac_override previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.public_content previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.associate previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.xen_image previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.chrome previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.leaks previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.sshd_root previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.mounton previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.allow_execstack previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.restorecon previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.swapfile previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.connect_ports previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.vbetool previously imported >Mar 19 07:01:02 spectre setroubleshoot[13943]: load_plugins() plugins.device previously imported >Mar 19 07:01:02 spectre python[13943]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 07:01:12 spectre setroubleshoot[13943]: received signal=14 >Mar 19 07:01:12 spectre setroubleshoot[13943]: KeyboardInterrupt in RunFaultServer >Mar 19 07:01:12 spectre setroubleshoot[13943]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 19 07:01:12 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 19 07:01:12 spectre dbus-daemon[637]: string index out of range >Mar 19 07:14:40 spectre systemd[1]: Starting dnf makecache... >Mar 19 07:14:40 spectre dnf[14035]: Config time: 0.006 >Mar 19 07:14:40 spectre dnf[14035]: cachedir: /var/cache/dnf/x86_64/21 >Mar 19 07:14:40 spectre dnf[14035]: dnf version: 0.4.17 >Mar 19 07:14:40 spectre dnf[14035]: Making cache files for all metadata files. >Mar 19 07:14:40 spectre dnf[14035]: rawhide: has expired and will be refreshed. >Mar 19 07:14:41 spectre dnf[14035]: reviving: failed for 'rawhide', mismatched sha256 sum. >Mar 19 07:14:41 spectre dnf[14035]: repo: downloading from remote: rawhide >Mar 19 07:15:04 spectre dnf[14035]: hawkey sack setup time: 23.250 >Mar 19 07:15:04 spectre dnf[14035]: Metadata cache created. >Mar 19 07:15:04 spectre systemd[1]: Started dnf makecache. >Mar 19 08:01:01 spectre systemd[1]: Starting user-0.slice. >Mar 19 08:01:01 spectre systemd[1]: Created slice user-0.slice. >Mar 19 08:01:01 spectre systemd[1]: Starting Session 55 of user root. >Mar 19 08:01:01 spectre systemd[1]: Started Session 55 of user root. >Mar 19 08:01:01 spectre systemd[1]: Starting User Manager for UID 0... >Mar 19 08:01:02 spectre systemd[14052]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 19 08:01:02 spectre systemd[14052]: Starting Paths. >Mar 19 08:01:02 spectre systemd[14052]: Reached target Paths. >Mar 19 08:01:02 spectre systemd[14052]: Starting Timers. >Mar 19 08:01:02 spectre systemd[14052]: Reached target Timers. >Mar 19 08:01:02 spectre systemd[14052]: Starting Sockets. >Mar 19 08:01:02 spectre systemd[14052]: Reached target Sockets. >Mar 19 08:01:02 spectre systemd[14052]: Starting Basic System. >Mar 19 08:01:02 spectre systemd[14052]: Reached target Basic System. >Mar 19 08:01:02 spectre systemd[14052]: Starting Default. >Mar 19 08:01:02 spectre systemd[14052]: Reached target Default. >Mar 19 08:01:02 spectre systemd[14052]: Startup finished in 15ms. >Mar 19 08:01:02 spectre systemd[1]: Started User Manager for UID 0. >Mar 19 08:01:02 spectre CROND[14064]: (root) CMD (run-parts /etc/cron.hourly) >Mar 19 08:01:02 spectre run-parts[14068]: (/etc/cron.hourly) starting 0anacron >Mar 19 08:01:02 spectre run-parts[14075]: (/etc/cron.hourly) finished 0anacron >Mar 19 08:01:02 spectre run-parts[14078]: (/etc/cron.hourly) starting mcelog.cron >Mar 19 08:01:02 spectre run-parts[14083]: (/etc/cron.hourly) finished mcelog.cron >Mar 19 08:01:02 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 19 08:01:02 spectre systemd[14052]: Stopping Default. >Mar 19 08:01:02 spectre systemd[14052]: Stopped target Default. >Mar 19 08:01:02 spectre systemd[14052]: Stopping Basic System. >Mar 19 08:01:02 spectre systemd[14052]: Stopped target Basic System. >Mar 19 08:01:02 spectre systemd[14052]: Stopping Paths. >Mar 19 08:01:02 spectre systemd[14052]: Stopped target Paths. >Mar 19 08:01:02 spectre systemd[14052]: Stopping Timers. >Mar 19 08:01:02 spectre systemd[14052]: Stopped target Timers. >Mar 19 08:01:02 spectre systemd[14052]: Stopping Sockets. >Mar 19 08:01:02 spectre systemd[14052]: Stopped target Sockets. >Mar 19 08:01:02 spectre systemd[14052]: Starting Shutdown. >Mar 19 08:01:02 spectre systemd[14052]: Reached target Shutdown. >Mar 19 08:01:02 spectre systemd[14052]: Starting Exit the Session... >Mar 19 08:01:02 spectre systemd[14052]: Received SIGRTMIN+24 from PID 14089 (kill). >Mar 19 08:01:02 spectre systemd[14059]: pam_unix(systemd-user:session): session closed for user root >Mar 19 08:01:02 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 19 08:01:02 spectre systemd[1]: Stopping user-0.slice. >Mar 19 08:01:02 spectre systemd[1]: Removed slice user-0.slice. >Mar 19 08:01:02 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 19 08:01:02 spectre systemd-logind[635]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 19 08:01:02 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 19 08:01:02 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 19 08:01:02 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 19 08:01:02 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 19 08:01:02 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 19 08:01:02 spectre setroubleshoot[14104]: RunFaultServer(10) >Mar 19 08:01:02 spectre setroubleshoot[14104]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 19 08:01:02 spectre setroubleshoot[14104]: database version 3.0 compatible with current 3.0 version >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 08:01:02 spectre setroubleshoot[14104]: Number of Plugins = 46 >Mar 19 08:01:02 spectre setroubleshoot[14104]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 19 08:01:02 spectre setroubleshoot[14104]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 19 08:01:02 spectre setroubleshoot[14104]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 19 08:01:02 spectre setroubleshoot[14104]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 19 08:01:02 spectre setroubleshoot[14104]: dbus avc(node=spectre type=AVC msg=audit(1395230462.163:1400): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395230462.163:1400): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528dbf0 a1=f0800 a2=0 a3=7fa912e81680 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395230462.163:1400): >) called: 1 Connections >Mar 19 08:01:02 spectre setroubleshoot[14104]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395230462.163:1400): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 19 08:01:02 spectre setroubleshoot[14104]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395230462.163:1400): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528dbf0 a1=f0800 a2=0 a3=7fa912e81680 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 08:01:02 spectre setroubleshoot[14104]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395230462.163:1400): >Mar 19 08:01:02 spectre setroubleshoot[14104]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 19 08:01:02 spectre setroubleshoot[14104]: dbus avc(node=spectre type=AVC msg=audit(1395230462.164:1401): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395230462.164:1401): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528dbf0 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395230462.164:1401): >) called: 1 Connections >Mar 19 08:01:02 spectre setroubleshoot[14104]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395230462.164:1401): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 19 08:01:02 spectre setroubleshoot[14104]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395230462.164:1401): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528dbf0 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 08:01:02 spectre setroubleshoot[14104]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395230462.164:1401): >Mar 19 08:01:02 spectre setroubleshoot[14104]: dbus avc(node=spectre type=AVC msg=audit(1395230462.164:1402): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395230462.164:1402): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528dbf0 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395230462.164:1402): >) called: 1 Connections >Mar 19 08:01:02 spectre setroubleshoot[14104]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395230462.164:1402): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 19 08:01:02 spectre setroubleshoot[14104]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395230462.164:1402): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528dbf0 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 08:01:02 spectre setroubleshoot[14104]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395230462.164:1402): >Mar 19 08:01:02 spectre setroubleshoot[14104]: Plugin Exception restorecon_source >Mar 19 08:01:02 spectre setroubleshoot[14104]: Plugin Exception restorecon >Mar 19 08:01:02 spectre setroubleshoot[14104]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 08:01:02 spectre setroubleshoot[14104]: signature found in database >Mar 19 08:01:02 spectre setroubleshoot[14104]: sending alert to all clients >Mar 19 08:01:02 spectre setroubleshoot[14104]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.restorecon_source previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.rsync_data previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.kernel_modules previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.bind_ports previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.allow_execheap previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.cvs_data previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.catchall previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.wine previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.catchall_labels previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.samba_share previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.sys_module previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.allow_execmod previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.file previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.sys_resource previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.mmap_zero previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.openvpn previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.mozplugger previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.setenforce previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.dac_override previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.public_content previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.associate previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.xen_image previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.chrome previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.leaks previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.sshd_root previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.mounton previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.allow_execstack previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.restorecon previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.swapfile previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.connect_ports previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.vbetool previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.device previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 19 08:01:02 spectre python[14104]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 08:01:02 spectre setroubleshoot[14104]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 08:01:02 spectre setroubleshoot[14104]: signature found in database >Mar 19 08:01:02 spectre setroubleshoot[14104]: sending alert to all clients >Mar 19 08:01:02 spectre setroubleshoot[14104]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.restorecon_source previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.rsync_data previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.kernel_modules previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.bind_ports previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.allow_execheap previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.cvs_data previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.catchall previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.wine previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.catchall_labels previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.samba_share previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.sys_module previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.allow_execmod previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.file previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.sys_resource previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.mmap_zero previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.openvpn previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.mozplugger previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.setenforce previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.dac_override previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.public_content previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.associate previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.xen_image previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.chrome previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.leaks previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.sshd_root previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.mounton previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.allow_execstack previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.restorecon previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.swapfile previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.connect_ports previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.vbetool previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.device previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 19 08:01:02 spectre python[14104]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 08:01:02 spectre setroubleshoot[14104]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 08:01:02 spectre setroubleshoot[14104]: signature found in database >Mar 19 08:01:02 spectre setroubleshoot[14104]: sending alert to all clients >Mar 19 08:01:02 spectre setroubleshoot[14104]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.restorecon_source previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.rsync_data previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.kernel_modules previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.bind_ports previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.allow_execheap previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.cvs_data previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.catchall previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.wine previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.catchall_labels previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.samba_share previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.sys_module previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.allow_execmod previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.file previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.sys_resource previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.mmap_zero previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.openvpn previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.mozplugger previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.setenforce previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.dac_override previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.public_content previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.associate previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.xen_image previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.chrome previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.leaks previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.sshd_root previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.mounton previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.allow_execstack previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.restorecon previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.swapfile previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.connect_ports previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.vbetool previously imported >Mar 19 08:01:02 spectre setroubleshoot[14104]: load_plugins() plugins.device previously imported >Mar 19 08:01:02 spectre python[14104]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 08:01:12 spectre setroubleshoot[14104]: received signal=14 >Mar 19 08:01:12 spectre setroubleshoot[14104]: KeyboardInterrupt in RunFaultServer >Mar 19 08:01:12 spectre setroubleshoot[14104]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 19 08:01:12 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 19 08:01:12 spectre dbus-daemon[637]: string index out of range >Mar 19 08:15:12 spectre systemd[1]: Starting dnf makecache... >Mar 19 08:15:12 spectre dnf[14177]: Config time: 0.006 >Mar 19 08:15:12 spectre dnf[14177]: cachedir: /var/cache/dnf/x86_64/21 >Mar 19 08:15:12 spectre dnf[14177]: dnf version: 0.4.17 >Mar 19 08:15:12 spectre dnf[14177]: Making cache files for all metadata files. >Mar 19 08:15:12 spectre dnf[14177]: Metadata cache refreshed recently. >Mar 19 08:15:12 spectre systemd[1]: Started dnf makecache. >Mar 19 09:01:01 spectre systemd[1]: Starting user-0.slice. >Mar 19 09:01:01 spectre systemd[1]: Created slice user-0.slice. >Mar 19 09:01:01 spectre systemd[1]: Starting User Manager for UID 0... >Mar 19 09:01:01 spectre systemd[1]: Starting Session 56 of user root. >Mar 19 09:01:01 spectre systemd[1]: Started Session 56 of user root. >Mar 19 09:01:01 spectre systemd[14188]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 19 09:01:01 spectre systemd[14188]: Starting Paths. >Mar 19 09:01:01 spectre systemd[14188]: Reached target Paths. >Mar 19 09:01:01 spectre systemd[14188]: Starting Timers. >Mar 19 09:01:01 spectre systemd[14188]: Reached target Timers. >Mar 19 09:01:01 spectre systemd[14188]: Starting Sockets. >Mar 19 09:01:01 spectre systemd[14188]: Reached target Sockets. >Mar 19 09:01:01 spectre systemd[14188]: Starting Basic System. >Mar 19 09:01:01 spectre systemd[14188]: Reached target Basic System. >Mar 19 09:01:01 spectre systemd[14188]: Starting Default. >Mar 19 09:01:01 spectre systemd[14188]: Reached target Default. >Mar 19 09:01:01 spectre systemd[14188]: Startup finished in 10ms. >Mar 19 09:01:01 spectre systemd[1]: Started User Manager for UID 0. >Mar 19 09:01:01 spectre CROND[14199]: (root) CMD (run-parts /etc/cron.hourly) >Mar 19 09:01:01 spectre run-parts[14204]: (/etc/cron.hourly) starting 0anacron >Mar 19 09:01:01 spectre run-parts[14212]: (/etc/cron.hourly) finished 0anacron >Mar 19 09:01:01 spectre run-parts[14214]: (/etc/cron.hourly) starting mcelog.cron >Mar 19 09:01:01 spectre run-parts[14220]: (/etc/cron.hourly) finished mcelog.cron >Mar 19 09:01:01 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 19 09:01:01 spectre systemd[14188]: Stopping Default. >Mar 19 09:01:01 spectre systemd[14188]: Stopped target Default. >Mar 19 09:01:01 spectre systemd[14188]: Stopping Basic System. >Mar 19 09:01:01 spectre systemd[14188]: Stopped target Basic System. >Mar 19 09:01:01 spectre systemd[14188]: Stopping Paths. >Mar 19 09:01:01 spectre systemd[14188]: Stopped target Paths. >Mar 19 09:01:01 spectre systemd[14188]: Stopping Timers. >Mar 19 09:01:01 spectre systemd[14188]: Stopped target Timers. >Mar 19 09:01:01 spectre systemd[14188]: Stopping Sockets. >Mar 19 09:01:01 spectre systemd[14188]: Stopped target Sockets. >Mar 19 09:01:01 spectre systemd[14188]: Starting Shutdown. >Mar 19 09:01:01 spectre systemd[14188]: Reached target Shutdown. >Mar 19 09:01:01 spectre systemd[14188]: Starting Exit the Session... >Mar 19 09:01:01 spectre systemd[14188]: Received SIGRTMIN+24 from PID 14224 (kill). >Mar 19 09:01:01 spectre systemd[14195]: pam_unix(systemd-user:session): session closed for user root >Mar 19 09:01:01 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 19 09:01:01 spectre systemd[1]: Stopping user-0.slice. >Mar 19 09:01:01 spectre systemd[1]: Removed slice user-0.slice. >Mar 19 09:01:01 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 19 09:01:01 spectre systemd-logind[635]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 19 09:01:01 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 19 09:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 19 09:01:01 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 19 09:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 19 09:01:01 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 19 09:01:01 spectre setroubleshoot[14240]: RunFaultServer(10) >Mar 19 09:01:01 spectre setroubleshoot[14240]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 19 09:01:01 spectre setroubleshoot[14240]: database version 3.0 compatible with current 3.0 version >Mar 19 09:01:01 spectre setroubleshoot[14240]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 09:01:01 spectre setroubleshoot[14240]: Number of Plugins = 46 >Mar 19 09:01:01 spectre setroubleshoot[14240]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 19 09:01:01 spectre setroubleshoot[14240]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 19 09:01:01 spectre setroubleshoot[14240]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 19 09:01:01 spectre setroubleshoot[14240]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 19 09:01:01 spectre setroubleshoot[14240]: dbus avc(node=spectre type=AVC msg=audit(1395234061.328:1417): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395234061.328:1417): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528ff50 a1=f0800 a2=0 a3=7fa912e81680 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395234061.328:1417): >) called: 1 Connections >Mar 19 09:01:01 spectre setroubleshoot[14240]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395234061.328:1417): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 19 09:01:01 spectre setroubleshoot[14240]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395234061.328:1417): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528ff50 a1=f0800 a2=0 a3=7fa912e81680 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 09:01:01 spectre setroubleshoot[14240]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395234061.328:1417): >Mar 19 09:01:01 spectre setroubleshoot[14240]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 19 09:01:01 spectre setroubleshoot[14240]: dbus avc(node=spectre type=AVC msg=audit(1395234061.328:1418): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395234061.328:1418): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528ff50 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395234061.328:1418): >) called: 1 Connections >Mar 19 09:01:01 spectre setroubleshoot[14240]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395234061.328:1418): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 19 09:01:01 spectre setroubleshoot[14240]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395234061.328:1418): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528ff50 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 09:01:01 spectre setroubleshoot[14240]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395234061.328:1418): >Mar 19 09:01:01 spectre setroubleshoot[14240]: dbus avc(node=spectre type=AVC msg=audit(1395234061.328:1419): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395234061.328:1419): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528ff50 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395234061.328:1419): >) called: 1 Connections >Mar 19 09:01:01 spectre setroubleshoot[14240]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395234061.328:1419): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 19 09:01:01 spectre setroubleshoot[14240]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395234061.328:1419): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528ff50 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 09:01:01 spectre setroubleshoot[14240]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395234061.328:1419): >Mar 19 09:01:01 spectre setroubleshoot[14240]: Plugin Exception restorecon_source >Mar 19 09:01:01 spectre setroubleshoot[14240]: Plugin Exception restorecon >Mar 19 09:01:01 spectre setroubleshoot[14240]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 09:01:01 spectre setroubleshoot[14240]: signature found in database >Mar 19 09:01:01 spectre setroubleshoot[14240]: sending alert to all clients >Mar 19 09:01:01 spectre setroubleshoot[14240]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 19 09:01:01 spectre setroubleshoot[14240]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 09:01:01 spectre setroubleshoot[14240]: load_plugins() plugins.restorecon_source previously imported >Mar 19 09:01:01 spectre setroubleshoot[14240]: load_plugins() plugins.rsync_data previously imported >Mar 19 09:01:01 spectre setroubleshoot[14240]: load_plugins() plugins.kernel_modules previously imported >Mar 19 09:01:01 spectre setroubleshoot[14240]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 09:01:01 spectre setroubleshoot[14240]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 09:01:01 spectre setroubleshoot[14240]: load_plugins() plugins.bind_ports previously imported >Mar 19 09:01:01 spectre setroubleshoot[14240]: load_plugins() plugins.allow_execheap previously imported >Mar 19 09:01:01 spectre setroubleshoot[14240]: load_plugins() plugins.cvs_data previously imported >Mar 19 09:01:01 spectre setroubleshoot[14240]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 09:01:01 spectre setroubleshoot[14240]: load_plugins() plugins.catchall previously imported >Mar 19 09:01:01 spectre setroubleshoot[14240]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 09:01:01 spectre setroubleshoot[14240]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 09:01:01 spectre setroubleshoot[14240]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 09:01:01 spectre setroubleshoot[14240]: load_plugins() plugins.wine previously imported >Mar 19 09:01:01 spectre setroubleshoot[14240]: load_plugins() plugins.catchall_labels previously imported >Mar 19 09:01:01 spectre setroubleshoot[14240]: load_plugins() plugins.samba_share previously imported >Mar 19 09:01:01 spectre setroubleshoot[14240]: load_plugins() plugins.sys_module previously imported >Mar 19 09:01:01 spectre setroubleshoot[14240]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 09:01:01 spectre setroubleshoot[14240]: load_plugins() plugins.allow_execmod previously imported >Mar 19 09:01:01 spectre setroubleshoot[14240]: load_plugins() plugins.file previously imported >Mar 19 09:01:01 spectre setroubleshoot[14240]: load_plugins() plugins.sys_resource previously imported >Mar 19 09:01:01 spectre setroubleshoot[14240]: load_plugins() plugins.mmap_zero previously imported >Mar 19 09:01:01 spectre setroubleshoot[14240]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 09:01:01 spectre setroubleshoot[14240]: load_plugins() plugins.openvpn previously imported >Mar 19 09:01:01 spectre setroubleshoot[14240]: load_plugins() plugins.mozplugger previously imported >Mar 19 09:01:01 spectre setroubleshoot[14240]: load_plugins() plugins.setenforce previously imported >Mar 19 09:01:01 spectre setroubleshoot[14240]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 09:01:01 spectre setroubleshoot[14240]: load_plugins() plugins.dac_override previously imported >Mar 19 09:01:01 spectre setroubleshoot[14240]: load_plugins() plugins.public_content previously imported >Mar 19 09:01:01 spectre setroubleshoot[14240]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 09:01:01 spectre setroubleshoot[14240]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 09:01:01 spectre setroubleshoot[14240]: load_plugins() plugins.associate previously imported >Mar 19 09:01:01 spectre setroubleshoot[14240]: load_plugins() plugins.xen_image previously imported >Mar 19 09:01:01 spectre setroubleshoot[14240]: load_plugins() plugins.chrome previously imported >Mar 19 09:01:01 spectre setroubleshoot[14240]: load_plugins() plugins.leaks previously imported >Mar 19 09:01:01 spectre setroubleshoot[14240]: load_plugins() plugins.sshd_root previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.mounton previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.allow_execstack previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.restorecon previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.swapfile previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.connect_ports previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.vbetool previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.device previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 19 09:01:02 spectre python[14240]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 09:01:02 spectre setroubleshoot[14240]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 09:01:02 spectre setroubleshoot[14240]: signature found in database >Mar 19 09:01:02 spectre setroubleshoot[14240]: sending alert to all clients >Mar 19 09:01:02 spectre setroubleshoot[14240]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.restorecon_source previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.rsync_data previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.kernel_modules previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.bind_ports previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.allow_execheap previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.cvs_data previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.catchall previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.wine previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.catchall_labels previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.samba_share previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.sys_module previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.allow_execmod previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.file previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.sys_resource previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.mmap_zero previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.openvpn previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.mozplugger previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.setenforce previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.dac_override previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.public_content previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.associate previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.xen_image previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.chrome previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.leaks previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.sshd_root previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.mounton previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.allow_execstack previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.restorecon previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.swapfile previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.connect_ports previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.vbetool previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.device previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 19 09:01:02 spectre python[14240]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 09:01:02 spectre setroubleshoot[14240]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 09:01:02 spectre setroubleshoot[14240]: signature found in database >Mar 19 09:01:02 spectre setroubleshoot[14240]: sending alert to all clients >Mar 19 09:01:02 spectre setroubleshoot[14240]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.restorecon_source previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.rsync_data previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.kernel_modules previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.bind_ports previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.allow_execheap previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.cvs_data previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.catchall previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.wine previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.catchall_labels previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.samba_share previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.sys_module previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.allow_execmod previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.file previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.sys_resource previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.mmap_zero previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.openvpn previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.mozplugger previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.setenforce previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.dac_override previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.public_content previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.associate previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.xen_image previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.chrome previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.leaks previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.sshd_root previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.mounton previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.allow_execstack previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.restorecon previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.swapfile previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.connect_ports previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.vbetool previously imported >Mar 19 09:01:02 spectre setroubleshoot[14240]: load_plugins() plugins.device previously imported >Mar 19 09:01:02 spectre python[14240]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 09:01:11 spectre setroubleshoot[14240]: received signal=14 >Mar 19 09:01:11 spectre setroubleshoot[14240]: KeyboardInterrupt in RunFaultServer >Mar 19 09:01:11 spectre setroubleshoot[14240]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 19 09:01:11 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 19 09:01:11 spectre dbus-daemon[637]: string index out of range >Mar 19 09:15:12 spectre systemd[1]: Starting dnf makecache... >Mar 19 09:15:12 spectre dnf[14311]: Config time: 0.005 >Mar 19 09:15:12 spectre dnf[14311]: cachedir: /var/cache/dnf/x86_64/21 >Mar 19 09:15:12 spectre dnf[14311]: dnf version: 0.4.17 >Mar 19 09:15:12 spectre dnf[14311]: Making cache files for all metadata files. >Mar 19 09:15:12 spectre dnf[14311]: Metadata cache refreshed recently. >Mar 19 09:15:13 spectre systemd[1]: Started dnf makecache. >Mar 19 10:01:01 spectre systemd[1]: Starting user-0.slice. >Mar 19 10:01:01 spectre systemd[1]: Created slice user-0.slice. >Mar 19 10:01:01 spectre systemd[1]: Starting User Manager for UID 0... >Mar 19 10:01:01 spectre systemd[1]: Starting Session 57 of user root. >Mar 19 10:01:01 spectre systemd[1]: Started Session 57 of user root. >Mar 19 10:01:01 spectre systemd[14319]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 19 10:01:01 spectre systemd[14319]: Starting Paths. >Mar 19 10:01:01 spectre systemd[14319]: Reached target Paths. >Mar 19 10:01:01 spectre systemd[14319]: Starting Timers. >Mar 19 10:01:01 spectre systemd[14319]: Reached target Timers. >Mar 19 10:01:01 spectre systemd[14319]: Starting Sockets. >Mar 19 10:01:01 spectre systemd[14319]: Reached target Sockets. >Mar 19 10:01:01 spectre systemd[14319]: Starting Basic System. >Mar 19 10:01:01 spectre systemd[14319]: Reached target Basic System. >Mar 19 10:01:01 spectre systemd[14319]: Starting Default. >Mar 19 10:01:01 spectre systemd[14319]: Reached target Default. >Mar 19 10:01:01 spectre systemd[14319]: Startup finished in 10ms. >Mar 19 10:01:01 spectre systemd[1]: Started User Manager for UID 0. >Mar 19 10:01:01 spectre CROND[14332]: (root) CMD (run-parts /etc/cron.hourly) >Mar 19 10:01:01 spectre run-parts[14335]: (/etc/cron.hourly) starting 0anacron >Mar 19 10:01:01 spectre run-parts[14343]: (/etc/cron.hourly) finished 0anacron >Mar 19 10:01:01 spectre run-parts[14345]: (/etc/cron.hourly) starting mcelog.cron >Mar 19 10:01:01 spectre run-parts[14350]: (/etc/cron.hourly) finished mcelog.cron >Mar 19 10:01:01 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 19 10:01:01 spectre systemd[14319]: Stopping Default. >Mar 19 10:01:01 spectre systemd[14319]: Stopped target Default. >Mar 19 10:01:01 spectre systemd[14319]: Stopping Basic System. >Mar 19 10:01:01 spectre systemd[14319]: Stopped target Basic System. >Mar 19 10:01:01 spectre systemd[14319]: Stopping Paths. >Mar 19 10:01:01 spectre systemd[14319]: Stopped target Paths. >Mar 19 10:01:01 spectre systemd[14319]: Stopping Timers. >Mar 19 10:01:01 spectre systemd[14319]: Stopped target Timers. >Mar 19 10:01:01 spectre systemd[14319]: Stopping Sockets. >Mar 19 10:01:01 spectre systemd[14319]: Stopped target Sockets. >Mar 19 10:01:01 spectre systemd[14319]: Starting Shutdown. >Mar 19 10:01:01 spectre systemd[14319]: Reached target Shutdown. >Mar 19 10:01:01 spectre systemd[14319]: Starting Exit the Session... >Mar 19 10:01:01 spectre systemd[14319]: Received SIGRTMIN+24 from PID 14356 (kill). >Mar 19 10:01:01 spectre systemd[14327]: pam_unix(systemd-user:session): session closed for user root >Mar 19 10:01:01 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 19 10:01:01 spectre systemd[1]: Stopping user-0.slice. >Mar 19 10:01:01 spectre systemd[1]: Removed slice user-0.slice. >Mar 19 10:01:01 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 19 10:01:01 spectre systemd-logind[635]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 19 10:01:01 spectre systemd-logind[635]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 19 10:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 19 10:01:01 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 19 10:01:01 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 19 10:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 19 10:01:01 spectre setroubleshoot[14372]: RunFaultServer(10) >Mar 19 10:01:02 spectre setroubleshoot[14372]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 19 10:01:02 spectre setroubleshoot[14372]: database version 3.0 compatible with current 3.0 version >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 10:01:02 spectre setroubleshoot[14372]: Number of Plugins = 46 >Mar 19 10:01:02 spectre setroubleshoot[14372]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 19 10:01:02 spectre setroubleshoot[14372]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 19 10:01:02 spectre setroubleshoot[14372]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 19 10:01:02 spectre setroubleshoot[14372]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 19 10:01:02 spectre setroubleshoot[14372]: dbus avc(node=spectre type=AVC msg=audit(1395237661.498:1434): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395237661.498:1434): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528b170 a1=f0800 a2=0 a3=7fa912e81680 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395237661.498:1434): >) called: 1 Connections >Mar 19 10:01:02 spectre setroubleshoot[14372]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395237661.498:1434): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 19 10:01:02 spectre setroubleshoot[14372]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395237661.498:1434): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528b170 a1=f0800 a2=0 a3=7fa912e81680 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 10:01:02 spectre setroubleshoot[14372]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395237661.498:1434): >Mar 19 10:01:02 spectre setroubleshoot[14372]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 19 10:01:02 spectre setroubleshoot[14372]: dbus avc(node=spectre type=AVC msg=audit(1395237661.498:1435): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395237661.498:1435): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528b170 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395237661.498:1435): >) called: 1 Connections >Mar 19 10:01:02 spectre setroubleshoot[14372]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395237661.498:1435): avc: denied { unmount } for pid=635 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 19 10:01:02 spectre setroubleshoot[14372]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395237661.498:1435): arch=c000003e syscall=166 success=no exit=-13 a0=7fa91528b170 a1=2 a2=0 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 10:01:02 spectre setroubleshoot[14372]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395237661.498:1435): >Mar 19 10:01:02 spectre setroubleshoot[14372]: dbus avc(node=spectre type=AVC msg=audit(1395237661.498:1436): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395237661.498:1436): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528b170 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395237661.498:1436): >) called: 1 Connections >Mar 19 10:01:02 spectre setroubleshoot[14372]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395237661.498:1436): avc: denied { read } for pid=635 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 19 10:01:02 spectre setroubleshoot[14372]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395237661.498:1436): arch=c000003e syscall=2 success=no exit=-13 a0=7fa91528b170 a1=f0800 a2=1 a3=7fa912e81440 items=0 ppid=1 pid=635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 10:01:02 spectre setroubleshoot[14372]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395237661.498:1436): >Mar 19 10:01:02 spectre setroubleshoot[14372]: Plugin Exception restorecon_source >Mar 19 10:01:02 spectre setroubleshoot[14372]: Plugin Exception restorecon >Mar 19 10:01:02 spectre setroubleshoot[14372]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 10:01:02 spectre setroubleshoot[14372]: signature found in database >Mar 19 10:01:02 spectre setroubleshoot[14372]: sending alert to all clients >Mar 19 10:01:02 spectre setroubleshoot[14372]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.restorecon_source previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.rsync_data previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.kernel_modules previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.bind_ports previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.allow_execheap previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.cvs_data previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.catchall previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.wine previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.catchall_labels previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.samba_share previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.sys_module previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.allow_execmod previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.file previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.sys_resource previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.mmap_zero previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.openvpn previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.mozplugger previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.setenforce previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.dac_override previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.public_content previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.associate previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.xen_image previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.chrome previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.leaks previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.sshd_root previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.mounton previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.allow_execstack previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.restorecon previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.swapfile previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.connect_ports previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.vbetool previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.device previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 19 10:01:02 spectre python[14372]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 10:01:02 spectre setroubleshoot[14372]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 10:01:02 spectre setroubleshoot[14372]: signature found in database >Mar 19 10:01:02 spectre setroubleshoot[14372]: sending alert to all clients >Mar 19 10:01:02 spectre setroubleshoot[14372]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.restorecon_source previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.rsync_data previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.kernel_modules previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.bind_ports previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.allow_execheap previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.cvs_data previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.catchall previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.wine previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.catchall_labels previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.samba_share previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.sys_module previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.allow_execmod previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.file previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.sys_resource previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.mmap_zero previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.openvpn previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.mozplugger previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.setenforce previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.dac_override previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.public_content previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.associate previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.xen_image previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.chrome previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.leaks previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.sshd_root previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.mounton previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.allow_execstack previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.restorecon previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.swapfile previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.connect_ports previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.vbetool previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.device previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 19 10:01:02 spectre python[14372]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 10:01:02 spectre setroubleshoot[14372]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 10:01:02 spectre setroubleshoot[14372]: signature found in database >Mar 19 10:01:02 spectre setroubleshoot[14372]: sending alert to all clients >Mar 19 10:01:02 spectre setroubleshoot[14372]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.restorecon_source previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.rsync_data previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.kernel_modules previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.bind_ports previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.allow_execheap previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.cvs_data previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.catchall previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.wine previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.catchall_labels previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.samba_share previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.sys_module previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.allow_execmod previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.file previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.sys_resource previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.mmap_zero previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.openvpn previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.mozplugger previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.setenforce previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.dac_override previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.public_content previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.associate previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.xen_image previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.chrome previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.leaks previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.sshd_root previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.mounton previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.allow_execstack previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.restorecon previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.swapfile previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.connect_ports previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.vbetool previously imported >Mar 19 10:01:02 spectre setroubleshoot[14372]: load_plugins() plugins.device previously imported >Mar 19 10:01:02 spectre python[14372]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 10:01:12 spectre setroubleshoot[14372]: received signal=14 >Mar 19 10:01:12 spectre setroubleshoot[14372]: KeyboardInterrupt in RunFaultServer >Mar 19 10:01:12 spectre setroubleshoot[14372]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 19 10:01:12 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 19 10:01:12 spectre dbus-daemon[637]: string index out of range >Mar 19 10:15:13 spectre systemd[1]: Starting dnf makecache... >Mar 19 10:15:13 spectre dnf[14467]: Config time: 0.006 >Mar 19 10:15:13 spectre dnf[14467]: cachedir: /var/cache/dnf/x86_64/21 >Mar 19 10:15:13 spectre dnf[14467]: dnf version: 0.4.17 >Mar 19 10:15:13 spectre dnf[14467]: Making cache files for all metadata files. >Mar 19 10:15:13 spectre dnf[14467]: rawhide: will expire after 32371 seconds. >Mar 19 10:15:13 spectre dnf[14467]: repo: using cache for: rawhide >Mar 19 10:15:14 spectre dnf[14467]: hawkey sack setup time: 0.129 >Mar 19 10:15:14 spectre dnf[14467]: Metadata cache created. >Mar 19 10:15:14 spectre systemd[1]: Started dnf makecache. >Mar 19 10:33:34 spectre sshd[14472]: Accepted publickey for dshea from 192.168.100.1 port 48009 ssh2: RSA 29:71:d3:be:dc:71:8e:0d:ef:a5:2f:ab:31:0c:82:d4 >Mar 19 10:33:34 spectre sshd[14472]: pam_unix(sshd:session): session opened for user dshea by (uid=0) >Mar 19 10:33:34 spectre systemd-logind[635]: New session 58 of user dshea. >Mar 19 10:33:34 spectre systemd[1]: Starting Session 58 of user dshea. >Mar 19 10:33:34 spectre systemd[1]: Started Session 58 of user dshea. >Mar 19 10:37:52 spectre dbus-daemon[637]: dbus[637]: [system] Activating via systemd: service name='org.freedesktop.PackageKit' unit='packagekit.service' >Mar 19 10:37:52 spectre dbus[637]: [system] Activating via systemd: service name='org.freedesktop.PackageKit' unit='packagekit.service' >Mar 19 10:37:52 spectre systemd[1]: Starting PackageKit Daemon... >Mar 19 10:37:52 spectre PackageKit[14563]: daemon start >Mar 19 10:37:53 spectre dbus[637]: [system] Successfully activated service 'org.freedesktop.PackageKit' >Mar 19 10:37:53 spectre systemd[1]: Started PackageKit Daemon. >Mar 19 10:37:53 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.freedesktop.PackageKit' >Mar 19 10:37:53 spectre PackageKit[14563]: search-file transaction /199_abdcddec from uid 1000 finished with success after 267ms >Mar 19 10:42:57 spectre PackageKit[14563]: daemon quit >Mar 19 10:42:58 spectre packagekitd[14563]: (packagekitd:14563): GLib-CRITICAL **: Source ID 7 was not found when attempting to remove it >Mar 19 10:49:10 spectre sshd[14981]: Accepted publickey for dshea from 192.168.100.1 port 48292 ssh2: RSA 29:71:d3:be:dc:71:8e:0d:ef:a5:2f:ab:31:0c:82:d4 >Mar 19 10:49:10 spectre systemd-logind[635]: New session 59 of user dshea. >Mar 19 10:49:10 spectre systemd[1]: Starting Session 59 of user dshea. >Mar 19 10:49:10 spectre systemd[1]: Started Session 59 of user dshea. >Mar 19 10:49:10 spectre sshd[14981]: pam_unix(sshd:session): session opened for user dshea by (uid=0) >Mar 19 10:49:58 spectre sudo[17355]: dshea : TTY=pts/3 ; PWD=/home/dshea/src/anaconda ; USER=root ; COMMAND=/bin/make -f Makefile.am install-buildrequires >Mar 19 10:50:58 spectre yum[17361]: Updated: audit-libs-2.3.5-1.fc21.x86_64 >Mar 19 10:50:59 spectre yum[17361]: Updated: systemd-libs-211-2.fc21.x86_64 >Mar 19 10:51:00 spectre systemd[1]: Stopping udev Control Socket. >Mar 19 10:51:00 spectre systemd[1]: Closed udev Control Socket. >Mar 19 10:51:00 spectre systemd[1]: Stopping udev Kernel Socket. >Mar 19 10:51:00 spectre systemd[1]: Closed udev Kernel Socket. >Mar 19 10:51:00 spectre systemd[1]: Stopping udev Kernel Device Manager... >Mar 19 10:51:00 spectre systemd[1]: Stopped udev Kernel Device Manager. >Mar 19 10:51:00 spectre dbus-daemon[637]: dbus[637]: [system] Reloaded configuration >Mar 19 10:51:00 spectre dbus[637]: [system] Reloaded configuration >Mar 19 10:51:00 spectre dbus[637]: [system] Reloaded configuration >Mar 19 10:51:00 spectre dbus-daemon[637]: dbus[637]: [system] Reloaded configuration >Mar 19 10:51:00 spectre dbus-daemon[637]: dbus[637]: [system] Reloaded configuration >Mar 19 10:51:00 spectre dbus[637]: [system] Reloaded configuration >Mar 19 10:51:00 spectre dbus[637]: [system] Reloaded configuration >Mar 19 10:51:00 spectre dbus-daemon[637]: dbus[637]: [system] Reloaded configuration >Mar 19 10:51:04 spectre systemd[1]: Reexecuting. >Mar 19 10:51:04 spectre systemd[1]: systemd 211 running in system mode. (+PAM +LIBWRAP +AUDIT +SELINUX +IMA +SYSVINIT +LIBCRYPTSETUP +GCRYPT +ACL +XZ +SECCOMP -APPARMOR) >Mar 19 10:51:04 spectre systemd[1]: Detected virtualization 'kvm'. >Mar 19 10:51:04 spectre systemd[1]: Detected architecture 'x86-64'. >Mar 19 10:51:04 spectre systemd-gpt-auto-generator[17504]: Out of memory. >Mar 19 10:51:04 spectre systemd[17498]: /usr/lib/systemd/system-generators/systemd-gpt-auto-generator failed with error code 1. >Mar 19 10:51:04 spectre systemd[1]: Configuration file /usr/lib/systemd/system/auditd.service is marked world-inaccessible. This has no effect as configuration data is accessible via APIs without restrictions. Proceeding anyway. >Mar 19 10:51:04 spectre systemd[1]: Starting udev Kernel Socket. >Mar 19 10:51:04 spectre systemd[1]: Listening on udev Kernel Socket. >Mar 19 10:51:04 spectre systemd[1]: Starting udev Control Socket. >Mar 19 10:51:04 spectre systemd[1]: Listening on udev Control Socket. >Mar 19 10:51:04 spectre systemd[1]: Starting udev Kernel Device Manager... >Mar 19 10:51:04 spectre systemd-udevd[17509]: starting version 211 >Mar 19 10:51:04 spectre systemd[1]: Started udev Kernel Device Manager. >Mar 19 10:51:05 spectre yum[17361]: Updated: systemd-211-2.fc21.x86_64 >Mar 19 10:51:07 spectre yum[17361]: Updated: libgudev1-211-2.fc21.x86_64 >Mar 19 10:51:11 spectre yum[17361]: Updated: gtk3-3.11.8-2.fc21.x86_64 >Mar 19 10:51:12 spectre yum[17361]: Updated: 1:NetworkManager-glib-0.9.9.1-3.git20140317.fc21.x86_64 >Mar 19 10:51:13 spectre dbus-daemon[637]: dbus[637]: [system] Reloaded configuration >Mar 19 10:51:13 spectre dbus[637]: [system] Reloaded configuration >Mar 19 10:51:13 spectre dbus[637]: [system] Reloaded configuration >Mar 19 10:51:13 spectre dbus-daemon[637]: dbus[637]: [system] Reloaded configuration >Mar 19 10:51:13 spectre dbus[637]: [system] Reloaded configuration >Mar 19 10:51:13 spectre dbus-daemon[637]: dbus[637]: [system] Reloaded configuration >Mar 19 10:51:13 spectre dbus[637]: [system] Reloaded configuration >Mar 19 10:51:13 spectre dbus-daemon[637]: dbus[637]: [system] Reloaded configuration >Mar 19 10:51:15 spectre yum[17361]: Updated: 1:NetworkManager-0.9.9.1-3.git20140317.fc21.x86_64 >Mar 19 10:51:16 spectre yum[17361]: Updated: 1:NetworkManager-wwan-0.9.9.1-3.git20140317.fc21.x86_64 >Mar 19 10:51:17 spectre yum[17361]: Updated: 1:NetworkManager-devel-0.9.9.1-3.git20140317.fc21.x86_64 >Mar 19 10:51:19 spectre yum[17361]: Updated: 1:NetworkManager-glib-devel-0.9.9.1-3.git20140317.fc21.x86_64 >Mar 19 10:51:20 spectre yum[17361]: Updated: 1:NetworkManager-bt-0.9.9.1-3.git20140317.fc21.x86_64 >Mar 19 10:51:20 spectre yum[17361]: Updated: 1:NetworkManager-atm-0.9.9.1-3.git20140317.fc21.x86_64 >Mar 19 10:51:21 spectre yum[17361]: Updated: gtk3-immodule-xim-3.11.8-2.fc21.x86_64 >Mar 19 10:51:27 spectre yum[17361]: Updated: gtk3-devel-3.11.8-2.fc21.x86_64 >Mar 19 10:51:30 spectre yum[17361]: Updated: gtk3-devel-docs-3.11.8-2.fc21.x86_64 >Mar 19 10:51:31 spectre yum[17361]: Updated: audit-2.3.5-1.fc21.x86_64 >Mar 19 10:51:32 spectre yum[17361]: Updated: systemd-python-211-2.fc21.x86_64 >Mar 19 10:51:34 spectre yum[17361]: Updated: dnf-0.4.18-1.fc21.noarch >Mar 19 10:51:35 spectre yum[17361]: Updated: audit-libs-python-2.3.5-1.fc21.x86_64 >Mar 19 10:51:36 spectre yum[17361]: Updated: audit-libs-devel-2.3.5-1.fc21.x86_64 >Mar 19 10:51:38 spectre yum[17361]: Updated: pykickstart-1.99.50-1.fc21.noarch >Mar 19 10:51:43 spectre auditd[601]: The audit daemon is exiting. >Mar 19 10:51:43 spectre kernel: audit: type=1305 audit(1395240703.275:1484): audit_pid=0 old=601 auid=4294967295 ses=4294967295 subj=system_u:system_r:auditd_t:s0 res=1 >Mar 19 10:51:43 spectre kernel: audit: type=1130 audit(1395240703.280:1485): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg=' comm="auditd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Mar 19 10:51:43 spectre kernel: audit: type=1131 audit(1395240703.280:1486): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg=' comm="auditd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Mar 19 10:51:44 spectre systemd[1]: Starting Security Auditing Service... >Mar 19 10:51:44 spectre kernel: audit: type=1305 audit(1395240704.280:1487): audit_backlog_limit=320 old=320 auid=4294967295 ses=4294967295 subj=system_u:system_r:auditctl_t:s0 res=1 >Mar 19 10:51:44 spectre auditctl[17608]: No rules >Mar 19 10:51:44 spectre auditctl[17608]: AUDIT_STATUS: enabled=1 flag=1 pid=0 rate_limit=0 backlog_limit=320 lost=0 backlog=0 >Mar 19 10:51:44 spectre systemd[1]: Started Security Auditing Service. >Mar 19 10:51:44 spectre kernel: audit: type=1130 audit(1395240704.284:1488): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg=' comm="auditd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >Mar 19 10:51:44 spectre auditd[17607]: Started dispatcher: /sbin/audispd pid: 17615 >Mar 19 10:51:44 spectre audispd[17615]: priority_boost_parser called with: 4 >Mar 19 10:51:44 spectre audispd[17615]: max_restarts_parser called with: 10 >Mar 19 10:51:44 spectre audispd[17615]: audispd initialized with q_depth=150 and 1 active plugins >Mar 19 10:51:44 spectre kernel: audit: type=1305 audit(1395240704.287:1489): audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:auditd_t:s0 res=1 >Mar 19 10:51:44 spectre kernel: audit: type=1305 audit(1395240704.288:1490): audit_pid=17607 old=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:auditd_t:s0 res=1 >Mar 19 10:51:44 spectre auditd[17607]: Init complete, auditd 2.3.5 listening for events (startup state enable) >Mar 19 10:51:46 spectre systemd[1]: Reloading. >Mar 19 10:51:46 spectre systemd-gpt-auto-generator[17629]: Out of memory. >Mar 19 10:51:46 spectre systemd[17623]: /usr/lib/systemd/system-generators/systemd-gpt-auto-generator failed with error code 1. >Mar 19 10:51:46 spectre systemd[1]: Configuration file /usr/lib/systemd/system/auditd.service is marked world-inaccessible. This has no effect as configuration data is accessible via APIs without restrictions. Proceeding anyway. >Mar 19 10:51:46 spectre systemd[1]: Stopping dnf makecache timer. >Mar 19 10:51:46 spectre systemd[1]: Starting dnf makecache timer. >Mar 19 10:51:46 spectre systemd[1]: Started dnf makecache timer. >Mar 19 10:51:50 spectre systemd[1]: Reloading. >Mar 19 10:51:50 spectre systemd-gpt-auto-generator[17643]: Out of memory. >Mar 19 10:51:50 spectre systemd[17637]: /usr/lib/systemd/system-generators/systemd-gpt-auto-generator failed with error code 1. >Mar 19 10:51:50 spectre systemd[1]: Configuration file /usr/lib/systemd/system/auditd.service is marked world-inaccessible. This has no effect as configuration data is accessible via APIs without restrictions. Proceeding anyway. >Mar 19 10:51:53 spectre systemd[1]: Reloading. >Mar 19 10:51:53 spectre systemd[17652]: /usr/lib/systemd/system-generators/systemd-gpt-auto-generator failed with error code 1. >Mar 19 10:51:53 spectre systemd-gpt-auto-generator[17658]: Out of memory. >Mar 19 10:51:53 spectre systemd[1]: Configuration file /usr/lib/systemd/system/auditd.service is marked world-inaccessible. This has no effect as configuration data is accessible via APIs without restrictions. Proceeding anyway. >Mar 19 10:51:53 spectre systemd[1]: Stopping Login Service... >Mar 19 10:51:53 spectre systemd[1]: Starting Login Service... >Mar 19 10:51:53 spectre systemd[1]: Started Login Service. >Mar 19 10:51:53 spectre systemd-logind[17665]: New seat seat0. >Mar 19 10:51:53 spectre systemd-logind[17665]: Watching system buttons on /dev/input/event0 (Power Button) >Mar 19 10:51:53 spectre systemd-logind[17665]: New session 59 of user dshea. >Mar 19 10:51:53 spectre systemd-logind[17665]: New session 58 of user dshea. >Mar 19 10:51:53 spectre systemd-logind[17665]: New session 36 of user dshea. >Mar 19 10:51:53 spectre systemd-logind[17665]: New session 34 of user dshea. >Mar 19 10:51:53 spectre systemd-logind[17665]: New session 32 of user dshea. >Mar 19 10:51:53 spectre systemd-logind[17665]: New session 26 of user dshea. >Mar 19 10:51:53 spectre systemd-logind[17665]: New session c1 of user gdm. >Mar 19 10:58:42 spectre sshd[14476]: Received disconnect from 192.168.100.1: 11: disconnected by user >Mar 19 10:58:42 spectre sshd[14472]: pam_unix(sshd:session): session closed for user dshea >Mar 19 10:58:42 spectre systemd-logind[17665]: Removed session 58. >Mar 19 11:01:01 spectre systemd[1]: Starting user-0.slice. >Mar 19 11:01:01 spectre systemd[1]: Created slice user-0.slice. >Mar 19 11:01:01 spectre systemd[1]: Starting User Manager for UID 0... >Mar 19 11:01:01 spectre systemd[1]: Starting Session 60 of user root. >Mar 19 11:01:01 spectre systemd[1]: Started Session 60 of user root. >Mar 19 11:01:01 spectre systemd[25568]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 19 11:01:01 spectre systemd[25568]: Starting Paths. >Mar 19 11:01:01 spectre systemd[25568]: Reached target Paths. >Mar 19 11:01:01 spectre systemd[25568]: Starting Timers. >Mar 19 11:01:01 spectre systemd[25568]: Reached target Timers. >Mar 19 11:01:01 spectre systemd[25568]: Starting Sockets. >Mar 19 11:01:01 spectre systemd[25568]: Reached target Sockets. >Mar 19 11:01:01 spectre systemd[25568]: Starting Basic System. >Mar 19 11:01:01 spectre systemd[25568]: Reached target Basic System. >Mar 19 11:01:01 spectre systemd[25568]: Starting Default. >Mar 19 11:01:01 spectre systemd[25568]: Reached target Default. >Mar 19 11:01:01 spectre systemd[25568]: Startup finished in 12ms. >Mar 19 11:01:01 spectre systemd[1]: Started User Manager for UID 0. >Mar 19 11:01:01 spectre CROND[25581]: (root) CMD (run-parts /etc/cron.hourly) >Mar 19 11:01:01 spectre run-parts[25586]: (/etc/cron.hourly) starting 0anacron >Mar 19 11:01:01 spectre run-parts[25593]: (/etc/cron.hourly) finished 0anacron >Mar 19 11:01:01 spectre run-parts[25596]: (/etc/cron.hourly) starting mcelog.cron >Mar 19 11:01:01 spectre run-parts[25601]: (/etc/cron.hourly) finished mcelog.cron >Mar 19 11:01:01 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 19 11:01:01 spectre systemd[25568]: Stopping Default. >Mar 19 11:01:01 spectre systemd[25568]: Stopped target Default. >Mar 19 11:01:01 spectre systemd[25568]: Stopping Basic System. >Mar 19 11:01:01 spectre systemd[25568]: Stopped target Basic System. >Mar 19 11:01:01 spectre systemd[25568]: Stopping Paths. >Mar 19 11:01:01 spectre systemd[25568]: Stopped target Paths. >Mar 19 11:01:01 spectre systemd[25568]: Stopping Timers. >Mar 19 11:01:01 spectre systemd[25568]: Stopped target Timers. >Mar 19 11:01:01 spectre systemd[25568]: Stopping Sockets. >Mar 19 11:01:01 spectre systemd[25568]: Stopped target Sockets. >Mar 19 11:01:01 spectre systemd[25568]: Starting Shutdown. >Mar 19 11:01:01 spectre systemd[25568]: Reached target Shutdown. >Mar 19 11:01:01 spectre systemd[25568]: Starting Exit the Session... >Mar 19 11:01:01 spectre systemd[25568]: Received SIGRTMIN+24 from PID 25606 (kill). >Mar 19 11:01:01 spectre systemd[25577]: pam_unix(systemd-user:session): session closed for user root >Mar 19 11:01:01 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 19 11:01:01 spectre systemd[1]: Stopping user-0.slice. >Mar 19 11:01:01 spectre systemd[1]: Removed slice user-0.slice. >Mar 19 11:01:01 spectre systemd-logind[17665]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 19 11:01:01 spectre systemd-logind[17665]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 19 11:01:01 spectre systemd-logind[17665]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 19 11:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 19 11:01:01 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 19 11:01:02 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 19 11:01:02 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 19 11:01:02 spectre setroubleshoot[25616]: RunFaultServer(10) >Mar 19 11:01:02 spectre setroubleshoot[25616]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 19 11:01:02 spectre setroubleshoot[25616]: database version 3.0 compatible with current 3.0 version >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 11:01:02 spectre setroubleshoot[25616]: Number of Plugins = 46 >Mar 19 11:01:02 spectre setroubleshoot[25616]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 19 11:01:02 spectre setroubleshoot[25616]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 19 11:01:02 spectre setroubleshoot[25616]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 19 11:01:02 spectre setroubleshoot[25616]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 19 11:01:02 spectre setroubleshoot[25616]: dbus avc(node=spectre type=AVC msg=audit(1395241261.717:1514): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395241261.717:1514): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4ecd20 a1=f0800 a2=0 a3=fffffffffffffa18 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395241261.717:1514): >) called: 1 Connections >Mar 19 11:01:02 spectre setroubleshoot[25616]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395241261.717:1514): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 19 11:01:02 spectre setroubleshoot[25616]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395241261.717:1514): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4ecd20 a1=f0800 a2=0 a3=fffffffffffffa18 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 11:01:02 spectre setroubleshoot[25616]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395241261.717:1514): >Mar 19 11:01:02 spectre setroubleshoot[25616]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 19 11:01:02 spectre setroubleshoot[25616]: dbus avc(node=spectre type=AVC msg=audit(1395241261.717:1515): avc: denied { unmount } for pid=17665 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395241261.717:1515): arch=c000003e syscall=166 success=no exit=-13 a0=7f6abc4ecd20 a1=2 a2=0 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395241261.717:1515): >) called: 1 Connections >Mar 19 11:01:02 spectre setroubleshoot[25616]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395241261.717:1515): avc: denied { unmount } for pid=17665 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 19 11:01:02 spectre setroubleshoot[25616]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395241261.717:1515): arch=c000003e syscall=166 success=no exit=-13 a0=7f6abc4ecd20 a1=2 a2=0 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 11:01:02 spectre setroubleshoot[25616]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395241261.717:1515): >Mar 19 11:01:02 spectre setroubleshoot[25616]: dbus avc(node=spectre type=AVC msg=audit(1395241261.717:1516): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395241261.717:1516): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4ecd20 a1=f0800 a2=1 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395241261.717:1516): >) called: 1 Connections >Mar 19 11:01:02 spectre setroubleshoot[25616]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395241261.717:1516): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 19 11:01:02 spectre setroubleshoot[25616]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395241261.717:1516): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4ecd20 a1=f0800 a2=1 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 11:01:02 spectre setroubleshoot[25616]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395241261.717:1516): >Mar 19 11:01:02 spectre setroubleshoot[25616]: Plugin Exception restorecon_source >Mar 19 11:01:02 spectre setroubleshoot[25616]: Plugin Exception restorecon >Mar 19 11:01:02 spectre setroubleshoot[25616]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 11:01:02 spectre setroubleshoot[25616]: signature found in database >Mar 19 11:01:02 spectre setroubleshoot[25616]: sending alert to all clients >Mar 19 11:01:02 spectre setroubleshoot[25616]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.restorecon_source previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.rsync_data previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.kernel_modules previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.bind_ports previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.allow_execheap previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.cvs_data previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.catchall previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.wine previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.catchall_labels previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.samba_share previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.sys_module previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.allow_execmod previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.file previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.sys_resource previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.mmap_zero previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.openvpn previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.mozplugger previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.setenforce previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.dac_override previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.public_content previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.associate previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.xen_image previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.chrome previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.leaks previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.sshd_root previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.mounton previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.allow_execstack previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.restorecon previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.swapfile previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.connect_ports previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.vbetool previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.device previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 19 11:01:02 spectre python[25616]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 11:01:02 spectre setroubleshoot[25616]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 11:01:02 spectre setroubleshoot[25616]: signature found in database >Mar 19 11:01:02 spectre setroubleshoot[25616]: sending alert to all clients >Mar 19 11:01:02 spectre setroubleshoot[25616]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.restorecon_source previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.rsync_data previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.kernel_modules previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.bind_ports previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.allow_execheap previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.cvs_data previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.catchall previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.wine previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.catchall_labels previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.samba_share previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.sys_module previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.allow_execmod previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.file previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.sys_resource previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.mmap_zero previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.openvpn previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.mozplugger previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.setenforce previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.dac_override previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.public_content previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.associate previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.xen_image previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.chrome previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.leaks previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.sshd_root previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.mounton previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.allow_execstack previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.restorecon previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.swapfile previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.connect_ports previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.vbetool previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.device previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 19 11:01:02 spectre python[25616]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 11:01:02 spectre setroubleshoot[25616]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 11:01:02 spectre setroubleshoot[25616]: signature found in database >Mar 19 11:01:02 spectre setroubleshoot[25616]: sending alert to all clients >Mar 19 11:01:02 spectre setroubleshoot[25616]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.restorecon_source previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.rsync_data previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.kernel_modules previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.bind_ports previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.allow_execheap previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.cvs_data previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.catchall previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.wine previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.catchall_labels previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.samba_share previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.sys_module previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.allow_execmod previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.file previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.sys_resource previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.mmap_zero previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.openvpn previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.mozplugger previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.setenforce previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.dac_override previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.public_content previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.associate previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.xen_image previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.chrome previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.leaks previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.sshd_root previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.mounton previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.allow_execstack previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.restorecon previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.swapfile previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.connect_ports previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.vbetool previously imported >Mar 19 11:01:02 spectre setroubleshoot[25616]: load_plugins() plugins.device previously imported >Mar 19 11:01:02 spectre python[25616]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 11:01:12 spectre setroubleshoot[25616]: received signal=14 >Mar 19 11:01:12 spectre setroubleshoot[25616]: KeyboardInterrupt in RunFaultServer >Mar 19 11:01:12 spectre setroubleshoot[25616]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 19 11:01:12 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 19 11:01:12 spectre dbus-daemon[637]: string index out of range >Mar 19 11:15:14 spectre systemd[1]: Starting dnf makecache... >Mar 19 11:15:14 spectre dnf[25716]: Config time: 0.006 >Mar 19 11:15:14 spectre dnf[25716]: cachedir: /var/cache/dnf/x86_64/21 >Mar 19 11:15:14 spectre dnf[25716]: dnf version: 0.4.18 >Mar 19 11:15:14 spectre dnf[25716]: Making cache files for all metadata files. >Mar 19 11:15:14 spectre dnf[25716]: Metadata cache refreshed recently. >Mar 19 11:15:14 spectre systemd[1]: Started dnf makecache. >Mar 19 11:40:57 spectre sshd[3500]: Received disconnect from 192.168.100.1: 11: disconnected by user >Mar 19 11:40:57 spectre sshd[3482]: pam_unix(sshd:session): session closed for user dshea >Mar 19 11:40:57 spectre systemd-logind[17665]: Removed session 26. >Mar 19 11:41:02 spectre sshd[11950]: Received disconnect from 192.168.100.1: 11: disconnected by user >Mar 19 11:41:02 spectre sshd[11946]: pam_unix(sshd:session): session closed for user dshea >Mar 19 11:41:02 spectre systemd-logind[17665]: Removed session 32. >Mar 19 11:58:32 spectre sshd[14985]: Received disconnect from 192.168.100.1: 11: disconnected by user >Mar 19 11:58:32 spectre sshd[14981]: pam_unix(sshd:session): session closed for user dshea >Mar 19 11:58:32 spectre systemd-logind[17665]: Removed session 59. >Mar 19 12:01:01 spectre systemd[1]: Starting user-0.slice. >Mar 19 12:01:01 spectre systemd[1]: Created slice user-0.slice. >Mar 19 12:01:01 spectre systemd[1]: Starting User Manager for UID 0... >Mar 19 12:01:01 spectre systemd[1]: Starting Session 61 of user root. >Mar 19 12:01:01 spectre systemd[1]: Started Session 61 of user root. >Mar 19 12:01:01 spectre systemd[25882]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 19 12:01:01 spectre systemd[25882]: Starting Paths. >Mar 19 12:01:01 spectre systemd[25882]: Reached target Paths. >Mar 19 12:01:01 spectre systemd[25882]: Starting Timers. >Mar 19 12:01:01 spectre systemd[25882]: Reached target Timers. >Mar 19 12:01:01 spectre systemd[25882]: Starting Sockets. >Mar 19 12:01:01 spectre systemd[25882]: Reached target Sockets. >Mar 19 12:01:01 spectre systemd[25882]: Starting Basic System. >Mar 19 12:01:01 spectre systemd[25882]: Reached target Basic System. >Mar 19 12:01:01 spectre systemd[25882]: Starting Default. >Mar 19 12:01:01 spectre systemd[25882]: Reached target Default. >Mar 19 12:01:01 spectre systemd[25882]: Startup finished in 15ms. >Mar 19 12:01:01 spectre systemd[1]: Started User Manager for UID 0. >Mar 19 12:01:01 spectre CROND[25894]: (root) CMD (run-parts /etc/cron.hourly) >Mar 19 12:01:01 spectre run-parts[25898]: (/etc/cron.hourly) starting 0anacron >Mar 19 12:01:01 spectre run-parts[25906]: (/etc/cron.hourly) finished 0anacron >Mar 19 12:01:01 spectre run-parts[25908]: (/etc/cron.hourly) starting mcelog.cron >Mar 19 12:01:01 spectre run-parts[25913]: (/etc/cron.hourly) finished mcelog.cron >Mar 19 12:01:01 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 19 12:01:01 spectre systemd[25882]: Stopping Default. >Mar 19 12:01:01 spectre systemd[25882]: Stopped target Default. >Mar 19 12:01:01 spectre systemd[25882]: Stopping Basic System. >Mar 19 12:01:01 spectre systemd[25882]: Stopped target Basic System. >Mar 19 12:01:01 spectre systemd[25882]: Stopping Paths. >Mar 19 12:01:01 spectre systemd[25882]: Stopped target Paths. >Mar 19 12:01:01 spectre systemd[25882]: Stopping Timers. >Mar 19 12:01:01 spectre systemd[25882]: Stopped target Timers. >Mar 19 12:01:01 spectre systemd[25882]: Stopping Sockets. >Mar 19 12:01:01 spectre systemd[25882]: Stopped target Sockets. >Mar 19 12:01:01 spectre systemd[25882]: Starting Shutdown. >Mar 19 12:01:01 spectre systemd[25882]: Reached target Shutdown. >Mar 19 12:01:01 spectre systemd[25882]: Starting Exit the Session... >Mar 19 12:01:01 spectre systemd[25882]: Received SIGRTMIN+24 from PID 25919 (kill). >Mar 19 12:01:01 spectre systemd[25889]: pam_unix(systemd-user:session): session closed for user root >Mar 19 12:01:01 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 19 12:01:01 spectre systemd[1]: Stopping user-0.slice. >Mar 19 12:01:01 spectre systemd[1]: Removed slice user-0.slice. >Mar 19 12:01:01 spectre systemd-logind[17665]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 19 12:01:01 spectre systemd-logind[17665]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 19 12:01:01 spectre systemd-logind[17665]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 19 12:01:01 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 19 12:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 19 12:01:02 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 19 12:01:02 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 19 12:01:02 spectre setroubleshoot[25930]: RunFaultServer(10) >Mar 19 12:01:02 spectre setroubleshoot[25930]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 19 12:01:02 spectre setroubleshoot[25930]: database version 3.0 compatible with current 3.0 version >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 12:01:02 spectre setroubleshoot[25930]: Number of Plugins = 46 >Mar 19 12:01:02 spectre setroubleshoot[25930]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 19 12:01:02 spectre setroubleshoot[25930]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 19 12:01:02 spectre setroubleshoot[25930]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 19 12:01:02 spectre setroubleshoot[25930]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 19 12:01:02 spectre setroubleshoot[25930]: dbus avc(node=spectre type=AVC msg=audit(1395244861.890:1552): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395244861.890:1552): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4ecd20 a1=f0800 a2=0 a3=fffffffffffff258 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395244861.890:1552): >) called: 1 Connections >Mar 19 12:01:02 spectre setroubleshoot[25930]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395244861.890:1552): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 19 12:01:02 spectre setroubleshoot[25930]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395244861.890:1552): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4ecd20 a1=f0800 a2=0 a3=fffffffffffff258 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 12:01:02 spectre setroubleshoot[25930]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395244861.890:1552): >Mar 19 12:01:02 spectre setroubleshoot[25930]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 19 12:01:02 spectre setroubleshoot[25930]: dbus avc(node=spectre type=AVC msg=audit(1395244861.891:1553): avc: denied { unmount } for pid=17665 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395244861.891:1553): arch=c000003e syscall=166 success=no exit=-13 a0=7f6abc4ecd20 a1=2 a2=0 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395244861.891:1553): >) called: 1 Connections >Mar 19 12:01:02 spectre setroubleshoot[25930]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395244861.891:1553): avc: denied { unmount } for pid=17665 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 19 12:01:02 spectre setroubleshoot[25930]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395244861.891:1553): arch=c000003e syscall=166 success=no exit=-13 a0=7f6abc4ecd20 a1=2 a2=0 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 12:01:02 spectre setroubleshoot[25930]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395244861.891:1553): >Mar 19 12:01:02 spectre setroubleshoot[25930]: dbus avc(node=spectre type=AVC msg=audit(1395244861.891:1554): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395244861.891:1554): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4ecd20 a1=f0800 a2=1 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395244861.891:1554): >) called: 1 Connections >Mar 19 12:01:02 spectre setroubleshoot[25930]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395244861.891:1554): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 19 12:01:02 spectre setroubleshoot[25930]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395244861.891:1554): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4ecd20 a1=f0800 a2=1 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 12:01:02 spectre setroubleshoot[25930]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395244861.891:1554): >Mar 19 12:01:02 spectre setroubleshoot[25930]: Plugin Exception restorecon_source >Mar 19 12:01:02 spectre setroubleshoot[25930]: Plugin Exception restorecon >Mar 19 12:01:02 spectre setroubleshoot[25930]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 12:01:02 spectre setroubleshoot[25930]: signature found in database >Mar 19 12:01:02 spectre setroubleshoot[25930]: sending alert to all clients >Mar 19 12:01:02 spectre setroubleshoot[25930]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.restorecon_source previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.rsync_data previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.kernel_modules previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.bind_ports previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.allow_execheap previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.cvs_data previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.catchall previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.wine previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.catchall_labels previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.samba_share previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.sys_module previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.allow_execmod previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.file previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.sys_resource previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.mmap_zero previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.openvpn previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.mozplugger previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.setenforce previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.dac_override previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.public_content previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.associate previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.xen_image previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.chrome previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.leaks previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.sshd_root previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.mounton previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.allow_execstack previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.restorecon previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.swapfile previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.connect_ports previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.vbetool previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.device previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 19 12:01:02 spectre python[25930]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 12:01:02 spectre setroubleshoot[25930]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 12:01:02 spectre setroubleshoot[25930]: signature found in database >Mar 19 12:01:02 spectre setroubleshoot[25930]: sending alert to all clients >Mar 19 12:01:02 spectre setroubleshoot[25930]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.restorecon_source previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.rsync_data previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.kernel_modules previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.bind_ports previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.allow_execheap previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.cvs_data previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.catchall previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.wine previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.catchall_labels previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.samba_share previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.sys_module previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.allow_execmod previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.file previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.sys_resource previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.mmap_zero previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.openvpn previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.mozplugger previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.setenforce previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.dac_override previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.public_content previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.associate previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.xen_image previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.chrome previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.leaks previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.sshd_root previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.mounton previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.allow_execstack previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.restorecon previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.swapfile previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.connect_ports previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.vbetool previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.device previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 19 12:01:02 spectre python[25930]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 12:01:02 spectre setroubleshoot[25930]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 12:01:02 spectre setroubleshoot[25930]: signature found in database >Mar 19 12:01:02 spectre setroubleshoot[25930]: sending alert to all clients >Mar 19 12:01:02 spectre setroubleshoot[25930]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.restorecon_source previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.rsync_data previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.kernel_modules previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.bind_ports previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.allow_execheap previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.cvs_data previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.catchall previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.wine previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.catchall_labels previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.samba_share previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.sys_module previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.allow_execmod previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.file previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.sys_resource previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.mmap_zero previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.openvpn previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.mozplugger previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.setenforce previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.dac_override previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.public_content previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.associate previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.xen_image previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.chrome previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.leaks previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.sshd_root previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.mounton previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.allow_execstack previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.restorecon previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.swapfile previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.connect_ports previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.vbetool previously imported >Mar 19 12:01:02 spectre setroubleshoot[25930]: load_plugins() plugins.device previously imported >Mar 19 12:01:02 spectre python[25930]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 12:01:12 spectre setroubleshoot[25930]: received signal=14 >Mar 19 12:01:12 spectre setroubleshoot[25930]: KeyboardInterrupt in RunFaultServer >Mar 19 12:01:12 spectre setroubleshoot[25930]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 19 12:01:12 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 19 12:01:12 spectre dbus-daemon[637]: string index out of range >Mar 19 12:15:16 spectre systemd[1]: Starting dnf makecache... >Mar 19 12:15:16 spectre dnf[26006]: Config time: 0.006 >Mar 19 12:15:16 spectre dnf[26006]: cachedir: /var/cache/dnf/x86_64/21 >Mar 19 12:15:16 spectre dnf[26006]: dnf version: 0.4.18 >Mar 19 12:15:16 spectre dnf[26006]: Making cache files for all metadata files. >Mar 19 12:15:16 spectre dnf[26006]: Metadata cache refreshed recently. >Mar 19 12:15:16 spectre systemd[1]: Started dnf makecache. >Mar 19 13:01:01 spectre systemd[1]: Starting user-0.slice. >Mar 19 13:01:01 spectre systemd[1]: Created slice user-0.slice. >Mar 19 13:01:01 spectre systemd[1]: Starting User Manager for UID 0... >Mar 19 13:01:01 spectre systemd[1]: Starting Session 62 of user root. >Mar 19 13:01:01 spectre systemd[1]: Started Session 62 of user root. >Mar 19 13:01:01 spectre systemd[26013]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 19 13:01:01 spectre systemd[26013]: Starting Paths. >Mar 19 13:01:01 spectre systemd[26013]: Reached target Paths. >Mar 19 13:01:01 spectre systemd[26013]: Starting Timers. >Mar 19 13:01:01 spectre systemd[26013]: Reached target Timers. >Mar 19 13:01:01 spectre systemd[26013]: Starting Sockets. >Mar 19 13:01:01 spectre systemd[26013]: Reached target Sockets. >Mar 19 13:01:01 spectre systemd[26013]: Starting Basic System. >Mar 19 13:01:01 spectre systemd[26013]: Reached target Basic System. >Mar 19 13:01:01 spectre systemd[26013]: Starting Default. >Mar 19 13:01:01 spectre systemd[26013]: Reached target Default. >Mar 19 13:01:01 spectre systemd[26013]: Startup finished in 10ms. >Mar 19 13:01:01 spectre systemd[1]: Started User Manager for UID 0. >Mar 19 13:01:01 spectre CROND[26026]: (root) CMD (run-parts /etc/cron.hourly) >Mar 19 13:01:01 spectre run-parts[26030]: (/etc/cron.hourly) starting 0anacron >Mar 19 13:01:01 spectre run-parts[26037]: (/etc/cron.hourly) finished 0anacron >Mar 19 13:01:01 spectre run-parts[26040]: (/etc/cron.hourly) starting mcelog.cron >Mar 19 13:01:01 spectre run-parts[26045]: (/etc/cron.hourly) finished mcelog.cron >Mar 19 13:01:02 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 19 13:01:02 spectre systemd[26013]: Stopping Default. >Mar 19 13:01:02 spectre systemd[26013]: Stopped target Default. >Mar 19 13:01:02 spectre systemd[26013]: Stopping Basic System. >Mar 19 13:01:02 spectre systemd[26013]: Stopped target Basic System. >Mar 19 13:01:02 spectre systemd[26013]: Stopping Paths. >Mar 19 13:01:02 spectre systemd[26013]: Stopped target Paths. >Mar 19 13:01:02 spectre systemd[26013]: Stopping Timers. >Mar 19 13:01:02 spectre systemd[26013]: Stopped target Timers. >Mar 19 13:01:02 spectre systemd[26013]: Stopping Sockets. >Mar 19 13:01:02 spectre systemd[26013]: Stopped target Sockets. >Mar 19 13:01:02 spectre systemd[26013]: Starting Shutdown. >Mar 19 13:01:02 spectre systemd[26013]: Reached target Shutdown. >Mar 19 13:01:02 spectre systemd[26013]: Starting Exit the Session... >Mar 19 13:01:02 spectre systemd[26013]: Received SIGRTMIN+24 from PID 26051 (kill). >Mar 19 13:01:02 spectre systemd[26022]: pam_unix(systemd-user:session): session closed for user root >Mar 19 13:01:02 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 19 13:01:02 spectre systemd[1]: Stopping user-0.slice. >Mar 19 13:01:02 spectre systemd[1]: Removed slice user-0.slice. >Mar 19 13:01:02 spectre systemd-logind[17665]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 19 13:01:02 spectre systemd-logind[17665]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 19 13:01:02 spectre systemd-logind[17665]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 19 13:01:02 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 19 13:01:02 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 19 13:01:02 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 19 13:01:02 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 19 13:01:02 spectre setroubleshoot[26060]: RunFaultServer(10) >Mar 19 13:01:02 spectre setroubleshoot[26060]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 19 13:01:02 spectre setroubleshoot[26060]: database version 3.0 compatible with current 3.0 version >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 13:01:02 spectre setroubleshoot[26060]: Number of Plugins = 46 >Mar 19 13:01:02 spectre setroubleshoot[26060]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 19 13:01:02 spectre setroubleshoot[26060]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 19 13:01:02 spectre setroubleshoot[26060]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 19 13:01:02 spectre setroubleshoot[26060]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 19 13:01:02 spectre setroubleshoot[26060]: dbus avc(node=spectre type=AVC msg=audit(1395248462.048:1569): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395248462.048:1569): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4ecd20 a1=f0800 a2=0 a3=fffffffffffff218 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395248462.048:1569): >) called: 1 Connections >Mar 19 13:01:02 spectre setroubleshoot[26060]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395248462.48:1569): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 19 13:01:02 spectre setroubleshoot[26060]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395248462.48:1569): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4ecd20 a1=f0800 a2=0 a3=fffffffffffff218 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 13:01:02 spectre setroubleshoot[26060]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395248462.48:1569): >Mar 19 13:01:02 spectre setroubleshoot[26060]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 19 13:01:02 spectre setroubleshoot[26060]: dbus avc(node=spectre type=AVC msg=audit(1395248462.048:1570): avc: denied { unmount } for pid=17665 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395248462.048:1570): arch=c000003e syscall=166 success=no exit=-13 a0=7f6abc4ecd20 a1=2 a2=0 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395248462.048:1570): >) called: 1 Connections >Mar 19 13:01:02 spectre setroubleshoot[26060]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395248462.48:1570): avc: denied { unmount } for pid=17665 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 19 13:01:02 spectre setroubleshoot[26060]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395248462.48:1570): arch=c000003e syscall=166 success=no exit=-13 a0=7f6abc4ecd20 a1=2 a2=0 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 13:01:02 spectre setroubleshoot[26060]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395248462.48:1570): >Mar 19 13:01:02 spectre setroubleshoot[26060]: dbus avc(node=spectre type=AVC msg=audit(1395248462.048:1571): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395248462.048:1571): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4ecd20 a1=f0800 a2=1 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395248462.048:1571): >) called: 1 Connections >Mar 19 13:01:02 spectre setroubleshoot[26060]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395248462.48:1571): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 19 13:01:02 spectre setroubleshoot[26060]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395248462.48:1571): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4ecd20 a1=f0800 a2=1 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 13:01:02 spectre setroubleshoot[26060]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395248462.48:1571): >Mar 19 13:01:02 spectre setroubleshoot[26060]: Plugin Exception restorecon_source >Mar 19 13:01:02 spectre setroubleshoot[26060]: Plugin Exception restorecon >Mar 19 13:01:02 spectre setroubleshoot[26060]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 13:01:02 spectre setroubleshoot[26060]: signature found in database >Mar 19 13:01:02 spectre setroubleshoot[26060]: sending alert to all clients >Mar 19 13:01:02 spectre setroubleshoot[26060]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.restorecon_source previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.rsync_data previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.kernel_modules previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.bind_ports previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.allow_execheap previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.cvs_data previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.catchall previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.wine previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.catchall_labels previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.samba_share previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.sys_module previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.allow_execmod previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.file previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.sys_resource previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.mmap_zero previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.openvpn previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.mozplugger previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.setenforce previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.dac_override previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.public_content previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.associate previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.xen_image previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.chrome previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.leaks previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.sshd_root previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.mounton previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.allow_execstack previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.restorecon previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.swapfile previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.connect_ports previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.vbetool previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.device previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 19 13:01:02 spectre python[26060]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 13:01:02 spectre setroubleshoot[26060]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 13:01:02 spectre setroubleshoot[26060]: signature found in database >Mar 19 13:01:02 spectre setroubleshoot[26060]: sending alert to all clients >Mar 19 13:01:02 spectre setroubleshoot[26060]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.restorecon_source previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.rsync_data previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.kernel_modules previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.bind_ports previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.allow_execheap previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.cvs_data previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.catchall previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.wine previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.catchall_labels previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.samba_share previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.sys_module previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.allow_execmod previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.file previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.sys_resource previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.mmap_zero previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.openvpn previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.mozplugger previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.setenforce previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.dac_override previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.public_content previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.associate previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.xen_image previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.chrome previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.leaks previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.sshd_root previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.mounton previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.allow_execstack previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.restorecon previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.swapfile previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.connect_ports previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.vbetool previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.device previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 19 13:01:02 spectre python[26060]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 13:01:02 spectre setroubleshoot[26060]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 13:01:02 spectre setroubleshoot[26060]: signature found in database >Mar 19 13:01:02 spectre setroubleshoot[26060]: sending alert to all clients >Mar 19 13:01:02 spectre setroubleshoot[26060]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.restorecon_source previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.rsync_data previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.kernel_modules previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.bind_ports previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.allow_execheap previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.cvs_data previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.catchall previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.wine previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.catchall_labels previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.samba_share previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.sys_module previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.allow_execmod previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.file previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.sys_resource previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.mmap_zero previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.openvpn previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.mozplugger previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.setenforce previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.dac_override previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.public_content previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.associate previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.xen_image previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.chrome previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.leaks previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.sshd_root previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.mounton previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.allow_execstack previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.restorecon previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.swapfile previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.connect_ports previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.vbetool previously imported >Mar 19 13:01:02 spectre setroubleshoot[26060]: load_plugins() plugins.device previously imported >Mar 19 13:01:02 spectre python[26060]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 13:01:12 spectre setroubleshoot[26060]: received signal=14 >Mar 19 13:01:12 spectre setroubleshoot[26060]: KeyboardInterrupt in RunFaultServer >Mar 19 13:01:12 spectre setroubleshoot[26060]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 19 13:01:12 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 19 13:01:12 spectre dbus-daemon[637]: string index out of range >Mar 19 13:15:16 spectre systemd[1]: Starting dnf makecache... >Mar 19 13:15:16 spectre dnf[26163]: Config time: 0.006 >Mar 19 13:15:16 spectre dnf[26163]: cachedir: /var/cache/dnf/x86_64/21 >Mar 19 13:15:16 spectre dnf[26163]: dnf version: 0.4.18 >Mar 19 13:15:16 spectre dnf[26163]: Making cache files for all metadata files. >Mar 19 13:15:16 spectre dnf[26163]: rawhide: will expire after 21568 seconds. >Mar 19 13:15:17 spectre dnf[26163]: repo: using cache for: rawhide >Mar 19 13:15:17 spectre dnf[26163]: hawkey sack setup time: 0.268 >Mar 19 13:15:17 spectre dnf[26163]: Metadata cache created. >Mar 19 13:15:17 spectre systemd[1]: Started dnf makecache. >Mar 19 13:29:52 spectre sshd[22183]: Received disconnect from 192.168.100.1: 11: disconnected by user >Mar 19 13:29:52 spectre sshd[22179]: pam_unix(sshd:session): session closed for user dshea >Mar 19 13:29:52 spectre systemd-logind[17665]: Removed session 34. >Mar 19 14:01:01 spectre systemd[1]: Starting user-0.slice. >Mar 19 14:01:01 spectre systemd[1]: Created slice user-0.slice. >Mar 19 14:01:01 spectre systemd[1]: Starting User Manager for UID 0... >Mar 19 14:01:01 spectre systemd[1]: Starting Session 63 of user root. >Mar 19 14:01:01 spectre systemd[1]: Started Session 63 of user root. >Mar 19 14:01:01 spectre systemd[26222]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 19 14:01:01 spectre systemd[26222]: Starting Paths. >Mar 19 14:01:01 spectre systemd[26222]: Reached target Paths. >Mar 19 14:01:01 spectre systemd[26222]: Starting Timers. >Mar 19 14:01:01 spectre systemd[26222]: Reached target Timers. >Mar 19 14:01:01 spectre systemd[26222]: Starting Sockets. >Mar 19 14:01:01 spectre systemd[26222]: Reached target Sockets. >Mar 19 14:01:01 spectre systemd[26222]: Starting Basic System. >Mar 19 14:01:01 spectre systemd[26222]: Reached target Basic System. >Mar 19 14:01:01 spectre systemd[26222]: Starting Default. >Mar 19 14:01:01 spectre systemd[26222]: Reached target Default. >Mar 19 14:01:01 spectre systemd[26222]: Startup finished in 11ms. >Mar 19 14:01:01 spectre systemd[1]: Started User Manager for UID 0. >Mar 19 14:01:01 spectre CROND[26235]: (root) CMD (run-parts /etc/cron.hourly) >Mar 19 14:01:01 spectre run-parts[26239]: (/etc/cron.hourly) starting 0anacron >Mar 19 14:01:01 spectre run-parts[26246]: (/etc/cron.hourly) finished 0anacron >Mar 19 14:01:01 spectre run-parts[26248]: (/etc/cron.hourly) starting mcelog.cron >Mar 19 14:01:01 spectre run-parts[26253]: (/etc/cron.hourly) finished mcelog.cron >Mar 19 14:01:01 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 19 14:01:01 spectre systemd[26222]: Stopping Default. >Mar 19 14:01:01 spectre systemd[26222]: Stopped target Default. >Mar 19 14:01:01 spectre systemd[26222]: Stopping Basic System. >Mar 19 14:01:01 spectre systemd[26222]: Stopped target Basic System. >Mar 19 14:01:01 spectre systemd[26222]: Stopping Paths. >Mar 19 14:01:01 spectre systemd[26222]: Stopped target Paths. >Mar 19 14:01:01 spectre systemd[26222]: Stopping Timers. >Mar 19 14:01:01 spectre systemd[26222]: Stopped target Timers. >Mar 19 14:01:01 spectre systemd[26222]: Stopping Sockets. >Mar 19 14:01:01 spectre systemd[26222]: Stopped target Sockets. >Mar 19 14:01:01 spectre systemd[26222]: Starting Shutdown. >Mar 19 14:01:01 spectre systemd[26222]: Reached target Shutdown. >Mar 19 14:01:01 spectre systemd[26222]: Starting Exit the Session... >Mar 19 14:01:01 spectre systemd[26222]: Received SIGRTMIN+24 from PID 26259 (kill). >Mar 19 14:01:01 spectre systemd[26230]: pam_unix(systemd-user:session): session closed for user root >Mar 19 14:01:01 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 19 14:01:01 spectre systemd[1]: Stopping user-0.slice. >Mar 19 14:01:01 spectre systemd[1]: Removed slice user-0.slice. >Mar 19 14:01:01 spectre systemd-logind[17665]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 19 14:01:01 spectre systemd-logind[17665]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 19 14:01:01 spectre systemd-logind[17665]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 19 14:01:01 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 19 14:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 19 14:01:01 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 19 14:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 19 14:01:01 spectre setroubleshoot[26270]: RunFaultServer(10) >Mar 19 14:01:01 spectre setroubleshoot[26270]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 19 14:01:01 spectre setroubleshoot[26270]: database version 3.0 compatible with current 3.0 version >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 14:01:01 spectre setroubleshoot[26270]: Number of Plugins = 46 >Mar 19 14:01:01 spectre setroubleshoot[26270]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 19 14:01:01 spectre setroubleshoot[26270]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 19 14:01:01 spectre setroubleshoot[26270]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 19 14:01:01 spectre setroubleshoot[26270]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 19 14:01:01 spectre setroubleshoot[26270]: dbus avc(node=spectre type=AVC msg=audit(1395252061.221:1593): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395252061.221:1593): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4ef6a0 a1=f0800 a2=0 a3=7f6aba682680 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395252061.221:1593): >) called: 1 Connections >Mar 19 14:01:01 spectre setroubleshoot[26270]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395252061.221:1593): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 19 14:01:01 spectre setroubleshoot[26270]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395252061.221:1593): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4ef6a0 a1=f0800 a2=0 a3=7f6aba682680 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 14:01:01 spectre setroubleshoot[26270]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395252061.221:1593): >Mar 19 14:01:01 spectre setroubleshoot[26270]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 19 14:01:01 spectre setroubleshoot[26270]: dbus avc(node=spectre type=AVC msg=audit(1395252061.222:1594): avc: denied { unmount } for pid=17665 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395252061.222:1594): arch=c000003e syscall=166 success=no exit=-13 a0=7f6abc4ef6a0 a1=2 a2=0 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395252061.222:1594): >) called: 1 Connections >Mar 19 14:01:01 spectre setroubleshoot[26270]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395252061.222:1594): avc: denied { unmount } for pid=17665 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 19 14:01:01 spectre setroubleshoot[26270]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395252061.222:1594): arch=c000003e syscall=166 success=no exit=-13 a0=7f6abc4ef6a0 a1=2 a2=0 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 14:01:01 spectre setroubleshoot[26270]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395252061.222:1594): >Mar 19 14:01:01 spectre setroubleshoot[26270]: dbus avc(node=spectre type=AVC msg=audit(1395252061.222:1595): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395252061.222:1595): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4ef6a0 a1=f0800 a2=1 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395252061.222:1595): >) called: 1 Connections >Mar 19 14:01:01 spectre setroubleshoot[26270]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395252061.222:1595): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 19 14:01:01 spectre setroubleshoot[26270]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395252061.222:1595): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4ef6a0 a1=f0800 a2=1 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 14:01:01 spectre setroubleshoot[26270]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395252061.222:1595): >Mar 19 14:01:01 spectre setroubleshoot[26270]: Plugin Exception restorecon_source >Mar 19 14:01:01 spectre setroubleshoot[26270]: Plugin Exception restorecon >Mar 19 14:01:01 spectre setroubleshoot[26270]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 14:01:01 spectre setroubleshoot[26270]: signature found in database >Mar 19 14:01:01 spectre setroubleshoot[26270]: sending alert to all clients >Mar 19 14:01:01 spectre setroubleshoot[26270]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.restorecon_source previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.rsync_data previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.kernel_modules previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.bind_ports previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.allow_execheap previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.cvs_data previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.catchall previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.wine previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.catchall_labels previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.samba_share previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.sys_module previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.allow_execmod previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.file previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.sys_resource previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.mmap_zero previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.openvpn previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.mozplugger previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.setenforce previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.dac_override previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.public_content previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.associate previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.xen_image previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.chrome previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.leaks previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.sshd_root previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.mounton previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.allow_execstack previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.restorecon previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.swapfile previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.connect_ports previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.vbetool previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.device previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 19 14:01:01 spectre python[26270]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 14:01:01 spectre setroubleshoot[26270]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 14:01:01 spectre setroubleshoot[26270]: signature found in database >Mar 19 14:01:01 spectre setroubleshoot[26270]: sending alert to all clients >Mar 19 14:01:01 spectre setroubleshoot[26270]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.restorecon_source previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.rsync_data previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.kernel_modules previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.bind_ports previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.allow_execheap previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.cvs_data previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.catchall previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.wine previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.catchall_labels previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.samba_share previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.sys_module previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.allow_execmod previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.file previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.sys_resource previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.mmap_zero previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.openvpn previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.mozplugger previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.setenforce previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.dac_override previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.public_content previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.associate previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.xen_image previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.chrome previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.leaks previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.sshd_root previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.mounton previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.allow_execstack previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.restorecon previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.swapfile previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.connect_ports previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.vbetool previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: load_plugins() plugins.device previously imported >Mar 19 14:01:01 spectre setroubleshoot[26270]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 19 14:01:01 spectre python[26270]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 14:01:02 spectre setroubleshoot[26270]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 14:01:02 spectre setroubleshoot[26270]: signature found in database >Mar 19 14:01:02 spectre setroubleshoot[26270]: sending alert to all clients >Mar 19 14:01:02 spectre setroubleshoot[26270]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 19 14:01:02 spectre setroubleshoot[26270]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 14:01:02 spectre setroubleshoot[26270]: load_plugins() plugins.restorecon_source previously imported >Mar 19 14:01:02 spectre setroubleshoot[26270]: load_plugins() plugins.rsync_data previously imported >Mar 19 14:01:02 spectre setroubleshoot[26270]: load_plugins() plugins.kernel_modules previously imported >Mar 19 14:01:02 spectre setroubleshoot[26270]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 14:01:02 spectre setroubleshoot[26270]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 14:01:02 spectre setroubleshoot[26270]: load_plugins() plugins.bind_ports previously imported >Mar 19 14:01:02 spectre setroubleshoot[26270]: load_plugins() plugins.allow_execheap previously imported >Mar 19 14:01:02 spectre setroubleshoot[26270]: load_plugins() plugins.cvs_data previously imported >Mar 19 14:01:02 spectre setroubleshoot[26270]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 14:01:02 spectre setroubleshoot[26270]: load_plugins() plugins.catchall previously imported >Mar 19 14:01:02 spectre setroubleshoot[26270]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 14:01:02 spectre setroubleshoot[26270]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 14:01:02 spectre setroubleshoot[26270]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 14:01:02 spectre setroubleshoot[26270]: load_plugins() plugins.wine previously imported >Mar 19 14:01:02 spectre setroubleshoot[26270]: load_plugins() plugins.catchall_labels previously imported >Mar 19 14:01:02 spectre setroubleshoot[26270]: load_plugins() plugins.samba_share previously imported >Mar 19 14:01:02 spectre setroubleshoot[26270]: load_plugins() plugins.sys_module previously imported >Mar 19 14:01:02 spectre setroubleshoot[26270]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 14:01:02 spectre setroubleshoot[26270]: load_plugins() plugins.allow_execmod previously imported >Mar 19 14:01:02 spectre setroubleshoot[26270]: load_plugins() plugins.file previously imported >Mar 19 14:01:02 spectre setroubleshoot[26270]: load_plugins() plugins.sys_resource previously imported >Mar 19 14:01:02 spectre setroubleshoot[26270]: load_plugins() plugins.mmap_zero previously imported >Mar 19 14:01:02 spectre setroubleshoot[26270]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 14:01:02 spectre setroubleshoot[26270]: load_plugins() plugins.openvpn previously imported >Mar 19 14:01:02 spectre setroubleshoot[26270]: load_plugins() plugins.mozplugger previously imported >Mar 19 14:01:02 spectre setroubleshoot[26270]: load_plugins() plugins.setenforce previously imported >Mar 19 14:01:02 spectre setroubleshoot[26270]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 14:01:02 spectre setroubleshoot[26270]: load_plugins() plugins.dac_override previously imported >Mar 19 14:01:02 spectre setroubleshoot[26270]: load_plugins() plugins.public_content previously imported >Mar 19 14:01:02 spectre setroubleshoot[26270]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 14:01:02 spectre setroubleshoot[26270]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 14:01:02 spectre setroubleshoot[26270]: load_plugins() plugins.associate previously imported >Mar 19 14:01:02 spectre setroubleshoot[26270]: load_plugins() plugins.xen_image previously imported >Mar 19 14:01:02 spectre setroubleshoot[26270]: load_plugins() plugins.chrome previously imported >Mar 19 14:01:02 spectre setroubleshoot[26270]: load_plugins() plugins.leaks previously imported >Mar 19 14:01:02 spectre setroubleshoot[26270]: load_plugins() plugins.sshd_root previously imported >Mar 19 14:01:02 spectre setroubleshoot[26270]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 14:01:02 spectre setroubleshoot[26270]: load_plugins() plugins.mounton previously imported >Mar 19 14:01:02 spectre setroubleshoot[26270]: load_plugins() plugins.allow_execstack previously imported >Mar 19 14:01:02 spectre setroubleshoot[26270]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 14:01:02 spectre setroubleshoot[26270]: load_plugins() plugins.restorecon previously imported >Mar 19 14:01:02 spectre setroubleshoot[26270]: load_plugins() plugins.swapfile previously imported >Mar 19 14:01:02 spectre setroubleshoot[26270]: load_plugins() plugins.connect_ports previously imported >Mar 19 14:01:02 spectre setroubleshoot[26270]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 14:01:02 spectre setroubleshoot[26270]: load_plugins() plugins.vbetool previously imported >Mar 19 14:01:02 spectre setroubleshoot[26270]: load_plugins() plugins.device previously imported >Mar 19 14:01:02 spectre python[26270]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 14:01:11 spectre setroubleshoot[26270]: received signal=14 >Mar 19 14:01:11 spectre setroubleshoot[26270]: KeyboardInterrupt in RunFaultServer >Mar 19 14:01:11 spectre setroubleshoot[26270]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 19 14:01:11 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 19 14:01:11 spectre dbus-daemon[637]: string index out of range >Mar 19 14:15:18 spectre systemd[1]: Starting dnf makecache... >Mar 19 14:15:18 spectre dnf[26369]: Config time: 0.006 >Mar 19 14:15:18 spectre dnf[26369]: cachedir: /var/cache/dnf/x86_64/21 >Mar 19 14:15:18 spectre dnf[26369]: dnf version: 0.4.18 >Mar 19 14:15:18 spectre dnf[26369]: Making cache files for all metadata files. >Mar 19 14:15:18 spectre dnf[26369]: Metadata cache refreshed recently. >Mar 19 14:15:18 spectre systemd[1]: Started dnf makecache. >Mar 19 14:16:29 spectre systemd[1]: Starting Cleanup of Temporary Directories... >Mar 19 14:16:29 spectre systemd[1]: Started Cleanup of Temporary Directories. >Mar 19 15:01:01 spectre systemd[1]: Starting user-0.slice. >Mar 19 15:01:01 spectre systemd[1]: Created slice user-0.slice. >Mar 19 15:01:01 spectre systemd[1]: Starting User Manager for UID 0... >Mar 19 15:01:01 spectre systemd[1]: Starting Session 64 of user root. >Mar 19 15:01:01 spectre systemd[1]: Started Session 64 of user root. >Mar 19 15:01:01 spectre systemd[26384]: Starting Paths. >Mar 19 15:01:01 spectre systemd[26384]: Reached target Paths. >Mar 19 15:01:01 spectre systemd[26384]: Starting Timers. >Mar 19 15:01:01 spectre systemd[26384]: Reached target Timers. >Mar 19 15:01:01 spectre systemd[26384]: Starting Sockets. >Mar 19 15:01:01 spectre systemd[26384]: Reached target Sockets. >Mar 19 15:01:01 spectre systemd[26384]: Starting Basic System. >Mar 19 15:01:01 spectre systemd[26384]: Reached target Basic System. >Mar 19 15:01:01 spectre systemd[26384]: Starting Default. >Mar 19 15:01:01 spectre systemd[26384]: Reached target Default. >Mar 19 15:01:01 spectre systemd[26384]: Startup finished in 81ms. >Mar 19 15:01:01 spectre systemd[1]: Started User Manager for UID 0. >Mar 19 15:01:01 spectre systemd[26384]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 19 15:01:01 spectre CROND[26404]: (root) CMD (run-parts /etc/cron.hourly) >Mar 19 15:01:01 spectre run-parts[26408]: (/etc/cron.hourly) starting 0anacron >Mar 19 15:01:01 spectre run-parts[26416]: (/etc/cron.hourly) finished 0anacron >Mar 19 15:01:01 spectre run-parts[26419]: (/etc/cron.hourly) starting mcelog.cron >Mar 19 15:01:01 spectre run-parts[26424]: (/etc/cron.hourly) finished mcelog.cron >Mar 19 15:01:01 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 19 15:01:01 spectre systemd[26384]: Stopping Default. >Mar 19 15:01:01 spectre systemd[26384]: Stopped target Default. >Mar 19 15:01:01 spectre systemd[26384]: Stopping Basic System. >Mar 19 15:01:01 spectre systemd[26384]: Stopped target Basic System. >Mar 19 15:01:01 spectre systemd[26384]: Stopping Paths. >Mar 19 15:01:01 spectre systemd[26384]: Stopped target Paths. >Mar 19 15:01:01 spectre systemd[26384]: Stopping Timers. >Mar 19 15:01:01 spectre systemd[26384]: Stopped target Timers. >Mar 19 15:01:01 spectre systemd[26384]: Stopping Sockets. >Mar 19 15:01:01 spectre systemd[26384]: Stopped target Sockets. >Mar 19 15:01:01 spectre systemd[26384]: Starting Shutdown. >Mar 19 15:01:01 spectre systemd[26384]: Reached target Shutdown. >Mar 19 15:01:01 spectre systemd[26384]: Starting Exit the Session... >Mar 19 15:01:01 spectre systemd[26384]: Received SIGRTMIN+24 from PID 26430 (kill). >Mar 19 15:01:01 spectre systemd[26391]: pam_unix(systemd-user:session): session closed for user root >Mar 19 15:01:01 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 19 15:01:01 spectre systemd[1]: Stopping user-0.slice. >Mar 19 15:01:01 spectre systemd[1]: Removed slice user-0.slice. >Mar 19 15:01:01 spectre systemd-logind[17665]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 19 15:01:01 spectre systemd-logind[17665]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 19 15:01:01 spectre systemd-logind[17665]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 19 15:01:01 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 19 15:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 19 15:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 19 15:01:01 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 19 15:01:01 spectre setroubleshoot[26439]: RunFaultServer(10) >Mar 19 15:01:01 spectre setroubleshoot[26439]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 19 15:01:01 spectre setroubleshoot[26439]: database version 3.0 compatible with current 3.0 version >Mar 19 15:01:01 spectre setroubleshoot[26439]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 15:01:02 spectre setroubleshoot[26439]: Number of Plugins = 46 >Mar 19 15:01:02 spectre setroubleshoot[26439]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 19 15:01:02 spectre setroubleshoot[26439]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 19 15:01:02 spectre setroubleshoot[26439]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 19 15:01:02 spectre setroubleshoot[26439]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 19 15:01:02 spectre setroubleshoot[26439]: dbus avc(node=spectre type=AVC msg=audit(1395255661.464:1612): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395255661.464:1612): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4ecba0 a1=f0800 a2=0 a3=fffffffffffffa18 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395255661.464:1612): >) called: 1 Connections >Mar 19 15:01:02 spectre setroubleshoot[26439]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395255661.464:1612): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 19 15:01:02 spectre setroubleshoot[26439]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395255661.464:1612): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4ecba0 a1=f0800 a2=0 a3=fffffffffffffa18 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 15:01:02 spectre setroubleshoot[26439]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395255661.464:1612): >Mar 19 15:01:02 spectre setroubleshoot[26439]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 19 15:01:02 spectre setroubleshoot[26439]: dbus avc(node=spectre type=AVC msg=audit(1395255661.464:1613): avc: denied { unmount } for pid=17665 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395255661.464:1613): arch=c000003e syscall=166 success=no exit=-13 a0=7f6abc4ecba0 a1=2 a2=0 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395255661.464:1613): >) called: 1 Connections >Mar 19 15:01:02 spectre setroubleshoot[26439]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395255661.464:1613): avc: denied { unmount } for pid=17665 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 19 15:01:02 spectre setroubleshoot[26439]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395255661.464:1613): arch=c000003e syscall=166 success=no exit=-13 a0=7f6abc4ecba0 a1=2 a2=0 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 15:01:02 spectre setroubleshoot[26439]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395255661.464:1613): >Mar 19 15:01:02 spectre setroubleshoot[26439]: dbus avc(node=spectre type=AVC msg=audit(1395255661.464:1614): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395255661.464:1614): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4ecba0 a1=f0800 a2=1 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395255661.464:1614): >) called: 1 Connections >Mar 19 15:01:02 spectre setroubleshoot[26439]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395255661.464:1614): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 19 15:01:02 spectre setroubleshoot[26439]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395255661.464:1614): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4ecba0 a1=f0800 a2=1 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 15:01:02 spectre setroubleshoot[26439]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395255661.464:1614): >Mar 19 15:01:02 spectre setroubleshoot[26439]: Plugin Exception restorecon_source >Mar 19 15:01:02 spectre setroubleshoot[26439]: Plugin Exception restorecon >Mar 19 15:01:02 spectre setroubleshoot[26439]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 15:01:02 spectre setroubleshoot[26439]: signature found in database >Mar 19 15:01:02 spectre setroubleshoot[26439]: sending alert to all clients >Mar 19 15:01:02 spectre setroubleshoot[26439]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.restorecon_source previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.rsync_data previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.kernel_modules previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.bind_ports previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.allow_execheap previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.cvs_data previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.catchall previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.wine previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.catchall_labels previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.samba_share previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.sys_module previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.allow_execmod previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.file previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.sys_resource previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.mmap_zero previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.openvpn previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.mozplugger previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.setenforce previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.dac_override previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.public_content previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.associate previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.xen_image previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.chrome previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.leaks previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.sshd_root previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.mounton previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.allow_execstack previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.restorecon previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.swapfile previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.connect_ports previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.vbetool previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.device previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 19 15:01:02 spectre python[26439]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 15:01:02 spectre setroubleshoot[26439]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 15:01:02 spectre setroubleshoot[26439]: signature found in database >Mar 19 15:01:02 spectre setroubleshoot[26439]: sending alert to all clients >Mar 19 15:01:02 spectre setroubleshoot[26439]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.restorecon_source previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.rsync_data previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.kernel_modules previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.bind_ports previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.allow_execheap previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.cvs_data previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.catchall previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.wine previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.catchall_labels previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.samba_share previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.sys_module previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.allow_execmod previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.file previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.sys_resource previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.mmap_zero previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.openvpn previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.mozplugger previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.setenforce previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.dac_override previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.public_content previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.associate previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.xen_image previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.chrome previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.leaks previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.sshd_root previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.mounton previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.allow_execstack previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.restorecon previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.swapfile previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.connect_ports previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.vbetool previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.device previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 19 15:01:02 spectre python[26439]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 15:01:02 spectre setroubleshoot[26439]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 15:01:02 spectre setroubleshoot[26439]: signature found in database >Mar 19 15:01:02 spectre setroubleshoot[26439]: sending alert to all clients >Mar 19 15:01:02 spectre setroubleshoot[26439]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.restorecon_source previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.rsync_data previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.kernel_modules previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.bind_ports previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.allow_execheap previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.cvs_data previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.catchall previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.wine previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.catchall_labels previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.samba_share previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.sys_module previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.allow_execmod previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.file previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.sys_resource previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.mmap_zero previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.openvpn previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.mozplugger previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.setenforce previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.dac_override previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.public_content previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.associate previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.xen_image previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.chrome previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.leaks previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.sshd_root previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.mounton previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.allow_execstack previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.restorecon previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.swapfile previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.connect_ports previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.vbetool previously imported >Mar 19 15:01:02 spectre setroubleshoot[26439]: load_plugins() plugins.device previously imported >Mar 19 15:01:02 spectre python[26439]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 15:01:12 spectre setroubleshoot[26439]: received signal=14 >Mar 19 15:01:12 spectre setroubleshoot[26439]: KeyboardInterrupt in RunFaultServer >Mar 19 15:01:12 spectre setroubleshoot[26439]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 19 15:01:12 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 19 15:01:12 spectre dbus-daemon[637]: string index out of range >Mar 19 15:06:58 spectre sshd[10829]: Received disconnect from 192.168.100.1: 11: disconnected by user >Mar 19 15:06:58 spectre sshd[10825]: pam_unix(sshd:session): session closed for user dshea >Mar 19 15:06:58 spectre systemd-logind[17665]: Removed session 36. >Mar 19 15:06:58 spectre systemd[1]: Stopping User Manager for UID 1000... >Mar 19 15:06:58 spectre systemd[3486]: Stopping Default. >Mar 19 15:06:58 spectre systemd[3486]: Stopped target Default. >Mar 19 15:06:58 spectre systemd[3486]: Stopping Basic System. >Mar 19 15:06:58 spectre systemd[3486]: Stopped target Basic System. >Mar 19 15:06:58 spectre systemd[3486]: Stopping Paths. >Mar 19 15:06:58 spectre systemd[3486]: Stopped target Paths. >Mar 19 15:06:58 spectre systemd[3486]: Stopping Timers. >Mar 19 15:06:58 spectre systemd[3486]: Stopped target Timers. >Mar 19 15:06:58 spectre systemd[3486]: Stopping Sockets. >Mar 19 15:06:58 spectre systemd[3486]: Stopped target Sockets. >Mar 19 15:06:58 spectre systemd[3486]: Starting Shutdown. >Mar 19 15:06:58 spectre systemd[3486]: Reached target Shutdown. >Mar 19 15:06:58 spectre systemd[3486]: Starting Exit the Session... >Mar 19 15:06:58 spectre systemd[3486]: Received SIGRTMIN+24 from PID 26547 (kill). >Mar 19 15:06:58 spectre systemd[3496]: pam_unix(systemd-user:session): session closed for user dshea >Mar 19 15:06:58 spectre systemd[1]: Stopped User Manager for UID 1000. >Mar 19 15:06:58 spectre systemd[1]: Stopping user-1000.slice. >Mar 19 15:06:58 spectre systemd[1]: Removed slice user-1000.slice. >Mar 19 15:06:58 spectre systemd-logind[17665]: Failed to remove runtime directory /run/user/1000: Permission denied >Mar 19 15:06:58 spectre systemd-logind[17665]: Failed to unmount user runtime directory /run/user/1000: Permission denied >Mar 19 15:06:58 spectre systemd-logind[17665]: Failed to remove runtime directory /run/user/1000: Permission denied >Mar 19 15:06:58 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 19 15:06:58 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 19 15:06:59 spectre kernel: polkitd[685]: segfault at 15 ip 00007fd935b9f53d sp 00007fffc21d7620 error 4 in libmozjs-17.0.so[7fd935aa2000+3b3000] >Mar 19 15:06:59 spectre NetworkManager[746]: <warn> error requesting auth for org.freedesktop.NetworkManager.settings.modify.hostname: (4) GDBus.Error:org.freedesktop.DBus.Error.NoReply: Message did not receive a reply (timeout by message bus) >Mar 19 15:06:59 spectre systemd[1]: polkit.service: main process exited, code=killed, status=11/SEGV >Mar 19 15:06:59 spectre systemd[1]: Unit polkit.service entered failed state. >Mar 19 15:06:59 spectre gnome-session[1106]: PolicyKit daemon disconnected from the bus. >Mar 19 15:06:59 spectre gnome-session[1106]: We are no longer a registered authentication agent. >Mar 19 15:06:59 spectre gnome-session[1106]: Window manager warning: Log level 16: Error checking authorization for action id org.freedesktop.packagekit.trigger-offline-update: GDBus.Error:org.freedesktop.DBus.Error.NoReply: Message did not receive a reply (timeout by message bus) >Mar 19 15:06:59 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 19 15:06:59 spectre setroubleshoot[26556]: RunFaultServer(10) >Mar 19 15:06:59 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 19 15:06:59 spectre setroubleshoot[26556]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 19 15:06:59 spectre setroubleshoot[26556]: database version 3.0 compatible with current 3.0 version >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 15:06:59 spectre setroubleshoot[26556]: Number of Plugins = 46 >Mar 19 15:06:59 spectre setroubleshoot[26556]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 19 15:06:59 spectre setroubleshoot[26556]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 19 15:06:59 spectre setroubleshoot[26556]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 19 15:06:59 spectre setroubleshoot[26556]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 19 15:06:59 spectre setroubleshoot[26556]: dbus avc(node=spectre type=AVC msg=audit(1395256018.877:1624): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=29033 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395256018.877:1624): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4ef160 a1=f0800 a2=0 a3=7f6aba682680 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395256018.877:1624): >) called: 1 Connections >Mar 19 15:06:59 spectre setroubleshoot[26556]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395256018.877:1624): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=29033 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 19 15:06:59 spectre setroubleshoot[26556]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395256018.877:1624): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4ef160 a1=f0800 a2=0 a3=7f6aba682680 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 15:06:59 spectre setroubleshoot[26556]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395256018.877:1624): >Mar 19 15:06:59 spectre setroubleshoot[26556]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 19 15:06:59 spectre setroubleshoot[26556]: dbus avc(node=spectre type=AVC msg=audit(1395256018.878:1625): avc: denied { unmount } for pid=17665 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395256018.878:1625): arch=c000003e syscall=166 success=no exit=-13 a0=7f6abc4ef160 a1=2 a2=0 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395256018.878:1625): >) called: 1 Connections >Mar 19 15:06:59 spectre setroubleshoot[26556]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395256018.878:1625): avc: denied { unmount } for pid=17665 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 19 15:06:59 spectre setroubleshoot[26556]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395256018.878:1625): arch=c000003e syscall=166 success=no exit=-13 a0=7f6abc4ef160 a1=2 a2=0 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 15:06:59 spectre setroubleshoot[26556]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395256018.878:1625): >Mar 19 15:06:59 spectre setroubleshoot[26556]: dbus avc(node=spectre type=AVC msg=audit(1395256018.878:1626): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=29033 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395256018.878:1626): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4ef160 a1=f0800 a2=1 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395256018.878:1626): >) called: 1 Connections >Mar 19 15:06:59 spectre setroubleshoot[26556]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395256018.878:1626): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=29033 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 19 15:06:59 spectre setroubleshoot[26556]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395256018.878:1626): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4ef160 a1=f0800 a2=1 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 15:06:59 spectre setroubleshoot[26556]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395256018.878:1626): >Mar 19 15:06:59 spectre setroubleshoot[26556]: Plugin Exception restorecon_source >Mar 19 15:06:59 spectre setroubleshoot[26556]: Plugin Exception restorecon >Mar 19 15:06:59 spectre setroubleshoot[26556]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 15:06:59 spectre setroubleshoot[26556]: signature found in database >Mar 19 15:06:59 spectre setroubleshoot[26556]: sending alert to all clients >Mar 19 15:06:59 spectre setroubleshoot[26556]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.restorecon_source previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.rsync_data previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.kernel_modules previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.bind_ports previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.allow_execheap previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.cvs_data previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.catchall previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.wine previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.catchall_labels previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.samba_share previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.sys_module previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.allow_execmod previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.file previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.sys_resource previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.mmap_zero previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.openvpn previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.mozplugger previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.setenforce previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.dac_override previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.public_content previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.associate previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.xen_image previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.chrome previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.leaks previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.sshd_root previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.mounton previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.allow_execstack previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.restorecon previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.swapfile previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.connect_ports previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.vbetool previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.device previously imported >Mar 19 15:06:59 spectre python[26556]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 15:06:59 spectre setroubleshoot[26556]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 19 15:06:59 spectre setroubleshoot[26556]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 15:06:59 spectre setroubleshoot[26556]: signature found in database >Mar 19 15:06:59 spectre setroubleshoot[26556]: sending alert to all clients >Mar 19 15:06:59 spectre setroubleshoot[26556]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.restorecon_source previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.rsync_data previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.kernel_modules previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.bind_ports previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.allow_execheap previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.cvs_data previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.catchall previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.wine previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.catchall_labels previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.samba_share previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.sys_module previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.allow_execmod previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.file previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.sys_resource previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.mmap_zero previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.openvpn previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.mozplugger previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.setenforce previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.dac_override previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.public_content previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.associate previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.xen_image previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.chrome previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.leaks previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.sshd_root previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.mounton previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.allow_execstack previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.restorecon previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.swapfile previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.connect_ports previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.vbetool previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.device previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 19 15:06:59 spectre python[26556]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 15:06:59 spectre setroubleshoot[26556]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 15:06:59 spectre setroubleshoot[26556]: signature found in database >Mar 19 15:06:59 spectre setroubleshoot[26556]: sending alert to all clients >Mar 19 15:06:59 spectre setroubleshoot[26556]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.restorecon_source previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.rsync_data previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.kernel_modules previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.bind_ports previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.allow_execheap previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.cvs_data previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.catchall previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.wine previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.catchall_labels previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.samba_share previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.sys_module previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.allow_execmod previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.file previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.sys_resource previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.mmap_zero previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.openvpn previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.mozplugger previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.setenforce previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.dac_override previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.public_content previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.associate previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.xen_image previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.chrome previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.leaks previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.sshd_root previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.mounton previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.allow_execstack previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.restorecon previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.swapfile previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.connect_ports previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.vbetool previously imported >Mar 19 15:06:59 spectre setroubleshoot[26556]: load_plugins() plugins.device previously imported >Mar 19 15:06:59 spectre python[26556]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 15:07:09 spectre setroubleshoot[26556]: received signal=14 >Mar 19 15:07:09 spectre setroubleshoot[26556]: KeyboardInterrupt in RunFaultServer >Mar 19 15:07:09 spectre setroubleshoot[26556]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 19 15:07:09 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 19 15:07:09 spectre dbus-daemon[637]: string index out of range >Mar 19 15:15:18 spectre systemd[1]: Starting dnf makecache... >Mar 19 15:15:18 spectre dnf[26608]: Config time: 0.006 >Mar 19 15:15:18 spectre dnf[26608]: cachedir: /var/cache/dnf/x86_64/21 >Mar 19 15:15:18 spectre dnf[26608]: dnf version: 0.4.18 >Mar 19 15:15:18 spectre dnf[26608]: Making cache files for all metadata files. >Mar 19 15:15:18 spectre dnf[26608]: Metadata cache refreshed recently. >Mar 19 15:15:18 spectre systemd[1]: Started dnf makecache. >Mar 19 16:01:01 spectre systemd[1]: Starting user-0.slice. >Mar 19 16:01:01 spectre systemd[1]: Created slice user-0.slice. >Mar 19 16:01:01 spectre systemd[1]: Starting User Manager for UID 0... >Mar 19 16:01:01 spectre systemd[1]: Starting Session 65 of user root. >Mar 19 16:01:01 spectre systemd[1]: Started Session 65 of user root. >Mar 19 16:01:01 spectre systemd[26615]: Starting Paths. >Mar 19 16:01:01 spectre systemd[26615]: Reached target Paths. >Mar 19 16:01:01 spectre systemd[26615]: Starting Timers. >Mar 19 16:01:01 spectre systemd[26615]: Reached target Timers. >Mar 19 16:01:01 spectre systemd[26615]: Starting Sockets. >Mar 19 16:01:01 spectre systemd[26615]: Reached target Sockets. >Mar 19 16:01:01 spectre systemd[26615]: Starting Basic System. >Mar 19 16:01:01 spectre systemd[26615]: Reached target Basic System. >Mar 19 16:01:01 spectre systemd[26615]: Starting Default. >Mar 19 16:01:01 spectre systemd[26615]: Reached target Default. >Mar 19 16:01:01 spectre systemd[26615]: Startup finished in 24ms. >Mar 19 16:01:01 spectre systemd[1]: Started User Manager for UID 0. >Mar 19 16:01:01 spectre systemd[26615]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 19 16:01:01 spectre CROND[26619]: (root) CMD (run-parts /etc/cron.hourly) >Mar 19 16:01:01 spectre run-parts[26622]: (/etc/cron.hourly) starting 0anacron >Mar 19 16:01:01 spectre run-parts[26628]: (/etc/cron.hourly) finished 0anacron >Mar 19 16:01:01 spectre run-parts[26630]: (/etc/cron.hourly) starting mcelog.cron >Mar 19 16:01:01 spectre run-parts[26634]: (/etc/cron.hourly) finished mcelog.cron >Mar 19 16:01:01 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 19 16:01:01 spectre systemd[26615]: Stopping Default. >Mar 19 16:01:01 spectre systemd[26615]: Stopped target Default. >Mar 19 16:01:01 spectre systemd[26615]: Stopping Basic System. >Mar 19 16:01:01 spectre systemd[26615]: Stopped target Basic System. >Mar 19 16:01:01 spectre systemd[26615]: Stopping Paths. >Mar 19 16:01:01 spectre systemd[26615]: Stopped target Paths. >Mar 19 16:01:01 spectre systemd[26615]: Stopping Timers. >Mar 19 16:01:01 spectre systemd[26615]: Stopped target Timers. >Mar 19 16:01:01 spectre systemd[26615]: Stopping Sockets. >Mar 19 16:01:01 spectre systemd[26615]: Stopped target Sockets. >Mar 19 16:01:01 spectre systemd[26615]: Starting Shutdown. >Mar 19 16:01:01 spectre systemd[26615]: Reached target Shutdown. >Mar 19 16:01:01 spectre systemd[26615]: Starting Exit the Session... >Mar 19 16:01:01 spectre systemd[26615]: Received SIGRTMIN+24 from PID 26636 (kill). >Mar 19 16:01:01 spectre systemd[26617]: pam_unix(systemd-user:session): session closed for user root >Mar 19 16:01:01 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 19 16:01:01 spectre systemd[1]: Stopping user-0.slice. >Mar 19 16:01:01 spectre systemd[1]: Removed slice user-0.slice. >Mar 19 16:01:01 spectre systemd-logind[17665]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 19 16:01:01 spectre systemd-logind[17665]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 19 16:01:01 spectre systemd-logind[17665]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 19 16:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 19 16:01:01 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 19 16:01:02 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 19 16:01:02 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 19 16:01:02 spectre setroubleshoot[26642]: RunFaultServer(10) >Mar 19 16:01:02 spectre setroubleshoot[26642]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 19 16:01:02 spectre setroubleshoot[26642]: database version 3.0 compatible with current 3.0 version >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 16:01:02 spectre setroubleshoot[26642]: Number of Plugins = 46 >Mar 19 16:01:02 spectre setroubleshoot[26642]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 19 16:01:02 spectre setroubleshoot[26642]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 19 16:01:02 spectre setroubleshoot[26642]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 19 16:01:02 spectre setroubleshoot[26642]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 19 16:01:02 spectre setroubleshoot[26642]: dbus avc(node=spectre type=AVC msg=audit(1395259261.619:1643): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395259261.619:1643): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4f14a0 a1=f0800 a2=0 a3=fffffffffffff218 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395259261.619:1643): >) called: 1 Connections >Mar 19 16:01:02 spectre setroubleshoot[26642]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395259261.619:1643): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 19 16:01:02 spectre setroubleshoot[26642]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395259261.619:1643): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4f14a0 a1=f0800 a2=0 a3=fffffffffffff218 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 16:01:02 spectre setroubleshoot[26642]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395259261.619:1643): >Mar 19 16:01:02 spectre setroubleshoot[26642]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 19 16:01:02 spectre setroubleshoot[26642]: dbus avc(node=spectre type=AVC msg=audit(1395259261.620:1644): avc: denied { unmount } for pid=17665 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395259261.620:1644): arch=c000003e syscall=166 success=no exit=-13 a0=7f6abc4f14a0 a1=2 a2=0 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395259261.620:1644): >) called: 1 Connections >Mar 19 16:01:02 spectre setroubleshoot[26642]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395259261.620:1644): avc: denied { unmount } for pid=17665 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 19 16:01:02 spectre setroubleshoot[26642]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395259261.620:1644): arch=c000003e syscall=166 success=no exit=-13 a0=7f6abc4f14a0 a1=2 a2=0 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 16:01:02 spectre setroubleshoot[26642]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395259261.620:1644): >Mar 19 16:01:02 spectre setroubleshoot[26642]: dbus avc(node=spectre type=AVC msg=audit(1395259261.620:1645): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395259261.620:1645): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4f14a0 a1=f0800 a2=1 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395259261.620:1645): >) called: 1 Connections >Mar 19 16:01:02 spectre setroubleshoot[26642]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395259261.620:1645): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 19 16:01:02 spectre setroubleshoot[26642]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395259261.620:1645): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4f14a0 a1=f0800 a2=1 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 16:01:02 spectre setroubleshoot[26642]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395259261.620:1645): >Mar 19 16:01:02 spectre setroubleshoot[26642]: Plugin Exception restorecon_source >Mar 19 16:01:02 spectre setroubleshoot[26642]: Plugin Exception restorecon >Mar 19 16:01:02 spectre setroubleshoot[26642]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 16:01:02 spectre setroubleshoot[26642]: signature found in database >Mar 19 16:01:02 spectre setroubleshoot[26642]: sending alert to all clients >Mar 19 16:01:02 spectre setroubleshoot[26642]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.restorecon_source previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.rsync_data previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.kernel_modules previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.bind_ports previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.allow_execheap previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.cvs_data previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.catchall previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.wine previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.catchall_labels previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.samba_share previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.sys_module previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.allow_execmod previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.file previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.sys_resource previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.mmap_zero previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.openvpn previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.mozplugger previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.setenforce previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.dac_override previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.public_content previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.associate previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.xen_image previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.chrome previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.leaks previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.sshd_root previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.mounton previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.allow_execstack previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.restorecon previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.swapfile previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.connect_ports previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.vbetool previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.device previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 19 16:01:02 spectre python[26642]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 16:01:02 spectre setroubleshoot[26642]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 16:01:02 spectre setroubleshoot[26642]: signature found in database >Mar 19 16:01:02 spectre setroubleshoot[26642]: sending alert to all clients >Mar 19 16:01:02 spectre setroubleshoot[26642]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.restorecon_source previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.rsync_data previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.kernel_modules previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.bind_ports previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.allow_execheap previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.cvs_data previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.catchall previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.wine previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.catchall_labels previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.samba_share previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.sys_module previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.allow_execmod previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.file previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.sys_resource previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.mmap_zero previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.openvpn previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.mozplugger previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.setenforce previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.dac_override previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.public_content previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.associate previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.xen_image previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.chrome previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.leaks previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.sshd_root previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.mounton previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.allow_execstack previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.restorecon previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.swapfile previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.connect_ports previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.vbetool previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.device previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 19 16:01:02 spectre python[26642]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 16:01:02 spectre setroubleshoot[26642]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 16:01:02 spectre setroubleshoot[26642]: signature found in database >Mar 19 16:01:02 spectre setroubleshoot[26642]: sending alert to all clients >Mar 19 16:01:02 spectre setroubleshoot[26642]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.restorecon_source previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.rsync_data previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.kernel_modules previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.bind_ports previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.allow_execheap previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.cvs_data previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.catchall previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.wine previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.catchall_labels previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.samba_share previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.sys_module previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.allow_execmod previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.file previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.sys_resource previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.mmap_zero previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.openvpn previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.mozplugger previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.setenforce previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.dac_override previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.public_content previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.associate previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.xen_image previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.chrome previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.leaks previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.sshd_root previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.mounton previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.allow_execstack previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.restorecon previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.swapfile previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.connect_ports previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.vbetool previously imported >Mar 19 16:01:02 spectre setroubleshoot[26642]: load_plugins() plugins.device previously imported >Mar 19 16:01:02 spectre python[26642]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 16:01:12 spectre setroubleshoot[26642]: received signal=14 >Mar 19 16:01:12 spectre setroubleshoot[26642]: KeyboardInterrupt in RunFaultServer >Mar 19 16:01:12 spectre setroubleshoot[26642]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 19 16:01:12 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 19 16:01:12 spectre dbus-daemon[637]: string index out of range >Mar 19 16:15:19 spectre systemd[1]: Starting dnf makecache... >Mar 19 16:15:19 spectre dnf[26668]: Config time: 0.006 >Mar 19 16:15:19 spectre dnf[26668]: cachedir: /var/cache/dnf/x86_64/21 >Mar 19 16:15:19 spectre dnf[26668]: dnf version: 0.4.18 >Mar 19 16:15:19 spectre dnf[26668]: Making cache files for all metadata files. >Mar 19 16:15:19 spectre dnf[26668]: rawhide: metadata will expire after 10765 seconds and will be refreshed now >Mar 19 16:15:20 spectre dnf[26668]: reviving: 'rawhide' can be revived. >Mar 19 16:15:20 spectre dnf[26668]: hawkey sack setup time: 0.866 >Mar 19 16:15:20 spectre dnf[26668]: Metadata cache created. >Mar 19 16:15:20 spectre systemd[1]: Started dnf makecache. >Mar 19 17:01:01 spectre systemd[1]: Starting user-0.slice. >Mar 19 17:01:01 spectre systemd[1]: Created slice user-0.slice. >Mar 19 17:01:01 spectre systemd[1]: Starting User Manager for UID 0... >Mar 19 17:01:01 spectre systemd[1]: Starting Session 66 of user root. >Mar 19 17:01:01 spectre systemd[1]: Started Session 66 of user root. >Mar 19 17:01:01 spectre systemd[26678]: Starting Paths. >Mar 19 17:01:01 spectre systemd[26678]: Reached target Paths. >Mar 19 17:01:01 spectre systemd[26678]: Starting Timers. >Mar 19 17:01:01 spectre systemd[26678]: Reached target Timers. >Mar 19 17:01:01 spectre systemd[26678]: Starting Sockets. >Mar 19 17:01:01 spectre systemd[26678]: Reached target Sockets. >Mar 19 17:01:01 spectre systemd[26678]: Starting Basic System. >Mar 19 17:01:01 spectre systemd[26678]: Reached target Basic System. >Mar 19 17:01:01 spectre systemd[26678]: Starting Default. >Mar 19 17:01:01 spectre systemd[26678]: Reached target Default. >Mar 19 17:01:01 spectre systemd[26678]: Startup finished in 59ms. >Mar 19 17:01:01 spectre systemd[1]: Started User Manager for UID 0. >Mar 19 17:01:01 spectre systemd[26678]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 19 17:01:01 spectre CROND[26682]: (root) CMD (run-parts /etc/cron.hourly) >Mar 19 17:01:01 spectre run-parts[26685]: (/etc/cron.hourly) starting 0anacron >Mar 19 17:01:01 spectre run-parts[26691]: (/etc/cron.hourly) finished 0anacron >Mar 19 17:01:01 spectre run-parts[26693]: (/etc/cron.hourly) starting mcelog.cron >Mar 19 17:01:01 spectre run-parts[26697]: (/etc/cron.hourly) finished mcelog.cron >Mar 19 17:01:01 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 19 17:01:01 spectre systemd[26678]: Stopping Default. >Mar 19 17:01:01 spectre systemd[26678]: Stopped target Default. >Mar 19 17:01:01 spectre systemd[26678]: Stopping Basic System. >Mar 19 17:01:01 spectre systemd[26678]: Stopped target Basic System. >Mar 19 17:01:01 spectre systemd[26678]: Stopping Paths. >Mar 19 17:01:01 spectre systemd[26678]: Stopped target Paths. >Mar 19 17:01:01 spectre systemd[26678]: Stopping Timers. >Mar 19 17:01:01 spectre systemd[26678]: Stopped target Timers. >Mar 19 17:01:01 spectre systemd[26678]: Stopping Sockets. >Mar 19 17:01:01 spectre systemd[26678]: Stopped target Sockets. >Mar 19 17:01:01 spectre systemd[26678]: Starting Shutdown. >Mar 19 17:01:01 spectre systemd[26678]: Reached target Shutdown. >Mar 19 17:01:01 spectre systemd[26678]: Starting Exit the Session... >Mar 19 17:01:01 spectre systemd[26678]: Received SIGRTMIN+24 from PID 26699 (kill). >Mar 19 17:01:01 spectre systemd[26680]: pam_unix(systemd-user:session): session closed for user root >Mar 19 17:01:01 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 19 17:01:01 spectre systemd[1]: Stopping user-0.slice. >Mar 19 17:01:01 spectre systemd[1]: Removed slice user-0.slice. >Mar 19 17:01:01 spectre systemd-logind[17665]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 19 17:01:01 spectre systemd-logind[17665]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 19 17:01:01 spectre systemd-logind[17665]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 19 17:01:01 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 19 17:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 19 17:01:02 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 19 17:01:02 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 19 17:01:02 spectre setroubleshoot[26703]: RunFaultServer(10) >Mar 19 17:01:02 spectre setroubleshoot[26703]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 19 17:01:02 spectre setroubleshoot[26703]: database version 3.0 compatible with current 3.0 version >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 17:01:02 spectre setroubleshoot[26703]: Number of Plugins = 46 >Mar 19 17:01:02 spectre setroubleshoot[26703]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 19 17:01:02 spectre setroubleshoot[26703]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 19 17:01:02 spectre setroubleshoot[26703]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 19 17:01:02 spectre setroubleshoot[26703]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 19 17:01:02 spectre setroubleshoot[26703]: dbus avc(node=spectre type=AVC msg=audit(1395262861.819:1660): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395262861.819:1660): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4f14a0 a1=f0800 a2=0 a3=fffffffffffff218 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395262861.819:1660): >) called: 1 Connections >Mar 19 17:01:02 spectre setroubleshoot[26703]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395262861.819:1660): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 19 17:01:02 spectre setroubleshoot[26703]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395262861.819:1660): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4f14a0 a1=f0800 a2=0 a3=fffffffffffff218 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 17:01:02 spectre setroubleshoot[26703]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395262861.819:1660): >Mar 19 17:01:02 spectre setroubleshoot[26703]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 19 17:01:02 spectre setroubleshoot[26703]: dbus avc(node=spectre type=AVC msg=audit(1395262861.820:1661): avc: denied { unmount } for pid=17665 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395262861.820:1661): arch=c000003e syscall=166 success=no exit=-13 a0=7f6abc4f14a0 a1=2 a2=0 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395262861.820:1661): >) called: 1 Connections >Mar 19 17:01:02 spectre setroubleshoot[26703]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395262861.820:1661): avc: denied { unmount } for pid=17665 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 19 17:01:02 spectre setroubleshoot[26703]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395262861.820:1661): arch=c000003e syscall=166 success=no exit=-13 a0=7f6abc4f14a0 a1=2 a2=0 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 17:01:02 spectre setroubleshoot[26703]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395262861.820:1661): >Mar 19 17:01:02 spectre setroubleshoot[26703]: dbus avc(node=spectre type=AVC msg=audit(1395262861.820:1662): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395262861.820:1662): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4f14a0 a1=f0800 a2=1 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395262861.820:1662): >) called: 1 Connections >Mar 19 17:01:02 spectre setroubleshoot[26703]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395262861.820:1662): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 19 17:01:02 spectre setroubleshoot[26703]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395262861.820:1662): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4f14a0 a1=f0800 a2=1 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 17:01:02 spectre setroubleshoot[26703]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395262861.820:1662): >Mar 19 17:01:02 spectre setroubleshoot[26703]: Plugin Exception restorecon_source >Mar 19 17:01:02 spectre setroubleshoot[26703]: Plugin Exception restorecon >Mar 19 17:01:02 spectre setroubleshoot[26703]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 17:01:02 spectre setroubleshoot[26703]: signature found in database >Mar 19 17:01:02 spectre setroubleshoot[26703]: sending alert to all clients >Mar 19 17:01:02 spectre setroubleshoot[26703]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.restorecon_source previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.rsync_data previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.kernel_modules previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.bind_ports previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.allow_execheap previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.cvs_data previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.catchall previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.wine previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.catchall_labels previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.samba_share previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.sys_module previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.allow_execmod previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.file previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.sys_resource previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.mmap_zero previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.openvpn previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.mozplugger previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.setenforce previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.dac_override previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.public_content previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.associate previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.xen_image previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.chrome previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.leaks previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.sshd_root previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.mounton previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.allow_execstack previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.restorecon previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.swapfile previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.connect_ports previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.vbetool previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.device previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 19 17:01:02 spectre python[26703]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 17:01:02 spectre setroubleshoot[26703]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 17:01:02 spectre setroubleshoot[26703]: signature found in database >Mar 19 17:01:02 spectre setroubleshoot[26703]: sending alert to all clients >Mar 19 17:01:02 spectre setroubleshoot[26703]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.restorecon_source previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.rsync_data previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.kernel_modules previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.bind_ports previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.allow_execheap previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.cvs_data previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.catchall previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.wine previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.catchall_labels previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.samba_share previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.sys_module previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.allow_execmod previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.file previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.sys_resource previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.mmap_zero previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.openvpn previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.mozplugger previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.setenforce previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.dac_override previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.public_content previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.associate previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.xen_image previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.chrome previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.leaks previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.sshd_root previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.mounton previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.allow_execstack previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.restorecon previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.swapfile previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.connect_ports previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.vbetool previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.device previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 19 17:01:02 spectre python[26703]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 17:01:02 spectre setroubleshoot[26703]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 17:01:02 spectre setroubleshoot[26703]: signature found in database >Mar 19 17:01:02 spectre setroubleshoot[26703]: sending alert to all clients >Mar 19 17:01:02 spectre setroubleshoot[26703]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.restorecon_source previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.rsync_data previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.kernel_modules previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.bind_ports previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.allow_execheap previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.cvs_data previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.catchall previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.wine previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.catchall_labels previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.samba_share previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.sys_module previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.allow_execmod previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.file previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.sys_resource previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.mmap_zero previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.openvpn previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.mozplugger previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.setenforce previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.dac_override previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.public_content previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.associate previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.xen_image previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.chrome previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.leaks previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.sshd_root previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.mounton previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.allow_execstack previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.restorecon previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.swapfile previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.connect_ports previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.vbetool previously imported >Mar 19 17:01:02 spectre setroubleshoot[26703]: load_plugins() plugins.device previously imported >Mar 19 17:01:02 spectre python[26703]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 17:01:12 spectre setroubleshoot[26703]: received signal=14 >Mar 19 17:01:12 spectre setroubleshoot[26703]: KeyboardInterrupt in RunFaultServer >Mar 19 17:01:12 spectre setroubleshoot[26703]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 19 17:01:12 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 19 17:01:12 spectre dbus-daemon[637]: string index out of range >Mar 19 17:15:20 spectre systemd[1]: Starting dnf makecache... >Mar 19 17:15:20 spectre dnf[26729]: Config time: 0.005 >Mar 19 17:15:20 spectre dnf[26729]: cachedir: /var/cache/dnf/x86_64/21 >Mar 19 17:15:20 spectre dnf[26729]: dnf version: 0.4.18 >Mar 19 17:15:20 spectre dnf[26729]: Making cache files for all metadata files. >Mar 19 17:15:20 spectre dnf[26729]: Metadata cache refreshed recently. >Mar 19 17:15:20 spectre systemd[1]: Started dnf makecache. >Mar 19 18:01:01 spectre systemd[1]: Starting user-0.slice. >Mar 19 18:01:01 spectre systemd[1]: Created slice user-0.slice. >Mar 19 18:01:01 spectre systemd[1]: Starting User Manager for UID 0... >Mar 19 18:01:01 spectre systemd[1]: Starting Session 67 of user root. >Mar 19 18:01:01 spectre systemd[1]: Started Session 67 of user root. >Mar 19 18:01:01 spectre systemd[26740]: Starting Paths. >Mar 19 18:01:01 spectre systemd[26740]: Reached target Paths. >Mar 19 18:01:01 spectre systemd[26740]: Starting Timers. >Mar 19 18:01:01 spectre systemd[26740]: Reached target Timers. >Mar 19 18:01:01 spectre systemd[26740]: Starting Sockets. >Mar 19 18:01:01 spectre systemd[26740]: Reached target Sockets. >Mar 19 18:01:01 spectre systemd[26740]: Starting Basic System. >Mar 19 18:01:01 spectre systemd[26740]: Reached target Basic System. >Mar 19 18:01:01 spectre systemd[26740]: Starting Default. >Mar 19 18:01:01 spectre systemd[26740]: Reached target Default. >Mar 19 18:01:01 spectre systemd[26740]: Startup finished in 34ms. >Mar 19 18:01:01 spectre systemd[1]: Started User Manager for UID 0. >Mar 19 18:01:01 spectre systemd[26740]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 19 18:01:01 spectre CROND[26744]: (root) CMD (run-parts /etc/cron.hourly) >Mar 19 18:01:01 spectre run-parts[26747]: (/etc/cron.hourly) starting 0anacron >Mar 19 18:01:01 spectre run-parts[26753]: (/etc/cron.hourly) finished 0anacron >Mar 19 18:01:01 spectre run-parts[26755]: (/etc/cron.hourly) starting mcelog.cron >Mar 19 18:01:01 spectre run-parts[26759]: (/etc/cron.hourly) finished mcelog.cron >Mar 19 18:01:01 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 19 18:01:01 spectre systemd[26740]: Stopping Default. >Mar 19 18:01:01 spectre systemd[26740]: Stopped target Default. >Mar 19 18:01:01 spectre systemd[26740]: Stopping Basic System. >Mar 19 18:01:01 spectre systemd[26740]: Stopped target Basic System. >Mar 19 18:01:01 spectre systemd[26740]: Stopping Paths. >Mar 19 18:01:01 spectre systemd[26740]: Stopped target Paths. >Mar 19 18:01:01 spectre systemd[26740]: Stopping Timers. >Mar 19 18:01:01 spectre systemd[26740]: Stopped target Timers. >Mar 19 18:01:01 spectre systemd[26740]: Stopping Sockets. >Mar 19 18:01:01 spectre systemd[26740]: Stopped target Sockets. >Mar 19 18:01:01 spectre systemd[26740]: Starting Shutdown. >Mar 19 18:01:01 spectre systemd[26740]: Reached target Shutdown. >Mar 19 18:01:01 spectre systemd[26740]: Starting Exit the Session... >Mar 19 18:01:01 spectre systemd[26740]: Received SIGRTMIN+24 from PID 26761 (kill). >Mar 19 18:01:01 spectre systemd[26742]: pam_unix(systemd-user:session): session closed for user root >Mar 19 18:01:01 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 19 18:01:01 spectre systemd[1]: Stopping user-0.slice. >Mar 19 18:01:01 spectre systemd[1]: Removed slice user-0.slice. >Mar 19 18:01:01 spectre systemd-logind[17665]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 19 18:01:01 spectre systemd-logind[17665]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 19 18:01:01 spectre systemd-logind[17665]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 19 18:01:01 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 19 18:01:02 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 19 18:01:02 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 19 18:01:02 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 19 18:01:02 spectre setroubleshoot[26767]: RunFaultServer(10) >Mar 19 18:01:02 spectre setroubleshoot[26767]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 19 18:01:02 spectre setroubleshoot[26767]: database version 3.0 compatible with current 3.0 version >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 18:01:02 spectre setroubleshoot[26767]: Number of Plugins = 46 >Mar 19 18:01:02 spectre setroubleshoot[26767]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 19 18:01:02 spectre setroubleshoot[26767]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 19 18:01:02 spectre setroubleshoot[26767]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 19 18:01:02 spectre setroubleshoot[26767]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 19 18:01:02 spectre setroubleshoot[26767]: dbus avc(node=spectre type=AVC msg=audit(1395266461.995:1676): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395266461.995:1676): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4ecba0 a1=f0800 a2=0 a3=fffffffffffff218 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395266461.995:1676): >) called: 1 Connections >Mar 19 18:01:02 spectre setroubleshoot[26767]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395266461.995:1676): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 19 18:01:02 spectre setroubleshoot[26767]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395266461.995:1676): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4ecba0 a1=f0800 a2=0 a3=fffffffffffff218 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 18:01:02 spectre setroubleshoot[26767]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395266461.995:1676): >Mar 19 18:01:02 spectre setroubleshoot[26767]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 19 18:01:02 spectre setroubleshoot[26767]: dbus avc(node=spectre type=AVC msg=audit(1395266461.995:1677): avc: denied { unmount } for pid=17665 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395266461.995:1677): arch=c000003e syscall=166 success=no exit=-13 a0=7f6abc4ecba0 a1=2 a2=0 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395266461.995:1677): >) called: 1 Connections >Mar 19 18:01:02 spectre setroubleshoot[26767]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395266461.995:1677): avc: denied { unmount } for pid=17665 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 19 18:01:02 spectre setroubleshoot[26767]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395266461.995:1677): arch=c000003e syscall=166 success=no exit=-13 a0=7f6abc4ecba0 a1=2 a2=0 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 18:01:02 spectre setroubleshoot[26767]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395266461.995:1677): >Mar 19 18:01:02 spectre setroubleshoot[26767]: dbus avc(node=spectre type=AVC msg=audit(1395266461.995:1678): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395266461.995:1678): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4ecba0 a1=f0800 a2=1 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395266461.995:1678): >) called: 1 Connections >Mar 19 18:01:02 spectre setroubleshoot[26767]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395266461.995:1678): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 19 18:01:02 spectre setroubleshoot[26767]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395266461.995:1678): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4ecba0 a1=f0800 a2=1 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 18:01:02 spectre setroubleshoot[26767]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395266461.995:1678): >Mar 19 18:01:02 spectre setroubleshoot[26767]: Plugin Exception restorecon_source >Mar 19 18:01:02 spectre setroubleshoot[26767]: Plugin Exception restorecon >Mar 19 18:01:02 spectre setroubleshoot[26767]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 18:01:02 spectre setroubleshoot[26767]: signature found in database >Mar 19 18:01:02 spectre setroubleshoot[26767]: sending alert to all clients >Mar 19 18:01:02 spectre setroubleshoot[26767]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.restorecon_source previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.rsync_data previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.kernel_modules previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.bind_ports previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.allow_execheap previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.cvs_data previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.catchall previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.wine previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.catchall_labels previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.samba_share previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.sys_module previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.allow_execmod previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.file previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.sys_resource previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.mmap_zero previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.openvpn previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.mozplugger previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.setenforce previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.dac_override previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.public_content previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.associate previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.xen_image previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.chrome previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.leaks previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.sshd_root previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.mounton previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.allow_execstack previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.restorecon previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.swapfile previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.connect_ports previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.vbetool previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.device previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 19 18:01:02 spectre python[26767]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 18:01:02 spectre setroubleshoot[26767]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 18:01:02 spectre setroubleshoot[26767]: signature found in database >Mar 19 18:01:02 spectre setroubleshoot[26767]: sending alert to all clients >Mar 19 18:01:02 spectre setroubleshoot[26767]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.restorecon_source previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.rsync_data previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.kernel_modules previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.bind_ports previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.allow_execheap previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.cvs_data previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.catchall previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.wine previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.catchall_labels previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.samba_share previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.sys_module previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.allow_execmod previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.file previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.sys_resource previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.mmap_zero previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.openvpn previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.mozplugger previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.setenforce previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.dac_override previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.public_content previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.associate previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.xen_image previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.chrome previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.leaks previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.sshd_root previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.mounton previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.allow_execstack previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.restorecon previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.swapfile previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.connect_ports previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.vbetool previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.device previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 19 18:01:02 spectre python[26767]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 18:01:02 spectre setroubleshoot[26767]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 18:01:02 spectre setroubleshoot[26767]: signature found in database >Mar 19 18:01:02 spectre setroubleshoot[26767]: sending alert to all clients >Mar 19 18:01:02 spectre setroubleshoot[26767]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.restorecon_source previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.rsync_data previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.kernel_modules previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.bind_ports previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.allow_execheap previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.cvs_data previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.catchall previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.wine previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.catchall_labels previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.samba_share previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.sys_module previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.allow_execmod previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.file previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.sys_resource previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.mmap_zero previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.openvpn previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.mozplugger previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.setenforce previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.dac_override previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.public_content previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.associate previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.xen_image previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.chrome previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.leaks previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.sshd_root previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.mounton previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.allow_execstack previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.restorecon previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.swapfile previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.connect_ports previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.vbetool previously imported >Mar 19 18:01:02 spectre setroubleshoot[26767]: load_plugins() plugins.device previously imported >Mar 19 18:01:02 spectre python[26767]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 18:01:12 spectre setroubleshoot[26767]: received signal=14 >Mar 19 18:01:12 spectre setroubleshoot[26767]: KeyboardInterrupt in RunFaultServer >Mar 19 18:01:12 spectre setroubleshoot[26767]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 19 18:01:12 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 19 18:01:12 spectre dbus-daemon[637]: string index out of range >Mar 19 18:15:22 spectre systemd[1]: Starting dnf makecache... >Mar 19 18:15:22 spectre dnf[26792]: Config time: 0.006 >Mar 19 18:15:22 spectre dnf[26792]: cachedir: /var/cache/dnf/x86_64/21 >Mar 19 18:15:22 spectre dnf[26792]: dnf version: 0.4.18 >Mar 19 18:15:22 spectre dnf[26792]: Making cache files for all metadata files. >Mar 19 18:15:22 spectre dnf[26792]: Metadata cache refreshed recently. >Mar 19 18:15:22 spectre systemd[1]: Started dnf makecache. >Mar 19 19:01:02 spectre systemd[1]: Starting user-0.slice. >Mar 19 19:01:02 spectre systemd[1]: Created slice user-0.slice. >Mar 19 19:01:02 spectre systemd[1]: Starting User Manager for UID 0... >Mar 19 19:01:02 spectre systemd[1]: Starting Session 68 of user root. >Mar 19 19:01:02 spectre systemd[1]: Started Session 68 of user root. >Mar 19 19:01:02 spectre systemd[26802]: Starting Paths. >Mar 19 19:01:02 spectre systemd[26802]: Reached target Paths. >Mar 19 19:01:02 spectre systemd[26802]: Starting Timers. >Mar 19 19:01:02 spectre systemd[26802]: Reached target Timers. >Mar 19 19:01:02 spectre systemd[26802]: Starting Sockets. >Mar 19 19:01:02 spectre systemd[26802]: Reached target Sockets. >Mar 19 19:01:02 spectre systemd[26802]: Starting Basic System. >Mar 19 19:01:02 spectre systemd[26802]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 19 19:01:02 spectre systemd[26802]: Reached target Basic System. >Mar 19 19:01:02 spectre systemd[26802]: Starting Default. >Mar 19 19:01:02 spectre systemd[26802]: Reached target Default. >Mar 19 19:01:02 spectre systemd[26802]: Startup finished in 24ms. >Mar 19 19:01:02 spectre systemd[1]: Started User Manager for UID 0. >Mar 19 19:01:02 spectre CROND[26806]: (root) CMD (run-parts /etc/cron.hourly) >Mar 19 19:01:02 spectre run-parts[26809]: (/etc/cron.hourly) starting 0anacron >Mar 19 19:01:02 spectre run-parts[26815]: (/etc/cron.hourly) finished 0anacron >Mar 19 19:01:02 spectre run-parts[26817]: (/etc/cron.hourly) starting mcelog.cron >Mar 19 19:01:02 spectre run-parts[26821]: (/etc/cron.hourly) finished mcelog.cron >Mar 19 19:01:02 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 19 19:01:02 spectre systemd[26802]: Stopping Default. >Mar 19 19:01:02 spectre systemd[26802]: Stopped target Default. >Mar 19 19:01:02 spectre systemd[26802]: Stopping Basic System. >Mar 19 19:01:02 spectre systemd[26802]: Stopped target Basic System. >Mar 19 19:01:02 spectre systemd[26802]: Stopping Paths. >Mar 19 19:01:02 spectre systemd[26802]: Stopped target Paths. >Mar 19 19:01:02 spectre systemd[26802]: Stopping Timers. >Mar 19 19:01:02 spectre systemd[26802]: Stopped target Timers. >Mar 19 19:01:02 spectre systemd[26802]: Stopping Sockets. >Mar 19 19:01:02 spectre systemd[26802]: Stopped target Sockets. >Mar 19 19:01:02 spectre systemd[26802]: Starting Shutdown. >Mar 19 19:01:02 spectre systemd[26802]: Reached target Shutdown. >Mar 19 19:01:02 spectre systemd[26802]: Starting Exit the Session... >Mar 19 19:01:02 spectre systemd[26802]: Received SIGRTMIN+24 from PID 26824 (kill). >Mar 19 19:01:02 spectre systemd[26804]: pam_unix(systemd-user:session): session closed for user root >Mar 19 19:01:02 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 19 19:01:02 spectre systemd[1]: Stopping user-0.slice. >Mar 19 19:01:02 spectre systemd[1]: Removed slice user-0.slice. >Mar 19 19:01:02 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 19 19:01:02 spectre systemd-logind[17665]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 19 19:01:02 spectre systemd-logind[17665]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 19 19:01:02 spectre systemd-logind[17665]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 19 19:01:02 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 19 19:01:02 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 19 19:01:02 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 19 19:01:02 spectre setroubleshoot[26830]: RunFaultServer(10) >Mar 19 19:01:02 spectre setroubleshoot[26830]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 19 19:01:02 spectre setroubleshoot[26830]: database version 3.0 compatible with current 3.0 version >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 19:01:02 spectre setroubleshoot[26830]: Number of Plugins = 46 >Mar 19 19:01:02 spectre setroubleshoot[26830]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 19 19:01:02 spectre setroubleshoot[26830]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 19 19:01:02 spectre setroubleshoot[26830]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 19 19:01:02 spectre setroubleshoot[26830]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 19 19:01:02 spectre setroubleshoot[26830]: dbus avc(node=spectre type=AVC msg=audit(1395270062.206:1693): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395270062.206:1693): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4f14a0 a1=f0800 a2=0 a3=7f6aba682680 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395270062.206:1693): >) called: 1 Connections >Mar 19 19:01:02 spectre setroubleshoot[26830]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395270062.206:1693): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 19 19:01:02 spectre setroubleshoot[26830]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395270062.206:1693): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4f14a0 a1=f0800 a2=0 a3=7f6aba682680 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 19:01:02 spectre setroubleshoot[26830]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395270062.206:1693): >Mar 19 19:01:02 spectre setroubleshoot[26830]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 19 19:01:02 spectre setroubleshoot[26830]: dbus avc(node=spectre type=AVC msg=audit(1395270062.206:1694): avc: denied { unmount } for pid=17665 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395270062.206:1694): arch=c000003e syscall=166 success=no exit=-13 a0=7f6abc4f14a0 a1=2 a2=0 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395270062.206:1694): >) called: 1 Connections >Mar 19 19:01:02 spectre setroubleshoot[26830]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395270062.206:1694): avc: denied { unmount } for pid=17665 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 19 19:01:02 spectre setroubleshoot[26830]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395270062.206:1694): arch=c000003e syscall=166 success=no exit=-13 a0=7f6abc4f14a0 a1=2 a2=0 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 19:01:02 spectre setroubleshoot[26830]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395270062.206:1694): >Mar 19 19:01:02 spectre setroubleshoot[26830]: dbus avc(node=spectre type=AVC msg=audit(1395270062.206:1695): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395270062.206:1695): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4f14a0 a1=f0800 a2=1 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395270062.206:1695): >) called: 1 Connections >Mar 19 19:01:02 spectre setroubleshoot[26830]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395270062.206:1695): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 19 19:01:02 spectre setroubleshoot[26830]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395270062.206:1695): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4f14a0 a1=f0800 a2=1 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 19:01:02 spectre setroubleshoot[26830]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395270062.206:1695): >Mar 19 19:01:02 spectre setroubleshoot[26830]: Plugin Exception restorecon_source >Mar 19 19:01:02 spectre setroubleshoot[26830]: Plugin Exception restorecon >Mar 19 19:01:02 spectre setroubleshoot[26830]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 19:01:02 spectre setroubleshoot[26830]: signature found in database >Mar 19 19:01:02 spectre setroubleshoot[26830]: sending alert to all clients >Mar 19 19:01:02 spectre setroubleshoot[26830]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.restorecon_source previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.rsync_data previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.kernel_modules previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.bind_ports previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.allow_execheap previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.cvs_data previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.catchall previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.wine previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.catchall_labels previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.samba_share previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.sys_module previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.allow_execmod previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.file previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.sys_resource previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.mmap_zero previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.openvpn previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.mozplugger previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.setenforce previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.dac_override previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.public_content previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.associate previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.xen_image previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.chrome previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.leaks previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.sshd_root previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.mounton previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.allow_execstack previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.restorecon previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.swapfile previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.connect_ports previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.vbetool previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.device previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 19 19:01:02 spectre python[26830]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 19:01:02 spectre setroubleshoot[26830]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 19:01:02 spectre setroubleshoot[26830]: signature found in database >Mar 19 19:01:02 spectre setroubleshoot[26830]: sending alert to all clients >Mar 19 19:01:02 spectre setroubleshoot[26830]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.restorecon_source previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.rsync_data previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.kernel_modules previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.bind_ports previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.allow_execheap previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.cvs_data previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.catchall previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.wine previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.catchall_labels previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.samba_share previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.sys_module previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.allow_execmod previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.file previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.sys_resource previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.mmap_zero previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.openvpn previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.mozplugger previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.setenforce previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.dac_override previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.public_content previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.associate previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.xen_image previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.chrome previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.leaks previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.sshd_root previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.mounton previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.allow_execstack previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.restorecon previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.swapfile previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.connect_ports previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.vbetool previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.device previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 19 19:01:02 spectre python[26830]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 19:01:02 spectre setroubleshoot[26830]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 19:01:02 spectre setroubleshoot[26830]: signature found in database >Mar 19 19:01:02 spectre setroubleshoot[26830]: sending alert to all clients >Mar 19 19:01:02 spectre setroubleshoot[26830]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.restorecon_source previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.rsync_data previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.kernel_modules previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.bind_ports previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.allow_execheap previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.cvs_data previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.catchall previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.wine previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.catchall_labels previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.samba_share previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.sys_module previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.allow_execmod previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.file previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.sys_resource previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.mmap_zero previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.openvpn previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.mozplugger previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.setenforce previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.dac_override previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.public_content previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.associate previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.xen_image previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.chrome previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.leaks previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.sshd_root previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.mounton previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.allow_execstack previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.restorecon previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.swapfile previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.connect_ports previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.vbetool previously imported >Mar 19 19:01:02 spectre setroubleshoot[26830]: load_plugins() plugins.device previously imported >Mar 19 19:01:02 spectre python[26830]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 19:01:12 spectre setroubleshoot[26830]: received signal=14 >Mar 19 19:01:12 spectre setroubleshoot[26830]: KeyboardInterrupt in RunFaultServer >Mar 19 19:01:12 spectre setroubleshoot[26830]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 19 19:01:12 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 19 19:01:12 spectre dbus-daemon[637]: string index out of range >Mar 19 19:15:22 spectre systemd[1]: Starting dnf makecache... >Mar 19 19:15:22 spectre dnf[26857]: Config time: 0.006 >Mar 19 19:15:22 spectre dnf[26857]: cachedir: /var/cache/dnf/x86_64/21 >Mar 19 19:15:22 spectre dnf[26857]: dnf version: 0.4.18 >Mar 19 19:15:22 spectre dnf[26857]: Making cache files for all metadata files. >Mar 19 19:15:23 spectre dnf[26857]: rawhide: will expire after 32397 seconds. >Mar 19 19:15:23 spectre dnf[26857]: repo: using cache for: rawhide >Mar 19 19:15:23 spectre dnf[26857]: hawkey sack setup time: 0.131 >Mar 19 19:15:23 spectre dnf[26857]: Metadata cache created. >Mar 19 19:15:23 spectre systemd[1]: Started dnf makecache. >Mar 19 20:01:01 spectre systemd[1]: Starting user-0.slice. >Mar 19 20:01:01 spectre systemd[1]: Created slice user-0.slice. >Mar 19 20:01:01 spectre systemd[1]: Starting User Manager for UID 0... >Mar 19 20:01:01 spectre systemd[1]: Starting Session 69 of user root. >Mar 19 20:01:01 spectre systemd[1]: Started Session 69 of user root. >Mar 19 20:01:01 spectre systemd[26864]: Starting Paths. >Mar 19 20:01:01 spectre systemd[26864]: Reached target Paths. >Mar 19 20:01:01 spectre systemd[26864]: Starting Timers. >Mar 19 20:01:01 spectre systemd[26864]: Reached target Timers. >Mar 19 20:01:01 spectre systemd[26864]: Starting Sockets. >Mar 19 20:01:01 spectre systemd[26864]: Reached target Sockets. >Mar 19 20:01:01 spectre systemd[26864]: Starting Basic System. >Mar 19 20:01:01 spectre systemd[26864]: Reached target Basic System. >Mar 19 20:01:01 spectre systemd[26864]: Starting Default. >Mar 19 20:01:01 spectre systemd[26864]: Reached target Default. >Mar 19 20:01:01 spectre systemd[26864]: Startup finished in 21ms. >Mar 19 20:01:01 spectre systemd[1]: Started User Manager for UID 0. >Mar 19 20:01:01 spectre systemd[26864]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 19 20:01:01 spectre CROND[26868]: (root) CMD (run-parts /etc/cron.hourly) >Mar 19 20:01:01 spectre run-parts[26871]: (/etc/cron.hourly) starting 0anacron >Mar 19 20:01:01 spectre run-parts[26877]: (/etc/cron.hourly) finished 0anacron >Mar 19 20:01:01 spectre run-parts[26879]: (/etc/cron.hourly) starting mcelog.cron >Mar 19 20:01:01 spectre run-parts[26883]: (/etc/cron.hourly) finished mcelog.cron >Mar 19 20:01:01 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 19 20:01:01 spectre systemd[26864]: Stopping Default. >Mar 19 20:01:01 spectre systemd[26864]: Stopped target Default. >Mar 19 20:01:01 spectre systemd[26864]: Stopping Basic System. >Mar 19 20:01:01 spectre systemd[26864]: Stopped target Basic System. >Mar 19 20:01:01 spectre systemd[26864]: Stopping Paths. >Mar 19 20:01:01 spectre systemd[26864]: Stopped target Paths. >Mar 19 20:01:01 spectre systemd[26864]: Stopping Timers. >Mar 19 20:01:01 spectre systemd[26864]: Stopped target Timers. >Mar 19 20:01:01 spectre systemd[26864]: Stopping Sockets. >Mar 19 20:01:01 spectre systemd[26864]: Stopped target Sockets. >Mar 19 20:01:01 spectre systemd[26864]: Starting Shutdown. >Mar 19 20:01:01 spectre systemd[26864]: Reached target Shutdown. >Mar 19 20:01:01 spectre systemd[26864]: Starting Exit the Session... >Mar 19 20:01:01 spectre systemd[26864]: Received SIGRTMIN+24 from PID 26885 (kill). >Mar 19 20:01:01 spectre systemd[26866]: pam_unix(systemd-user:session): session closed for user root >Mar 19 20:01:01 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 19 20:01:01 spectre systemd[1]: Stopping user-0.slice. >Mar 19 20:01:01 spectre systemd[1]: Removed slice user-0.slice. >Mar 19 20:01:01 spectre systemd-logind[17665]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 19 20:01:01 spectre systemd-logind[17665]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 19 20:01:01 spectre systemd-logind[17665]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 19 20:01:01 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 19 20:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 19 20:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 19 20:01:01 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 19 20:01:01 spectre setroubleshoot[26889]: RunFaultServer(10) >Mar 19 20:01:01 spectre setroubleshoot[26889]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 19 20:01:01 spectre setroubleshoot[26889]: database version 3.0 compatible with current 3.0 version >Mar 19 20:01:01 spectre setroubleshoot[26889]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 20:01:01 spectre setroubleshoot[26889]: Number of Plugins = 46 >Mar 19 20:01:01 spectre setroubleshoot[26889]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 19 20:01:01 spectre setroubleshoot[26889]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 19 20:01:01 spectre setroubleshoot[26889]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 19 20:01:01 spectre setroubleshoot[26889]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 19 20:01:01 spectre setroubleshoot[26889]: dbus avc(node=spectre type=AVC msg=audit(1395273661.380:1710): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395273661.380:1710): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4f0ca0 a1=f0800 a2=0 a3=fffffffffffffa18 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395273661.380:1710): >) called: 1 Connections >Mar 19 20:01:01 spectre setroubleshoot[26889]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395273661.380:1710): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 19 20:01:01 spectre setroubleshoot[26889]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395273661.380:1710): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4f0ca0 a1=f0800 a2=0 a3=fffffffffffffa18 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 20:01:01 spectre setroubleshoot[26889]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395273661.380:1710): >Mar 19 20:01:01 spectre setroubleshoot[26889]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 19 20:01:01 spectre setroubleshoot[26889]: dbus avc(node=spectre type=AVC msg=audit(1395273661.380:1711): avc: denied { unmount } for pid=17665 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395273661.380:1711): arch=c000003e syscall=166 success=no exit=-13 a0=7f6abc4f0ca0 a1=2 a2=0 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395273661.380:1711): >) called: 1 Connections >Mar 19 20:01:01 spectre setroubleshoot[26889]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395273661.380:1711): avc: denied { unmount } for pid=17665 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 19 20:01:01 spectre setroubleshoot[26889]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395273661.380:1711): arch=c000003e syscall=166 success=no exit=-13 a0=7f6abc4f0ca0 a1=2 a2=0 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 20:01:01 spectre setroubleshoot[26889]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395273661.380:1711): >Mar 19 20:01:01 spectre setroubleshoot[26889]: dbus avc(node=spectre type=AVC msg=audit(1395273661.380:1712): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395273661.380:1712): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4f0ca0 a1=f0800 a2=1 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395273661.380:1712): >) called: 1 Connections >Mar 19 20:01:01 spectre setroubleshoot[26889]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395273661.380:1712): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 19 20:01:01 spectre setroubleshoot[26889]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395273661.380:1712): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4f0ca0 a1=f0800 a2=1 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 20:01:01 spectre setroubleshoot[26889]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395273661.380:1712): >Mar 19 20:01:01 spectre setroubleshoot[26889]: Plugin Exception restorecon_source >Mar 19 20:01:01 spectre setroubleshoot[26889]: Plugin Exception restorecon >Mar 19 20:01:01 spectre setroubleshoot[26889]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 20:01:01 spectre setroubleshoot[26889]: signature found in database >Mar 19 20:01:01 spectre setroubleshoot[26889]: sending alert to all clients >Mar 19 20:01:01 spectre setroubleshoot[26889]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 19 20:01:01 spectre setroubleshoot[26889]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 20:01:01 spectre setroubleshoot[26889]: load_plugins() plugins.restorecon_source previously imported >Mar 19 20:01:01 spectre setroubleshoot[26889]: load_plugins() plugins.rsync_data previously imported >Mar 19 20:01:01 spectre setroubleshoot[26889]: load_plugins() plugins.kernel_modules previously imported >Mar 19 20:01:01 spectre setroubleshoot[26889]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 20:01:01 spectre setroubleshoot[26889]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 20:01:01 spectre setroubleshoot[26889]: load_plugins() plugins.bind_ports previously imported >Mar 19 20:01:01 spectre setroubleshoot[26889]: load_plugins() plugins.allow_execheap previously imported >Mar 19 20:01:01 spectre setroubleshoot[26889]: load_plugins() plugins.cvs_data previously imported >Mar 19 20:01:01 spectre setroubleshoot[26889]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 20:01:01 spectre setroubleshoot[26889]: load_plugins() plugins.catchall previously imported >Mar 19 20:01:01 spectre setroubleshoot[26889]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 20:01:01 spectre setroubleshoot[26889]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 20:01:01 spectre setroubleshoot[26889]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 20:01:01 spectre setroubleshoot[26889]: load_plugins() plugins.wine previously imported >Mar 19 20:01:01 spectre setroubleshoot[26889]: load_plugins() plugins.catchall_labels previously imported >Mar 19 20:01:01 spectre setroubleshoot[26889]: load_plugins() plugins.samba_share previously imported >Mar 19 20:01:01 spectre setroubleshoot[26889]: load_plugins() plugins.sys_module previously imported >Mar 19 20:01:01 spectre setroubleshoot[26889]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 20:01:01 spectre setroubleshoot[26889]: load_plugins() plugins.allow_execmod previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.file previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.sys_resource previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.mmap_zero previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.openvpn previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.mozplugger previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.setenforce previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.dac_override previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.public_content previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.associate previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.xen_image previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.chrome previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.leaks previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.sshd_root previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.mounton previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.allow_execstack previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.restorecon previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.swapfile previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.connect_ports previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.vbetool previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.device previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 19 20:01:02 spectre python[26889]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 20:01:02 spectre setroubleshoot[26889]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 20:01:02 spectre setroubleshoot[26889]: signature found in database >Mar 19 20:01:02 spectre setroubleshoot[26889]: sending alert to all clients >Mar 19 20:01:02 spectre setroubleshoot[26889]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.restorecon_source previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.rsync_data previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.kernel_modules previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.bind_ports previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.allow_execheap previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.cvs_data previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.catchall previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.wine previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.catchall_labels previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.samba_share previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.sys_module previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.allow_execmod previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.file previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.sys_resource previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.mmap_zero previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.openvpn previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.mozplugger previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.setenforce previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.dac_override previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.public_content previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.associate previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.xen_image previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.chrome previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.leaks previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.sshd_root previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.mounton previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.allow_execstack previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.restorecon previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.swapfile previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.connect_ports previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.vbetool previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.device previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 19 20:01:02 spectre python[26889]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 20:01:02 spectre setroubleshoot[26889]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 20:01:02 spectre setroubleshoot[26889]: signature found in database >Mar 19 20:01:02 spectre setroubleshoot[26889]: sending alert to all clients >Mar 19 20:01:02 spectre setroubleshoot[26889]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.restorecon_source previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.rsync_data previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.kernel_modules previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.bind_ports previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.allow_execheap previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.cvs_data previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.catchall previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.wine previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.catchall_labels previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.samba_share previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.sys_module previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.allow_execmod previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.file previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.sys_resource previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.mmap_zero previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.openvpn previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.mozplugger previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.setenforce previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.dac_override previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.public_content previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.associate previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.xen_image previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.chrome previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.leaks previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.sshd_root previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.mounton previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.allow_execstack previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.restorecon previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.swapfile previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.connect_ports previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.vbetool previously imported >Mar 19 20:01:02 spectre setroubleshoot[26889]: load_plugins() plugins.device previously imported >Mar 19 20:01:02 spectre python[26889]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 20:01:11 spectre setroubleshoot[26889]: received signal=14 >Mar 19 20:01:11 spectre setroubleshoot[26889]: KeyboardInterrupt in RunFaultServer >Mar 19 20:01:11 spectre setroubleshoot[26889]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 19 20:01:11 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 19 20:01:11 spectre dbus-daemon[637]: string index out of range >Mar 19 20:15:24 spectre systemd[1]: Starting dnf makecache... >Mar 19 20:15:24 spectre dnf[26914]: Config time: 0.006 >Mar 19 20:15:24 spectre dnf[26914]: cachedir: /var/cache/dnf/x86_64/21 >Mar 19 20:15:24 spectre dnf[26914]: dnf version: 0.4.18 >Mar 19 20:15:24 spectre dnf[26914]: Making cache files for all metadata files. >Mar 19 20:15:24 spectre dnf[26914]: Metadata cache refreshed recently. >Mar 19 20:15:24 spectre systemd[1]: Started dnf makecache. >Mar 19 21:01:01 spectre systemd[1]: Starting user-0.slice. >Mar 19 21:01:01 spectre systemd[1]: Created slice user-0.slice. >Mar 19 21:01:01 spectre systemd[1]: Starting Session 70 of user root. >Mar 19 21:01:01 spectre systemd[1]: Started Session 70 of user root. >Mar 19 21:01:01 spectre systemd[1]: Starting User Manager for UID 0... >Mar 19 21:01:01 spectre systemd[26926]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 19 21:01:01 spectre systemd[26926]: Starting Paths. >Mar 19 21:01:01 spectre systemd[26926]: Reached target Paths. >Mar 19 21:01:01 spectre systemd[26926]: Starting Timers. >Mar 19 21:01:01 spectre systemd[26926]: Reached target Timers. >Mar 19 21:01:01 spectre systemd[26926]: Starting Sockets. >Mar 19 21:01:01 spectre systemd[26926]: Reached target Sockets. >Mar 19 21:01:01 spectre systemd[26926]: Starting Basic System. >Mar 19 21:01:01 spectre systemd[26926]: Reached target Basic System. >Mar 19 21:01:01 spectre systemd[26926]: Starting Default. >Mar 19 21:01:01 spectre systemd[26926]: Reached target Default. >Mar 19 21:01:01 spectre systemd[26926]: Startup finished in 11ms. >Mar 19 21:01:01 spectre systemd[1]: Started User Manager for UID 0. >Mar 19 21:01:01 spectre CROND[26930]: (root) CMD (run-parts /etc/cron.hourly) >Mar 19 21:01:01 spectre run-parts[26933]: (/etc/cron.hourly) starting 0anacron >Mar 19 21:01:01 spectre run-parts[26939]: (/etc/cron.hourly) finished 0anacron >Mar 19 21:01:01 spectre run-parts[26941]: (/etc/cron.hourly) starting mcelog.cron >Mar 19 21:01:01 spectre run-parts[26945]: (/etc/cron.hourly) finished mcelog.cron >Mar 19 21:01:01 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 19 21:01:01 spectre systemd[26926]: Stopping Default. >Mar 19 21:01:01 spectre systemd[26926]: Stopped target Default. >Mar 19 21:01:01 spectre systemd[26926]: Stopping Basic System. >Mar 19 21:01:01 spectre systemd[26926]: Stopped target Basic System. >Mar 19 21:01:01 spectre systemd[26926]: Stopping Paths. >Mar 19 21:01:01 spectre systemd[26926]: Stopped target Paths. >Mar 19 21:01:01 spectre systemd[26926]: Stopping Timers. >Mar 19 21:01:01 spectre systemd[26926]: Stopped target Timers. >Mar 19 21:01:01 spectre systemd[26926]: Stopping Sockets. >Mar 19 21:01:01 spectre systemd[26926]: Stopped target Sockets. >Mar 19 21:01:01 spectre systemd[26926]: Starting Shutdown. >Mar 19 21:01:01 spectre systemd[26926]: Reached target Shutdown. >Mar 19 21:01:01 spectre systemd[26926]: Starting Exit the Session... >Mar 19 21:01:01 spectre systemd[26926]: Received SIGRTMIN+24 from PID 26948 (kill). >Mar 19 21:01:01 spectre systemd[26928]: pam_unix(systemd-user:session): session closed for user root >Mar 19 21:01:01 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 19 21:01:01 spectre systemd[1]: Stopping user-0.slice. >Mar 19 21:01:01 spectre systemd[1]: Removed slice user-0.slice. >Mar 19 21:01:01 spectre systemd-logind[17665]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 19 21:01:01 spectre systemd-logind[17665]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 19 21:01:01 spectre systemd-logind[17665]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 19 21:01:01 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 19 21:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 19 21:01:01 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 19 21:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 19 21:01:01 spectre setroubleshoot[26954]: RunFaultServer(10) >Mar 19 21:01:02 spectre setroubleshoot[26954]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 19 21:01:02 spectre setroubleshoot[26954]: database version 3.0 compatible with current 3.0 version >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 21:01:02 spectre setroubleshoot[26954]: Number of Plugins = 46 >Mar 19 21:01:02 spectre setroubleshoot[26954]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 19 21:01:02 spectre setroubleshoot[26954]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 19 21:01:02 spectre setroubleshoot[26954]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 19 21:01:02 spectre setroubleshoot[26954]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 19 21:01:02 spectre setroubleshoot[26954]: dbus avc(node=spectre type=AVC msg=audit(1395277261.575:1727): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395277261.575:1727): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4e6310 a1=f0800 a2=0 a3=7f6aba682680 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395277261.575:1727): >) called: 1 Connections >Mar 19 21:01:02 spectre setroubleshoot[26954]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395277261.575:1727): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 19 21:01:02 spectre setroubleshoot[26954]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395277261.575:1727): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4e6310 a1=f0800 a2=0 a3=7f6aba682680 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 21:01:02 spectre setroubleshoot[26954]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395277261.575:1727): >Mar 19 21:01:02 spectre setroubleshoot[26954]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 19 21:01:02 spectre setroubleshoot[26954]: dbus avc(node=spectre type=AVC msg=audit(1395277261.575:1728): avc: denied { unmount } for pid=17665 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395277261.575:1728): arch=c000003e syscall=166 success=no exit=-13 a0=7f6abc4e6310 a1=2 a2=0 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395277261.575:1728): >) called: 1 Connections >Mar 19 21:01:02 spectre setroubleshoot[26954]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395277261.575:1728): avc: denied { unmount } for pid=17665 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 19 21:01:02 spectre setroubleshoot[26954]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395277261.575:1728): arch=c000003e syscall=166 success=no exit=-13 a0=7f6abc4e6310 a1=2 a2=0 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 21:01:02 spectre setroubleshoot[26954]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395277261.575:1728): >Mar 19 21:01:02 spectre setroubleshoot[26954]: dbus avc(node=spectre type=AVC msg=audit(1395277261.575:1729): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395277261.575:1729): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4e6310 a1=f0800 a2=1 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395277261.575:1729): >) called: 1 Connections >Mar 19 21:01:02 spectre setroubleshoot[26954]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395277261.575:1729): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 19 21:01:02 spectre setroubleshoot[26954]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395277261.575:1729): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4e6310 a1=f0800 a2=1 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 21:01:02 spectre setroubleshoot[26954]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395277261.575:1729): >Mar 19 21:01:02 spectre setroubleshoot[26954]: Plugin Exception restorecon_source >Mar 19 21:01:02 spectre setroubleshoot[26954]: Plugin Exception restorecon >Mar 19 21:01:02 spectre setroubleshoot[26954]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 21:01:02 spectre setroubleshoot[26954]: signature found in database >Mar 19 21:01:02 spectre setroubleshoot[26954]: sending alert to all clients >Mar 19 21:01:02 spectre setroubleshoot[26954]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.restorecon_source previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.rsync_data previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.kernel_modules previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.bind_ports previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.allow_execheap previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.cvs_data previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.catchall previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.wine previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.catchall_labels previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.samba_share previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.sys_module previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.allow_execmod previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.file previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.sys_resource previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.mmap_zero previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.openvpn previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.mozplugger previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.setenforce previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.dac_override previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.public_content previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.associate previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.xen_image previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.chrome previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.leaks previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.sshd_root previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.mounton previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.allow_execstack previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.restorecon previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.swapfile previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.connect_ports previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.vbetool previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.device previously imported >Mar 19 21:01:02 spectre python[26954]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 21:01:02 spectre setroubleshoot[26954]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 19 21:01:02 spectre setroubleshoot[26954]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 21:01:02 spectre setroubleshoot[26954]: signature found in database >Mar 19 21:01:02 spectre setroubleshoot[26954]: sending alert to all clients >Mar 19 21:01:02 spectre setroubleshoot[26954]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.restorecon_source previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.rsync_data previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.kernel_modules previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.bind_ports previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.allow_execheap previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.cvs_data previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.catchall previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.wine previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.catchall_labels previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.samba_share previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.sys_module previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.allow_execmod previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.file previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.sys_resource previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.mmap_zero previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.openvpn previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.mozplugger previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.setenforce previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.dac_override previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.public_content previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.associate previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.xen_image previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.chrome previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.leaks previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.sshd_root previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.mounton previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.allow_execstack previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.restorecon previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.swapfile previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.connect_ports previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.vbetool previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.device previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 19 21:01:02 spectre python[26954]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 21:01:02 spectre setroubleshoot[26954]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 21:01:02 spectre setroubleshoot[26954]: signature found in database >Mar 19 21:01:02 spectre setroubleshoot[26954]: sending alert to all clients >Mar 19 21:01:02 spectre setroubleshoot[26954]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.restorecon_source previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.rsync_data previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.kernel_modules previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.bind_ports previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.allow_execheap previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.cvs_data previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.catchall previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.wine previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.catchall_labels previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.samba_share previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.sys_module previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.allow_execmod previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.file previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.sys_resource previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.mmap_zero previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.openvpn previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.mozplugger previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.setenforce previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.dac_override previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.public_content previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.associate previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.xen_image previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.chrome previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.leaks previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.sshd_root previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.mounton previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.allow_execstack previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.restorecon previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.swapfile previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.connect_ports previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.vbetool previously imported >Mar 19 21:01:02 spectre setroubleshoot[26954]: load_plugins() plugins.device previously imported >Mar 19 21:01:02 spectre python[26954]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 21:01:12 spectre setroubleshoot[26954]: received signal=14 >Mar 19 21:01:12 spectre setroubleshoot[26954]: KeyboardInterrupt in RunFaultServer >Mar 19 21:01:12 spectre setroubleshoot[26954]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 19 21:01:12 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 19 21:01:12 spectre dbus-daemon[637]: string index out of range >Mar 19 21:15:24 spectre systemd[1]: Starting dnf makecache... >Mar 19 21:15:25 spectre dnf[26978]: Config time: 0.006 >Mar 19 21:15:25 spectre dnf[26978]: cachedir: /var/cache/dnf/x86_64/21 >Mar 19 21:15:25 spectre dnf[26978]: dnf version: 0.4.18 >Mar 19 21:15:25 spectre dnf[26978]: Making cache files for all metadata files. >Mar 19 21:15:25 spectre dnf[26978]: Metadata cache refreshed recently. >Mar 19 21:15:25 spectre systemd[1]: Started dnf makecache. >Mar 19 22:01:01 spectre systemd[1]: Starting user-0.slice. >Mar 19 22:01:01 spectre systemd[1]: Created slice user-0.slice. >Mar 19 22:01:01 spectre systemd[1]: Starting User Manager for UID 0... >Mar 19 22:01:01 spectre systemd[1]: Starting Session 71 of user root. >Mar 19 22:01:01 spectre systemd[1]: Started Session 71 of user root. >Mar 19 22:01:01 spectre systemd[26987]: Starting Paths. >Mar 19 22:01:01 spectre systemd[26987]: Reached target Paths. >Mar 19 22:01:01 spectre systemd[26987]: Starting Timers. >Mar 19 22:01:01 spectre systemd[26987]: Reached target Timers. >Mar 19 22:01:01 spectre systemd[26987]: Starting Sockets. >Mar 19 22:01:01 spectre systemd[26987]: Reached target Sockets. >Mar 19 22:01:01 spectre systemd[26987]: Starting Basic System. >Mar 19 22:01:01 spectre systemd[26987]: Reached target Basic System. >Mar 19 22:01:01 spectre systemd[26987]: Starting Default. >Mar 19 22:01:01 spectre systemd[26987]: Reached target Default. >Mar 19 22:01:01 spectre systemd[26987]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 19 22:01:01 spectre systemd[26987]: Startup finished in 23ms. >Mar 19 22:01:01 spectre systemd[1]: Started User Manager for UID 0. >Mar 19 22:01:01 spectre CROND[26991]: (root) CMD (run-parts /etc/cron.hourly) >Mar 19 22:01:01 spectre run-parts[26994]: (/etc/cron.hourly) starting 0anacron >Mar 19 22:01:01 spectre run-parts[27000]: (/etc/cron.hourly) finished 0anacron >Mar 19 22:01:01 spectre run-parts[27002]: (/etc/cron.hourly) starting mcelog.cron >Mar 19 22:01:01 spectre run-parts[27006]: (/etc/cron.hourly) finished mcelog.cron >Mar 19 22:01:01 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 19 22:01:01 spectre systemd[26987]: Stopping Default. >Mar 19 22:01:01 spectre systemd[26987]: Stopped target Default. >Mar 19 22:01:01 spectre systemd[26987]: Stopping Basic System. >Mar 19 22:01:01 spectre systemd[26987]: Stopped target Basic System. >Mar 19 22:01:01 spectre systemd[26987]: Stopping Paths. >Mar 19 22:01:01 spectre systemd[26987]: Stopped target Paths. >Mar 19 22:01:01 spectre systemd[26987]: Stopping Timers. >Mar 19 22:01:01 spectre systemd[26987]: Stopped target Timers. >Mar 19 22:01:01 spectre systemd[26987]: Stopping Sockets. >Mar 19 22:01:01 spectre systemd[26987]: Stopped target Sockets. >Mar 19 22:01:01 spectre systemd[26987]: Starting Shutdown. >Mar 19 22:01:01 spectre systemd[26987]: Reached target Shutdown. >Mar 19 22:01:01 spectre systemd[26987]: Starting Exit the Session... >Mar 19 22:01:01 spectre systemd[26987]: Received SIGRTMIN+24 from PID 27008 (kill). >Mar 19 22:01:01 spectre systemd[26989]: pam_unix(systemd-user:session): session closed for user root >Mar 19 22:01:01 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 19 22:01:01 spectre systemd[1]: Stopping user-0.slice. >Mar 19 22:01:01 spectre systemd[1]: Removed slice user-0.slice. >Mar 19 22:01:01 spectre systemd-logind[17665]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 19 22:01:01 spectre systemd-logind[17665]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 19 22:01:01 spectre systemd-logind[17665]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 19 22:01:01 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 19 22:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 19 22:01:02 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 19 22:01:02 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 19 22:01:02 spectre setroubleshoot[27014]: RunFaultServer(10) >Mar 19 22:01:02 spectre setroubleshoot[27014]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 19 22:01:02 spectre setroubleshoot[27014]: database version 3.0 compatible with current 3.0 version >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 22:01:02 spectre setroubleshoot[27014]: Number of Plugins = 46 >Mar 19 22:01:02 spectre setroubleshoot[27014]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 19 22:01:02 spectre setroubleshoot[27014]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 19 22:01:02 spectre setroubleshoot[27014]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 19 22:01:02 spectre setroubleshoot[27014]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 19 22:01:02 spectre setroubleshoot[27014]: dbus avc(node=spectre type=AVC msg=audit(1395280861.738:1744): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395280861.738:1744): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4f14a0 a1=f0800 a2=0 a3=fffffffffffff218 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395280861.738:1744): >) called: 1 Connections >Mar 19 22:01:02 spectre setroubleshoot[27014]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395280861.738:1744): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 19 22:01:02 spectre setroubleshoot[27014]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395280861.738:1744): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4f14a0 a1=f0800 a2=0 a3=fffffffffffff218 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 22:01:02 spectre setroubleshoot[27014]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395280861.738:1744): >Mar 19 22:01:02 spectre setroubleshoot[27014]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 19 22:01:02 spectre setroubleshoot[27014]: dbus avc(node=spectre type=AVC msg=audit(1395280861.738:1745): avc: denied { unmount } for pid=17665 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395280861.738:1745): arch=c000003e syscall=166 success=no exit=-13 a0=7f6abc4f14a0 a1=2 a2=0 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395280861.738:1745): >) called: 1 Connections >Mar 19 22:01:02 spectre setroubleshoot[27014]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395280861.738:1745): avc: denied { unmount } for pid=17665 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 19 22:01:02 spectre setroubleshoot[27014]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395280861.738:1745): arch=c000003e syscall=166 success=no exit=-13 a0=7f6abc4f14a0 a1=2 a2=0 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 22:01:02 spectre setroubleshoot[27014]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395280861.738:1745): >Mar 19 22:01:02 spectre setroubleshoot[27014]: dbus avc(node=spectre type=AVC msg=audit(1395280861.738:1746): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395280861.738:1746): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4f14a0 a1=f0800 a2=1 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395280861.738:1746): >) called: 1 Connections >Mar 19 22:01:02 spectre setroubleshoot[27014]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395280861.738:1746): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 19 22:01:02 spectre setroubleshoot[27014]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395280861.738:1746): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4f14a0 a1=f0800 a2=1 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 22:01:02 spectre setroubleshoot[27014]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395280861.738:1746): >Mar 19 22:01:02 spectre setroubleshoot[27014]: Plugin Exception restorecon_source >Mar 19 22:01:02 spectre setroubleshoot[27014]: Plugin Exception restorecon >Mar 19 22:01:02 spectre setroubleshoot[27014]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 22:01:02 spectre setroubleshoot[27014]: signature found in database >Mar 19 22:01:02 spectre setroubleshoot[27014]: sending alert to all clients >Mar 19 22:01:02 spectre setroubleshoot[27014]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.restorecon_source previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.rsync_data previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.kernel_modules previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.bind_ports previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.allow_execheap previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.cvs_data previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.catchall previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.wine previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.catchall_labels previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.samba_share previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.sys_module previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.allow_execmod previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.file previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.sys_resource previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.mmap_zero previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.openvpn previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.mozplugger previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.setenforce previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.dac_override previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.public_content previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.associate previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.xen_image previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.chrome previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.leaks previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.sshd_root previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.mounton previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.allow_execstack previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.restorecon previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.swapfile previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.connect_ports previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.vbetool previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.device previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 19 22:01:02 spectre python[27014]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 22:01:02 spectre setroubleshoot[27014]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 22:01:02 spectre setroubleshoot[27014]: signature found in database >Mar 19 22:01:02 spectre setroubleshoot[27014]: sending alert to all clients >Mar 19 22:01:02 spectre setroubleshoot[27014]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.restorecon_source previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.rsync_data previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.kernel_modules previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.bind_ports previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.allow_execheap previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.cvs_data previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.catchall previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.wine previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.catchall_labels previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.samba_share previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.sys_module previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.allow_execmod previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.file previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.sys_resource previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.mmap_zero previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.openvpn previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.mozplugger previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.setenforce previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.dac_override previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.public_content previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.associate previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.xen_image previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.chrome previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.leaks previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.sshd_root previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.mounton previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.allow_execstack previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.restorecon previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.swapfile previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.connect_ports previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.vbetool previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.device previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 19 22:01:02 spectre python[27014]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 22:01:02 spectre setroubleshoot[27014]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 22:01:02 spectre setroubleshoot[27014]: signature found in database >Mar 19 22:01:02 spectre setroubleshoot[27014]: sending alert to all clients >Mar 19 22:01:02 spectre setroubleshoot[27014]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.restorecon_source previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.rsync_data previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.kernel_modules previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.bind_ports previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.allow_execheap previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.cvs_data previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.catchall previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.wine previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.catchall_labels previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.samba_share previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.sys_module previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.allow_execmod previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.file previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.sys_resource previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.mmap_zero previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.openvpn previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.mozplugger previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.setenforce previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.dac_override previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.public_content previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.associate previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.xen_image previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.chrome previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.leaks previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.sshd_root previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.mounton previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.allow_execstack previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.restorecon previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.swapfile previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.connect_ports previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.vbetool previously imported >Mar 19 22:01:02 spectre setroubleshoot[27014]: load_plugins() plugins.device previously imported >Mar 19 22:01:02 spectre python[27014]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 22:01:12 spectre setroubleshoot[27014]: received signal=14 >Mar 19 22:01:12 spectre setroubleshoot[27014]: KeyboardInterrupt in RunFaultServer >Mar 19 22:01:12 spectre setroubleshoot[27014]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 19 22:01:12 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 19 22:01:12 spectre dbus-daemon[637]: string index out of range >Mar 19 22:15:26 spectre systemd[1]: Starting dnf makecache... >Mar 19 22:15:26 spectre dnf[27040]: Config time: 0.006 >Mar 19 22:15:26 spectre dnf[27040]: cachedir: /var/cache/dnf/x86_64/21 >Mar 19 22:15:26 spectre dnf[27040]: dnf version: 0.4.18 >Mar 19 22:15:26 spectre dnf[27040]: Making cache files for all metadata files. >Mar 19 22:15:26 spectre dnf[27040]: rawhide: will expire after 21593 seconds. >Mar 19 22:15:26 spectre dnf[27040]: repo: using cache for: rawhide >Mar 19 22:15:26 spectre dnf[27040]: hawkey sack setup time: 0.128 >Mar 19 22:15:26 spectre dnf[27040]: Metadata cache created. >Mar 19 22:15:26 spectre systemd[1]: Started dnf makecache. >Mar 19 23:01:01 spectre systemd[1]: Starting user-0.slice. >Mar 19 23:01:01 spectre systemd[1]: Created slice user-0.slice. >Mar 19 23:01:01 spectre systemd[1]: Starting User Manager for UID 0... >Mar 19 23:01:01 spectre systemd[1]: Starting Session 72 of user root. >Mar 19 23:01:01 spectre systemd[1]: Started Session 72 of user root. >Mar 19 23:01:01 spectre systemd[27048]: Starting Paths. >Mar 19 23:01:01 spectre systemd[27048]: Reached target Paths. >Mar 19 23:01:01 spectre systemd[27048]: Starting Timers. >Mar 19 23:01:01 spectre systemd[27048]: Reached target Timers. >Mar 19 23:01:01 spectre systemd[27048]: Starting Sockets. >Mar 19 23:01:01 spectre systemd[27048]: Reached target Sockets. >Mar 19 23:01:01 spectre systemd[27048]: Starting Basic System. >Mar 19 23:01:01 spectre systemd[27048]: Reached target Basic System. >Mar 19 23:01:01 spectre systemd[27048]: Starting Default. >Mar 19 23:01:01 spectre systemd[27048]: Reached target Default. >Mar 19 23:01:01 spectre systemd[27048]: Startup finished in 11ms. >Mar 19 23:01:01 spectre systemd[1]: Started User Manager for UID 0. >Mar 19 23:01:01 spectre systemd[27048]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 19 23:01:01 spectre CROND[27052]: (root) CMD (run-parts /etc/cron.hourly) >Mar 19 23:01:01 spectre run-parts[27055]: (/etc/cron.hourly) starting 0anacron >Mar 19 23:01:01 spectre run-parts[27061]: (/etc/cron.hourly) finished 0anacron >Mar 19 23:01:01 spectre run-parts[27063]: (/etc/cron.hourly) starting mcelog.cron >Mar 19 23:01:01 spectre run-parts[27067]: (/etc/cron.hourly) finished mcelog.cron >Mar 19 23:01:01 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 19 23:01:01 spectre systemd[27048]: Stopping Default. >Mar 19 23:01:01 spectre systemd[27048]: Stopped target Default. >Mar 19 23:01:01 spectre systemd[27048]: Stopping Basic System. >Mar 19 23:01:01 spectre systemd[27048]: Stopped target Basic System. >Mar 19 23:01:01 spectre systemd[27048]: Stopping Paths. >Mar 19 23:01:01 spectre systemd[27048]: Stopped target Paths. >Mar 19 23:01:01 spectre systemd[27048]: Stopping Timers. >Mar 19 23:01:01 spectre systemd[27048]: Stopped target Timers. >Mar 19 23:01:01 spectre systemd[27048]: Stopping Sockets. >Mar 19 23:01:01 spectre systemd[27048]: Stopped target Sockets. >Mar 19 23:01:01 spectre systemd[27048]: Starting Shutdown. >Mar 19 23:01:01 spectre systemd[27048]: Reached target Shutdown. >Mar 19 23:01:01 spectre systemd[27048]: Starting Exit the Session... >Mar 19 23:01:01 spectre systemd[27048]: Received SIGRTMIN+24 from PID 27070 (kill). >Mar 19 23:01:01 spectre systemd[27050]: pam_unix(systemd-user:session): session closed for user root >Mar 19 23:01:01 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 19 23:01:01 spectre systemd[1]: Stopping user-0.slice. >Mar 19 23:01:01 spectre systemd[1]: Removed slice user-0.slice. >Mar 19 23:01:01 spectre systemd-logind[17665]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 19 23:01:01 spectre systemd-logind[17665]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 19 23:01:01 spectre systemd-logind[17665]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 19 23:01:01 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 19 23:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 19 23:01:02 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 19 23:01:02 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 19 23:01:02 spectre setroubleshoot[27076]: RunFaultServer(10) >Mar 19 23:01:02 spectre setroubleshoot[27076]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 19 23:01:02 spectre setroubleshoot[27076]: database version 3.0 compatible with current 3.0 version >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 23:01:02 spectre setroubleshoot[27076]: Number of Plugins = 46 >Mar 19 23:01:02 spectre setroubleshoot[27076]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 19 23:01:02 spectre setroubleshoot[27076]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 19 23:01:02 spectre setroubleshoot[27076]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 19 23:01:02 spectre setroubleshoot[27076]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 19 23:01:02 spectre setroubleshoot[27076]: dbus avc(node=spectre type=AVC msg=audit(1395284461.924:1761): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395284461.924:1761): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4e6850 a1=f0800 a2=0 a3=fffffffffffffa18 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395284461.924:1761): >) called: 1 Connections >Mar 19 23:01:02 spectre setroubleshoot[27076]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395284461.924:1761): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 19 23:01:02 spectre setroubleshoot[27076]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395284461.924:1761): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4e6850 a1=f0800 a2=0 a3=fffffffffffffa18 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 23:01:02 spectre setroubleshoot[27076]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395284461.924:1761): >Mar 19 23:01:02 spectre setroubleshoot[27076]: dbus avc(node=spectre type=AVC msg=audit(1395284461.924:1762): avc: denied { unmount } for pid=17665 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395284461.924:1762): arch=c000003e syscall=166 success=no exit=-13 a0=7f6abc4e6850 a1=2 a2=0 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395284461.924:1762): >) called: 1 Connections >Mar 19 23:01:02 spectre setroubleshoot[27076]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 19 23:01:02 spectre setroubleshoot[27076]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395284461.924:1762): avc: denied { unmount } for pid=17665 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 19 23:01:02 spectre setroubleshoot[27076]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395284461.924:1762): arch=c000003e syscall=166 success=no exit=-13 a0=7f6abc4e6850 a1=2 a2=0 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 23:01:02 spectre setroubleshoot[27076]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395284461.924:1762): >Mar 19 23:01:02 spectre setroubleshoot[27076]: dbus avc(node=spectre type=AVC msg=audit(1395284461.924:1763): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395284461.924:1763): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4e6850 a1=f0800 a2=1 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395284461.924:1763): >) called: 1 Connections >Mar 19 23:01:02 spectre setroubleshoot[27076]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395284461.924:1763): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 19 23:01:02 spectre setroubleshoot[27076]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395284461.924:1763): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4e6850 a1=f0800 a2=1 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 19 23:01:02 spectre setroubleshoot[27076]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395284461.924:1763): >Mar 19 23:01:02 spectre setroubleshoot[27076]: Plugin Exception restorecon_source >Mar 19 23:01:02 spectre setroubleshoot[27076]: Plugin Exception restorecon >Mar 19 23:01:02 spectre setroubleshoot[27076]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 23:01:02 spectre setroubleshoot[27076]: signature found in database >Mar 19 23:01:02 spectre setroubleshoot[27076]: sending alert to all clients >Mar 19 23:01:02 spectre setroubleshoot[27076]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.restorecon_source previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.rsync_data previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.kernel_modules previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.bind_ports previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.allow_execheap previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.cvs_data previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.catchall previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.wine previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.catchall_labels previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.samba_share previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.sys_module previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.allow_execmod previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.file previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.sys_resource previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.mmap_zero previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.openvpn previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.mozplugger previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.setenforce previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.dac_override previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.public_content previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.associate previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.xen_image previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.chrome previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.leaks previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.sshd_root previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.mounton previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.allow_execstack previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.restorecon previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.swapfile previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.connect_ports previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.vbetool previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.device previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 19 23:01:02 spectre python[27076]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 23:01:02 spectre setroubleshoot[27076]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 23:01:02 spectre setroubleshoot[27076]: signature found in database >Mar 19 23:01:02 spectre setroubleshoot[27076]: sending alert to all clients >Mar 19 23:01:02 spectre setroubleshoot[27076]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.restorecon_source previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.rsync_data previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.kernel_modules previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.bind_ports previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.allow_execheap previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.cvs_data previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.catchall previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.wine previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.catchall_labels previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.samba_share previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.sys_module previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.allow_execmod previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.file previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.sys_resource previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.mmap_zero previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.openvpn previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.mozplugger previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.setenforce previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.dac_override previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.public_content previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.associate previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.xen_image previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.chrome previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.leaks previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.sshd_root previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.mounton previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.allow_execstack previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.restorecon previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.swapfile previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.connect_ports previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.vbetool previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.device previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 19 23:01:02 spectre python[27076]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 23:01:02 spectre setroubleshoot[27076]: lookup_signature: found 1 matches with scores 1.00 >Mar 19 23:01:02 spectre setroubleshoot[27076]: signature found in database >Mar 19 23:01:02 spectre setroubleshoot[27076]: sending alert to all clients >Mar 19 23:01:02 spectre setroubleshoot[27076]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.restorecon_source previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.rsync_data previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.kernel_modules previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.catchall_boolean previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.automount_exec_config previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.bind_ports previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.allow_execheap previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.cvs_data previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.mozplugger_remove previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.catchall previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.sandbox_connect previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.httpd_write_content previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.wine previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.catchall_labels previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.samba_share previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.sys_module previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.qemu_blk_image previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.allow_execmod previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.file previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.sys_resource previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.mmap_zero previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.openvpn previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.mozplugger previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.setenforce previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.disable_ipv6 previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.dac_override previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.public_content previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.allow_anon_write previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.selinuxpolicy previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.associate previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.xen_image previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.chrome previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.leaks previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.sshd_root previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.qemu_file_image previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.mounton previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.allow_execstack previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.filesystem_associate previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.restorecon previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.swapfile previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.connect_ports previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.vbetool previously imported >Mar 19 23:01:02 spectre setroubleshoot[27076]: load_plugins() plugins.device previously imported >Mar 19 23:01:02 spectre python[27076]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 19 23:01:12 spectre setroubleshoot[27076]: received signal=14 >Mar 19 23:01:12 spectre setroubleshoot[27076]: KeyboardInterrupt in RunFaultServer >Mar 19 23:01:12 spectre setroubleshoot[27076]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 19 23:01:12 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 19 23:01:12 spectre dbus-daemon[637]: string index out of range >Mar 19 23:15:29 spectre systemd[1]: Starting dnf makecache... >Mar 19 23:15:29 spectre dnf[27101]: Config time: 0.005 >Mar 19 23:15:29 spectre dnf[27101]: cachedir: /var/cache/dnf/x86_64/21 >Mar 19 23:15:29 spectre dnf[27101]: dnf version: 0.4.18 >Mar 19 23:15:29 spectre dnf[27101]: Making cache files for all metadata files. >Mar 19 23:15:29 spectre dnf[27101]: Metadata cache refreshed recently. >Mar 19 23:15:29 spectre systemd[1]: Started dnf makecache. >Mar 20 00:01:01 spectre systemd[1]: Starting user-0.slice. >Mar 20 00:01:01 spectre systemd[1]: Created slice user-0.slice. >Mar 20 00:01:01 spectre systemd[1]: Starting Session 73 of user root. >Mar 20 00:01:01 spectre systemd[1]: Started Session 73 of user root. >Mar 20 00:01:01 spectre systemd[1]: Starting User Manager for UID 0... >Mar 20 00:01:02 spectre systemd[27111]: Starting Paths. >Mar 20 00:01:02 spectre systemd[27111]: Reached target Paths. >Mar 20 00:01:02 spectre systemd[27111]: Starting Timers. >Mar 20 00:01:02 spectre systemd[27111]: Reached target Timers. >Mar 20 00:01:02 spectre systemd[27111]: Starting Sockets. >Mar 20 00:01:02 spectre systemd[27111]: Reached target Sockets. >Mar 20 00:01:02 spectre systemd[27111]: Starting Basic System. >Mar 20 00:01:02 spectre systemd[27111]: Reached target Basic System. >Mar 20 00:01:02 spectre systemd[27111]: Starting Default. >Mar 20 00:01:02 spectre systemd[27111]: Reached target Default. >Mar 20 00:01:02 spectre systemd[27111]: Startup finished in 25ms. >Mar 20 00:01:02 spectre systemd[1]: Started User Manager for UID 0. >Mar 20 00:01:01 spectre systemd[27111]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 20 00:01:02 spectre CROND[27115]: (root) CMD (run-parts /etc/cron.hourly) >Mar 20 00:01:02 spectre run-parts[27118]: (/etc/cron.hourly) starting 0anacron >Mar 20 00:01:02 spectre anacron[27125]: Anacron started on 2014-03-20 >Mar 20 00:01:02 spectre anacron[27125]: Normal exit (0 jobs run) >Mar 20 00:01:02 spectre run-parts[27127]: (/etc/cron.hourly) finished 0anacron >Mar 20 00:01:02 spectre run-parts[27129]: (/etc/cron.hourly) starting mcelog.cron >Mar 20 00:01:02 spectre run-parts[27133]: (/etc/cron.hourly) finished mcelog.cron >Mar 20 00:01:02 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 20 00:01:02 spectre systemd[27111]: Stopping Default. >Mar 20 00:01:02 spectre systemd[27111]: Stopped target Default. >Mar 20 00:01:02 spectre systemd[27111]: Stopping Basic System. >Mar 20 00:01:02 spectre systemd[27111]: Stopped target Basic System. >Mar 20 00:01:02 spectre systemd[27111]: Stopping Paths. >Mar 20 00:01:02 spectre systemd[27111]: Stopped target Paths. >Mar 20 00:01:02 spectre systemd[27111]: Stopping Timers. >Mar 20 00:01:02 spectre systemd[27111]: Stopped target Timers. >Mar 20 00:01:02 spectre systemd[27111]: Stopping Sockets. >Mar 20 00:01:02 spectre systemd[27111]: Stopped target Sockets. >Mar 20 00:01:02 spectre systemd[27111]: Starting Shutdown. >Mar 20 00:01:02 spectre systemd[27111]: Reached target Shutdown. >Mar 20 00:01:02 spectre systemd[27111]: Starting Exit the Session... >Mar 20 00:01:02 spectre systemd[27111]: Received SIGRTMIN+24 from PID 27136 (kill). >Mar 20 00:01:02 spectre systemd[27113]: pam_unix(systemd-user:session): session closed for user root >Mar 20 00:01:02 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 20 00:01:02 spectre systemd[1]: Stopping user-0.slice. >Mar 20 00:01:02 spectre systemd[1]: Removed slice user-0.slice. >Mar 20 00:01:02 spectre systemd-logind[17665]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 20 00:01:02 spectre systemd-logind[17665]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 20 00:01:02 spectre systemd-logind[17665]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 20 00:01:02 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 20 00:01:02 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 20 00:01:02 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 20 00:01:02 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 20 00:01:02 spectre setroubleshoot[27141]: RunFaultServer(10) >Mar 20 00:01:02 spectre setroubleshoot[27141]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 20 00:01:02 spectre setroubleshoot[27141]: database version 3.0 compatible with current 3.0 version >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 20 00:01:02 spectre setroubleshoot[27141]: Number of Plugins = 46 >Mar 20 00:01:02 spectre setroubleshoot[27141]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 20 00:01:02 spectre setroubleshoot[27141]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 20 00:01:02 spectre setroubleshoot[27141]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 20 00:01:02 spectre setroubleshoot[27141]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 20 00:01:02 spectre setroubleshoot[27141]: dbus avc(node=spectre type=AVC msg=audit(1395288062.103:1778): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395288062.103:1778): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4e6850 a1=f0800 a2=0 a3=fffffffffffffa18 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395288062.103:1778): >) called: 1 Connections >Mar 20 00:01:02 spectre setroubleshoot[27141]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395288062.103:1778): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 20 00:01:02 spectre setroubleshoot[27141]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395288062.103:1778): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4e6850 a1=f0800 a2=0 a3=fffffffffffffa18 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 20 00:01:02 spectre setroubleshoot[27141]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395288062.103:1778): >Mar 20 00:01:02 spectre setroubleshoot[27141]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 20 00:01:02 spectre setroubleshoot[27141]: dbus avc(node=spectre type=AVC msg=audit(1395288062.103:1779): avc: denied { unmount } for pid=17665 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395288062.103:1779): arch=c000003e syscall=166 success=no exit=-13 a0=7f6abc4e6850 a1=2 a2=0 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395288062.103:1779): >) called: 1 Connections >Mar 20 00:01:02 spectre setroubleshoot[27141]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395288062.103:1779): avc: denied { unmount } for pid=17665 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 20 00:01:02 spectre setroubleshoot[27141]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395288062.103:1779): arch=c000003e syscall=166 success=no exit=-13 a0=7f6abc4e6850 a1=2 a2=0 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 20 00:01:02 spectre setroubleshoot[27141]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395288062.103:1779): >Mar 20 00:01:02 spectre setroubleshoot[27141]: dbus avc(node=spectre type=AVC msg=audit(1395288062.103:1780): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395288062.103:1780): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4e6850 a1=f0800 a2=1 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395288062.103:1780): >) called: 1 Connections >Mar 20 00:01:02 spectre setroubleshoot[27141]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395288062.103:1780): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 20 00:01:02 spectre setroubleshoot[27141]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395288062.103:1780): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4e6850 a1=f0800 a2=1 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 20 00:01:02 spectre setroubleshoot[27141]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395288062.103:1780): >Mar 20 00:01:02 spectre setroubleshoot[27141]: Plugin Exception restorecon_source >Mar 20 00:01:02 spectre setroubleshoot[27141]: Plugin Exception restorecon >Mar 20 00:01:02 spectre setroubleshoot[27141]: lookup_signature: found 1 matches with scores 1.00 >Mar 20 00:01:02 spectre setroubleshoot[27141]: signature found in database >Mar 20 00:01:02 spectre setroubleshoot[27141]: sending alert to all clients >Mar 20 00:01:02 spectre setroubleshoot[27141]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.restorecon_source previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.rsync_data previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.kernel_modules previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.catchall_boolean previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.automount_exec_config previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.bind_ports previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.allow_execheap previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.cvs_data previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.mozplugger_remove previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.catchall previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.sandbox_connect previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.httpd_write_content previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.wine previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.catchall_labels previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.samba_share previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.sys_module previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.qemu_blk_image previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.allow_execmod previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.file previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.sys_resource previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.mmap_zero previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.openvpn previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.mozplugger previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.setenforce previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.disable_ipv6 previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.dac_override previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.public_content previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.allow_anon_write previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.selinuxpolicy previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.associate previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.xen_image previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.chrome previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.leaks previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.sshd_root previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.qemu_file_image previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.mounton previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.allow_execstack previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.filesystem_associate previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.restorecon previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.swapfile previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.connect_ports previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.vbetool previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.device previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 20 00:01:02 spectre python[27141]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 20 00:01:02 spectre setroubleshoot[27141]: lookup_signature: found 1 matches with scores 1.00 >Mar 20 00:01:02 spectre setroubleshoot[27141]: signature found in database >Mar 20 00:01:02 spectre setroubleshoot[27141]: sending alert to all clients >Mar 20 00:01:02 spectre setroubleshoot[27141]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.restorecon_source previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.rsync_data previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.kernel_modules previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.catchall_boolean previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.automount_exec_config previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.bind_ports previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.allow_execheap previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.cvs_data previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.mozplugger_remove previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.catchall previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.sandbox_connect previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.httpd_write_content previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.wine previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.catchall_labels previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.samba_share previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.sys_module previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.qemu_blk_image previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.allow_execmod previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.file previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.sys_resource previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.mmap_zero previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.openvpn previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.mozplugger previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.setenforce previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.disable_ipv6 previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.dac_override previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.public_content previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.allow_anon_write previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.selinuxpolicy previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.associate previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.xen_image previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.chrome previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.leaks previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.sshd_root previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.qemu_file_image previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.mounton previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.allow_execstack previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.filesystem_associate previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.restorecon previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.swapfile previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.connect_ports previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.vbetool previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.device previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 20 00:01:02 spectre python[27141]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 20 00:01:02 spectre setroubleshoot[27141]: lookup_signature: found 1 matches with scores 1.00 >Mar 20 00:01:02 spectre setroubleshoot[27141]: signature found in database >Mar 20 00:01:02 spectre setroubleshoot[27141]: sending alert to all clients >Mar 20 00:01:02 spectre setroubleshoot[27141]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.restorecon_source previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.rsync_data previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.kernel_modules previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.catchall_boolean previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.automount_exec_config previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.bind_ports previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.allow_execheap previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.cvs_data previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.mozplugger_remove previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.catchall previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.sandbox_connect previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.httpd_write_content previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.wine previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.catchall_labels previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.samba_share previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.sys_module previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.qemu_blk_image previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.allow_execmod previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.file previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.sys_resource previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.mmap_zero previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.openvpn previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.mozplugger previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.setenforce previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.disable_ipv6 previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.dac_override previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.public_content previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.allow_anon_write previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.selinuxpolicy previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.associate previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.xen_image previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.chrome previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.leaks previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.sshd_root previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.qemu_file_image previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.mounton previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.allow_execstack previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.filesystem_associate previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.restorecon previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.swapfile previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.connect_ports previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.vbetool previously imported >Mar 20 00:01:02 spectre setroubleshoot[27141]: load_plugins() plugins.device previously imported >Mar 20 00:01:02 spectre python[27141]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 20 00:01:12 spectre setroubleshoot[27141]: received signal=14 >Mar 20 00:01:12 spectre setroubleshoot[27141]: KeyboardInterrupt in RunFaultServer >Mar 20 00:01:12 spectre setroubleshoot[27141]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 20 00:01:12 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 20 00:01:12 spectre dbus-daemon[637]: string index out of range >Mar 20 00:15:30 spectre systemd[1]: Starting dnf makecache... >Mar 20 00:15:30 spectre dnf[27167]: Config time: 0.006 >Mar 20 00:15:30 spectre dnf[27167]: cachedir: /var/cache/dnf/x86_64/21 >Mar 20 00:15:30 spectre dnf[27167]: dnf version: 0.4.18 >Mar 20 00:15:30 spectre dnf[27167]: Making cache files for all metadata files. >Mar 20 00:15:30 spectre dnf[27167]: Metadata cache refreshed recently. >Mar 20 00:15:30 spectre systemd[1]: Started dnf makecache. >Mar 20 01:01:01 spectre systemd[1]: Starting user-0.slice. >Mar 20 01:01:01 spectre systemd[1]: Created slice user-0.slice. >Mar 20 01:01:01 spectre systemd[1]: Starting User Manager for UID 0... >Mar 20 01:01:01 spectre systemd[1]: Starting Session 74 of user root. >Mar 20 01:01:01 spectre systemd[1]: Started Session 74 of user root. >Mar 20 01:01:01 spectre systemd[27175]: Starting Paths. >Mar 20 01:01:01 spectre systemd[27175]: Reached target Paths. >Mar 20 01:01:01 spectre systemd[27175]: Starting Timers. >Mar 20 01:01:01 spectre systemd[27175]: Reached target Timers. >Mar 20 01:01:01 spectre systemd[27175]: Starting Sockets. >Mar 20 01:01:01 spectre systemd[27175]: Reached target Sockets. >Mar 20 01:01:01 spectre systemd[27175]: Starting Basic System. >Mar 20 01:01:01 spectre systemd[27175]: Reached target Basic System. >Mar 20 01:01:01 spectre systemd[27175]: Starting Default. >Mar 20 01:01:01 spectre systemd[27175]: Reached target Default. >Mar 20 01:01:01 spectre systemd[27175]: Startup finished in 107ms. >Mar 20 01:01:01 spectre systemd[1]: Started User Manager for UID 0. >Mar 20 01:01:01 spectre systemd[27175]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 20 01:01:01 spectre CROND[27179]: (root) CMD (run-parts /etc/cron.hourly) >Mar 20 01:01:01 spectre run-parts[27182]: (/etc/cron.hourly) starting 0anacron >Mar 20 01:01:01 spectre anacron[27189]: Anacron started on 2014-03-20 >Mar 20 01:01:01 spectre anacron[27189]: Normal exit (0 jobs run) >Mar 20 01:01:01 spectre run-parts[27191]: (/etc/cron.hourly) finished 0anacron >Mar 20 01:01:01 spectre run-parts[27193]: (/etc/cron.hourly) starting mcelog.cron >Mar 20 01:01:01 spectre run-parts[27197]: (/etc/cron.hourly) finished mcelog.cron >Mar 20 01:01:01 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 20 01:01:01 spectre systemd[27175]: Stopping Default. >Mar 20 01:01:01 spectre systemd[27175]: Stopped target Default. >Mar 20 01:01:01 spectre systemd[27175]: Stopping Basic System. >Mar 20 01:01:01 spectre systemd[27175]: Stopped target Basic System. >Mar 20 01:01:01 spectre systemd[27175]: Stopping Paths. >Mar 20 01:01:01 spectre systemd[27175]: Stopped target Paths. >Mar 20 01:01:01 spectre systemd[27175]: Stopping Timers. >Mar 20 01:01:01 spectre systemd[27175]: Stopped target Timers. >Mar 20 01:01:01 spectre systemd[27175]: Stopping Sockets. >Mar 20 01:01:01 spectre systemd[27175]: Stopped target Sockets. >Mar 20 01:01:01 spectre systemd[27175]: Starting Shutdown. >Mar 20 01:01:01 spectre systemd[27175]: Reached target Shutdown. >Mar 20 01:01:01 spectre systemd[27175]: Starting Exit the Session... >Mar 20 01:01:01 spectre systemd[27175]: Received SIGRTMIN+24 from PID 27200 (kill). >Mar 20 01:01:01 spectre systemd[27177]: pam_unix(systemd-user:session): session closed for user root >Mar 20 01:01:01 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 20 01:01:01 spectre systemd[1]: Stopping user-0.slice. >Mar 20 01:01:01 spectre systemd[1]: Removed slice user-0.slice. >Mar 20 01:01:01 spectre systemd-logind[17665]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 20 01:01:01 spectre systemd-logind[17665]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 20 01:01:01 spectre systemd-logind[17665]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 20 01:01:01 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 20 01:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 20 01:01:01 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 20 01:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 20 01:01:01 spectre setroubleshoot[27206]: RunFaultServer(10) >Mar 20 01:01:01 spectre setroubleshoot[27206]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 20 01:01:01 spectre setroubleshoot[27206]: database version 3.0 compatible with current 3.0 version >Mar 20 01:01:01 spectre setroubleshoot[27206]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 20 01:01:01 spectre setroubleshoot[27206]: Number of Plugins = 46 >Mar 20 01:01:01 spectre setroubleshoot[27206]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 20 01:01:01 spectre setroubleshoot[27206]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 20 01:01:01 spectre setroubleshoot[27206]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 20 01:01:01 spectre setroubleshoot[27206]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 20 01:01:01 spectre setroubleshoot[27206]: dbus avc(node=spectre type=AVC msg=audit(1395291661.389:1795): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395291661.389:1795): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4efaf0 a1=f0800 a2=0 a3=fffffffffffff218 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395291661.389:1795): >) called: 1 Connections >Mar 20 01:01:01 spectre setroubleshoot[27206]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395291661.389:1795): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 20 01:01:01 spectre setroubleshoot[27206]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395291661.389:1795): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4efaf0 a1=f0800 a2=0 a3=fffffffffffff218 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 20 01:01:01 spectre setroubleshoot[27206]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395291661.389:1795): >Mar 20 01:01:01 spectre setroubleshoot[27206]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 20 01:01:01 spectre setroubleshoot[27206]: dbus avc(node=spectre type=AVC msg=audit(1395291661.389:1796): avc: denied { unmount } for pid=17665 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395291661.389:1796): arch=c000003e syscall=166 success=no exit=-13 a0=7f6abc4efaf0 a1=2 a2=0 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395291661.389:1796): >) called: 1 Connections >Mar 20 01:01:01 spectre setroubleshoot[27206]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395291661.389:1796): avc: denied { unmount } for pid=17665 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 20 01:01:01 spectre setroubleshoot[27206]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395291661.389:1796): arch=c000003e syscall=166 success=no exit=-13 a0=7f6abc4efaf0 a1=2 a2=0 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 20 01:01:01 spectre setroubleshoot[27206]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395291661.389:1796): >Mar 20 01:01:01 spectre setroubleshoot[27206]: dbus avc(node=spectre type=AVC msg=audit(1395291661.389:1797): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395291661.389:1797): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4efaf0 a1=f0800 a2=1 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395291661.389:1797): >) called: 1 Connections >Mar 20 01:01:01 spectre setroubleshoot[27206]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395291661.389:1797): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 20 01:01:01 spectre setroubleshoot[27206]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395291661.389:1797): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4efaf0 a1=f0800 a2=1 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 20 01:01:01 spectre setroubleshoot[27206]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395291661.389:1797): >Mar 20 01:01:01 spectre setroubleshoot[27206]: Plugin Exception restorecon_source >Mar 20 01:01:01 spectre setroubleshoot[27206]: Plugin Exception restorecon >Mar 20 01:01:01 spectre setroubleshoot[27206]: lookup_signature: found 1 matches with scores 1.00 >Mar 20 01:01:01 spectre setroubleshoot[27206]: signature found in database >Mar 20 01:01:01 spectre setroubleshoot[27206]: sending alert to all clients >Mar 20 01:01:01 spectre setroubleshoot[27206]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 20 01:01:01 spectre setroubleshoot[27206]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 20 01:01:01 spectre setroubleshoot[27206]: load_plugins() plugins.restorecon_source previously imported >Mar 20 01:01:01 spectre setroubleshoot[27206]: load_plugins() plugins.rsync_data previously imported >Mar 20 01:01:01 spectre setroubleshoot[27206]: load_plugins() plugins.kernel_modules previously imported >Mar 20 01:01:01 spectre setroubleshoot[27206]: load_plugins() plugins.catchall_boolean previously imported >Mar 20 01:01:01 spectre setroubleshoot[27206]: load_plugins() plugins.automount_exec_config previously imported >Mar 20 01:01:01 spectre setroubleshoot[27206]: load_plugins() plugins.bind_ports previously imported >Mar 20 01:01:01 spectre setroubleshoot[27206]: load_plugins() plugins.allow_execheap previously imported >Mar 20 01:01:01 spectre setroubleshoot[27206]: load_plugins() plugins.cvs_data previously imported >Mar 20 01:01:01 spectre setroubleshoot[27206]: load_plugins() plugins.mozplugger_remove previously imported >Mar 20 01:01:01 spectre setroubleshoot[27206]: load_plugins() plugins.catchall previously imported >Mar 20 01:01:01 spectre setroubleshoot[27206]: load_plugins() plugins.sandbox_connect previously imported >Mar 20 01:01:01 spectre setroubleshoot[27206]: load_plugins() plugins.httpd_write_content previously imported >Mar 20 01:01:01 spectre setroubleshoot[27206]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 20 01:01:01 spectre setroubleshoot[27206]: load_plugins() plugins.wine previously imported >Mar 20 01:01:01 spectre setroubleshoot[27206]: load_plugins() plugins.catchall_labels previously imported >Mar 20 01:01:01 spectre setroubleshoot[27206]: load_plugins() plugins.samba_share previously imported >Mar 20 01:01:01 spectre setroubleshoot[27206]: load_plugins() plugins.sys_module previously imported >Mar 20 01:01:01 spectre setroubleshoot[27206]: load_plugins() plugins.qemu_blk_image previously imported >Mar 20 01:01:01 spectre setroubleshoot[27206]: load_plugins() plugins.allow_execmod previously imported >Mar 20 01:01:01 spectre setroubleshoot[27206]: load_plugins() plugins.file previously imported >Mar 20 01:01:01 spectre setroubleshoot[27206]: load_plugins() plugins.sys_resource previously imported >Mar 20 01:01:01 spectre setroubleshoot[27206]: load_plugins() plugins.mmap_zero previously imported >Mar 20 01:01:01 spectre setroubleshoot[27206]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 20 01:01:01 spectre setroubleshoot[27206]: load_plugins() plugins.openvpn previously imported >Mar 20 01:01:01 spectre setroubleshoot[27206]: load_plugins() plugins.mozplugger previously imported >Mar 20 01:01:01 spectre setroubleshoot[27206]: load_plugins() plugins.setenforce previously imported >Mar 20 01:01:01 spectre setroubleshoot[27206]: load_plugins() plugins.disable_ipv6 previously imported >Mar 20 01:01:01 spectre setroubleshoot[27206]: load_plugins() plugins.dac_override previously imported >Mar 20 01:01:01 spectre setroubleshoot[27206]: load_plugins() plugins.public_content previously imported >Mar 20 01:01:01 spectre setroubleshoot[27206]: load_plugins() plugins.allow_anon_write previously imported >Mar 20 01:01:01 spectre setroubleshoot[27206]: load_plugins() plugins.selinuxpolicy previously imported >Mar 20 01:01:01 spectre setroubleshoot[27206]: load_plugins() plugins.associate previously imported >Mar 20 01:01:01 spectre setroubleshoot[27206]: load_plugins() plugins.xen_image previously imported >Mar 20 01:01:01 spectre setroubleshoot[27206]: load_plugins() plugins.chrome previously imported >Mar 20 01:01:01 spectre setroubleshoot[27206]: load_plugins() plugins.leaks previously imported >Mar 20 01:01:01 spectre setroubleshoot[27206]: load_plugins() plugins.sshd_root previously imported >Mar 20 01:01:01 spectre setroubleshoot[27206]: load_plugins() plugins.qemu_file_image previously imported >Mar 20 01:01:01 spectre setroubleshoot[27206]: load_plugins() plugins.mounton previously imported >Mar 20 01:01:01 spectre setroubleshoot[27206]: load_plugins() plugins.allow_execstack previously imported >Mar 20 01:01:01 spectre setroubleshoot[27206]: load_plugins() plugins.filesystem_associate previously imported >Mar 20 01:01:01 spectre setroubleshoot[27206]: load_plugins() plugins.restorecon previously imported >Mar 20 01:01:01 spectre setroubleshoot[27206]: load_plugins() plugins.swapfile previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.connect_ports previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.vbetool previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.device previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 20 01:01:02 spectre python[27206]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 20 01:01:02 spectre setroubleshoot[27206]: lookup_signature: found 1 matches with scores 1.00 >Mar 20 01:01:02 spectre setroubleshoot[27206]: signature found in database >Mar 20 01:01:02 spectre setroubleshoot[27206]: sending alert to all clients >Mar 20 01:01:02 spectre setroubleshoot[27206]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.restorecon_source previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.rsync_data previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.kernel_modules previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.catchall_boolean previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.automount_exec_config previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.bind_ports previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.allow_execheap previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.cvs_data previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.mozplugger_remove previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.catchall previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.sandbox_connect previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.httpd_write_content previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.wine previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.catchall_labels previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.samba_share previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.sys_module previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.qemu_blk_image previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.allow_execmod previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.file previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.sys_resource previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.mmap_zero previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.openvpn previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.mozplugger previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.setenforce previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.disable_ipv6 previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.dac_override previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.public_content previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.allow_anon_write previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.selinuxpolicy previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.associate previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.xen_image previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.chrome previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.leaks previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.sshd_root previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.qemu_file_image previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.mounton previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.allow_execstack previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.filesystem_associate previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.restorecon previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.swapfile previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.connect_ports previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.vbetool previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.device previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 20 01:01:02 spectre python[27206]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 20 01:01:02 spectre setroubleshoot[27206]: lookup_signature: found 1 matches with scores 1.00 >Mar 20 01:01:02 spectre setroubleshoot[27206]: signature found in database >Mar 20 01:01:02 spectre setroubleshoot[27206]: sending alert to all clients >Mar 20 01:01:02 spectre setroubleshoot[27206]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.restorecon_source previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.rsync_data previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.kernel_modules previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.catchall_boolean previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.automount_exec_config previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.bind_ports previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.allow_execheap previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.cvs_data previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.mozplugger_remove previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.catchall previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.sandbox_connect previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.httpd_write_content previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.wine previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.catchall_labels previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.samba_share previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.sys_module previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.qemu_blk_image previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.allow_execmod previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.file previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.sys_resource previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.mmap_zero previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.openvpn previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.mozplugger previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.setenforce previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.disable_ipv6 previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.dac_override previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.public_content previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.allow_anon_write previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.selinuxpolicy previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.associate previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.xen_image previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.chrome previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.leaks previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.sshd_root previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.qemu_file_image previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.mounton previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.allow_execstack previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.filesystem_associate previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.restorecon previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.swapfile previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.connect_ports previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.vbetool previously imported >Mar 20 01:01:02 spectre setroubleshoot[27206]: load_plugins() plugins.device previously imported >Mar 20 01:01:02 spectre python[27206]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 20 01:01:11 spectre setroubleshoot[27206]: received signal=14 >Mar 20 01:01:11 spectre setroubleshoot[27206]: KeyboardInterrupt in RunFaultServer >Mar 20 01:01:11 spectre setroubleshoot[27206]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 20 01:01:11 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 20 01:01:11 spectre dbus-daemon[637]: string index out of range >Mar 20 01:15:31 spectre systemd[1]: Starting dnf makecache... >Mar 20 01:15:31 spectre dnf[27232]: Config time: 0.006 >Mar 20 01:15:31 spectre dnf[27232]: cachedir: /var/cache/dnf/x86_64/21 >Mar 20 01:15:31 spectre dnf[27232]: dnf version: 0.4.18 >Mar 20 01:15:31 spectre dnf[27232]: Making cache files for all metadata files. >Mar 20 01:15:31 spectre dnf[27232]: rawhide: metadata will expire after 10788 seconds and will be refreshed now >Mar 20 01:15:32 spectre dnf[27232]: reviving: failed for 'rawhide', mismatched sha256 sum. >Mar 20 01:16:00 spectre dnf[27232]: hawkey sack setup time: 28.714 >Mar 20 01:16:00 spectre dnf[27232]: Metadata cache created. >Mar 20 01:16:00 spectre systemd[1]: Started dnf makecache. >Mar 20 02:01:01 spectre systemd[1]: Starting user-0.slice. >Mar 20 02:01:01 spectre systemd[1]: Created slice user-0.slice. >Mar 20 02:01:01 spectre systemd[1]: Starting User Manager for UID 0... >Mar 20 02:01:01 spectre systemd[1]: Starting Session 75 of user root. >Mar 20 02:01:01 spectre systemd[1]: Started Session 75 of user root. >Mar 20 02:01:01 spectre systemd[27247]: Starting Paths. >Mar 20 02:01:01 spectre systemd[27247]: Reached target Paths. >Mar 20 02:01:01 spectre systemd[27247]: Starting Timers. >Mar 20 02:01:01 spectre systemd[27247]: Reached target Timers. >Mar 20 02:01:01 spectre systemd[27247]: Starting Sockets. >Mar 20 02:01:01 spectre systemd[27247]: Reached target Sockets. >Mar 20 02:01:01 spectre systemd[27247]: Starting Basic System. >Mar 20 02:01:01 spectre systemd[27247]: Reached target Basic System. >Mar 20 02:01:01 spectre systemd[27247]: Starting Default. >Mar 20 02:01:01 spectre systemd[27247]: Reached target Default. >Mar 20 02:01:01 spectre systemd[27247]: Startup finished in 18ms. >Mar 20 02:01:01 spectre systemd[1]: Started User Manager for UID 0. >Mar 20 02:01:01 spectre systemd[27247]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 20 02:01:01 spectre CROND[27251]: (root) CMD (run-parts /etc/cron.hourly) >Mar 20 02:01:01 spectre run-parts[27254]: (/etc/cron.hourly) starting 0anacron >Mar 20 02:01:01 spectre anacron[27261]: Anacron started on 2014-03-20 >Mar 20 02:01:01 spectre anacron[27261]: Normal exit (0 jobs run) >Mar 20 02:01:01 spectre run-parts[27263]: (/etc/cron.hourly) finished 0anacron >Mar 20 02:01:01 spectre run-parts[27265]: (/etc/cron.hourly) starting mcelog.cron >Mar 20 02:01:01 spectre run-parts[27269]: (/etc/cron.hourly) finished mcelog.cron >Mar 20 02:01:01 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 20 02:01:01 spectre systemd[27247]: Stopping Default. >Mar 20 02:01:01 spectre systemd[27247]: Stopped target Default. >Mar 20 02:01:01 spectre systemd[27247]: Stopping Basic System. >Mar 20 02:01:01 spectre systemd[27247]: Stopped target Basic System. >Mar 20 02:01:01 spectre systemd[27247]: Stopping Paths. >Mar 20 02:01:01 spectre systemd[27247]: Stopped target Paths. >Mar 20 02:01:01 spectre systemd[27247]: Stopping Timers. >Mar 20 02:01:01 spectre systemd[27247]: Stopped target Timers. >Mar 20 02:01:01 spectre systemd[27247]: Stopping Sockets. >Mar 20 02:01:01 spectre systemd[27247]: Stopped target Sockets. >Mar 20 02:01:01 spectre systemd[27247]: Starting Shutdown. >Mar 20 02:01:01 spectre systemd[27247]: Reached target Shutdown. >Mar 20 02:01:01 spectre systemd[27247]: Starting Exit the Session... >Mar 20 02:01:01 spectre systemd[27247]: Received SIGRTMIN+24 from PID 27271 (kill). >Mar 20 02:01:01 spectre systemd[27249]: pam_unix(systemd-user:session): session closed for user root >Mar 20 02:01:01 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 20 02:01:01 spectre systemd[1]: Stopping user-0.slice. >Mar 20 02:01:01 spectre systemd[1]: Removed slice user-0.slice. >Mar 20 02:01:01 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 20 02:01:01 spectre systemd-logind[17665]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 20 02:01:01 spectre systemd-logind[17665]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 20 02:01:01 spectre systemd-logind[17665]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 20 02:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 20 02:01:01 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 20 02:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 20 02:01:01 spectre setroubleshoot[27276]: RunFaultServer(10) >Mar 20 02:01:02 spectre setroubleshoot[27276]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 20 02:01:02 spectre setroubleshoot[27276]: database version 3.0 compatible with current 3.0 version >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 20 02:01:02 spectre setroubleshoot[27276]: Number of Plugins = 46 >Mar 20 02:01:02 spectre setroubleshoot[27276]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 20 02:01:02 spectre setroubleshoot[27276]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 20 02:01:02 spectre setroubleshoot[27276]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 20 02:01:02 spectre setroubleshoot[27276]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 20 02:01:02 spectre setroubleshoot[27276]: dbus avc(node=spectre type=AVC msg=audit(1395295261.574:1812): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395295261.574:1812): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4efaf0 a1=f0800 a2=0 a3=fffffffffffffa18 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395295261.574:1812): >) called: 1 Connections >Mar 20 02:01:02 spectre setroubleshoot[27276]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395295261.574:1812): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 20 02:01:02 spectre setroubleshoot[27276]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395295261.574:1812): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4efaf0 a1=f0800 a2=0 a3=fffffffffffffa18 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 20 02:01:02 spectre setroubleshoot[27276]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395295261.574:1812): >Mar 20 02:01:02 spectre setroubleshoot[27276]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 20 02:01:02 spectre setroubleshoot[27276]: dbus avc(node=spectre type=AVC msg=audit(1395295261.574:1813): avc: denied { unmount } for pid=17665 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395295261.574:1813): arch=c000003e syscall=166 success=no exit=-13 a0=7f6abc4efaf0 a1=2 a2=0 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395295261.574:1813): >) called: 1 Connections >Mar 20 02:01:02 spectre setroubleshoot[27276]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395295261.574:1813): avc: denied { unmount } for pid=17665 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 20 02:01:02 spectre setroubleshoot[27276]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395295261.574:1813): arch=c000003e syscall=166 success=no exit=-13 a0=7f6abc4efaf0 a1=2 a2=0 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 20 02:01:02 spectre setroubleshoot[27276]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395295261.574:1813): >Mar 20 02:01:02 spectre setroubleshoot[27276]: dbus avc(node=spectre type=AVC msg=audit(1395295261.575:1814): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395295261.575:1814): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4efaf0 a1=f0800 a2=1 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395295261.575:1814): >) called: 1 Connections >Mar 20 02:01:02 spectre setroubleshoot[27276]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395295261.575:1814): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 20 02:01:02 spectre setroubleshoot[27276]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395295261.575:1814): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4efaf0 a1=f0800 a2=1 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 20 02:01:02 spectre setroubleshoot[27276]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395295261.575:1814): >Mar 20 02:01:02 spectre setroubleshoot[27276]: Plugin Exception restorecon_source >Mar 20 02:01:02 spectre setroubleshoot[27276]: Plugin Exception restorecon >Mar 20 02:01:02 spectre setroubleshoot[27276]: lookup_signature: found 1 matches with scores 1.00 >Mar 20 02:01:02 spectre setroubleshoot[27276]: signature found in database >Mar 20 02:01:02 spectre setroubleshoot[27276]: sending alert to all clients >Mar 20 02:01:02 spectre setroubleshoot[27276]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.restorecon_source previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.rsync_data previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.kernel_modules previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.catchall_boolean previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.automount_exec_config previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.bind_ports previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.allow_execheap previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.cvs_data previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.mozplugger_remove previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.catchall previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.sandbox_connect previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.httpd_write_content previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.wine previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.catchall_labels previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.samba_share previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.sys_module previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.qemu_blk_image previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.allow_execmod previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.file previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.sys_resource previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.mmap_zero previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.openvpn previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.mozplugger previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.setenforce previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.disable_ipv6 previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.dac_override previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.public_content previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.allow_anon_write previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.selinuxpolicy previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.associate previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.xen_image previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.chrome previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.leaks previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.sshd_root previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.qemu_file_image previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.mounton previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.allow_execstack previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.filesystem_associate previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.restorecon previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.swapfile previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.connect_ports previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.vbetool previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.device previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 20 02:01:02 spectre python[27276]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 20 02:01:02 spectre setroubleshoot[27276]: lookup_signature: found 1 matches with scores 1.00 >Mar 20 02:01:02 spectre setroubleshoot[27276]: signature found in database >Mar 20 02:01:02 spectre setroubleshoot[27276]: sending alert to all clients >Mar 20 02:01:02 spectre setroubleshoot[27276]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.restorecon_source previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.rsync_data previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.kernel_modules previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.catchall_boolean previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.automount_exec_config previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.bind_ports previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.allow_execheap previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.cvs_data previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.mozplugger_remove previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.catchall previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.sandbox_connect previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.httpd_write_content previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.wine previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.catchall_labels previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.samba_share previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.sys_module previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.qemu_blk_image previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.allow_execmod previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.file previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.sys_resource previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.mmap_zero previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.openvpn previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.mozplugger previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.setenforce previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.disable_ipv6 previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.dac_override previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.public_content previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.allow_anon_write previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.selinuxpolicy previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.associate previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.xen_image previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.chrome previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.leaks previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.sshd_root previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.qemu_file_image previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.mounton previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.allow_execstack previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.filesystem_associate previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.restorecon previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.swapfile previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.connect_ports previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.vbetool previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.device previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 20 02:01:02 spectre python[27276]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 20 02:01:02 spectre setroubleshoot[27276]: lookup_signature: found 1 matches with scores 1.00 >Mar 20 02:01:02 spectre setroubleshoot[27276]: signature found in database >Mar 20 02:01:02 spectre setroubleshoot[27276]: sending alert to all clients >Mar 20 02:01:02 spectre setroubleshoot[27276]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.restorecon_source previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.rsync_data previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.kernel_modules previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.catchall_boolean previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.automount_exec_config previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.bind_ports previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.allow_execheap previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.cvs_data previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.mozplugger_remove previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.catchall previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.sandbox_connect previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.httpd_write_content previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.wine previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.catchall_labels previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.samba_share previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.sys_module previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.qemu_blk_image previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.allow_execmod previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.file previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.sys_resource previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.mmap_zero previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.openvpn previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.mozplugger previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.setenforce previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.disable_ipv6 previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.dac_override previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.public_content previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.allow_anon_write previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.selinuxpolicy previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.associate previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.xen_image previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.chrome previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.leaks previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.sshd_root previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.qemu_file_image previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.mounton previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.allow_execstack previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.filesystem_associate previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.restorecon previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.swapfile previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.connect_ports previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.vbetool previously imported >Mar 20 02:01:02 spectre setroubleshoot[27276]: load_plugins() plugins.device previously imported >Mar 20 02:01:02 spectre python[27276]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 20 02:01:12 spectre setroubleshoot[27276]: received signal=14 >Mar 20 02:01:12 spectre setroubleshoot[27276]: KeyboardInterrupt in RunFaultServer >Mar 20 02:01:12 spectre setroubleshoot[27276]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 20 02:01:12 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 20 02:01:12 spectre dbus-daemon[637]: string index out of range >Mar 20 02:16:02 spectre systemd[1]: Starting dnf makecache... >Mar 20 02:16:02 spectre dnf[27302]: Config time: 0.006 >Mar 20 02:16:02 spectre dnf[27302]: cachedir: /var/cache/dnf/x86_64/21 >Mar 20 02:16:02 spectre dnf[27302]: dnf version: 0.4.18 >Mar 20 02:16:02 spectre dnf[27302]: Making cache files for all metadata files. >Mar 20 02:16:02 spectre dnf[27302]: Metadata cache refreshed recently. >Mar 20 02:16:02 spectre systemd[1]: Started dnf makecache. >Mar 20 03:01:01 spectre systemd[1]: Starting user-0.slice. >Mar 20 03:01:01 spectre systemd[1]: Created slice user-0.slice. >Mar 20 03:01:01 spectre systemd[1]: Starting User Manager for UID 0... >Mar 20 03:01:01 spectre systemd[1]: Starting Session 76 of user root. >Mar 20 03:01:01 spectre systemd[1]: Started Session 76 of user root. >Mar 20 03:01:01 spectre systemd[27312]: Starting Paths. >Mar 20 03:01:01 spectre systemd[27312]: Reached target Paths. >Mar 20 03:01:01 spectre systemd[27312]: Starting Timers. >Mar 20 03:01:01 spectre systemd[27312]: Reached target Timers. >Mar 20 03:01:01 spectre systemd[27312]: Starting Sockets. >Mar 20 03:01:01 spectre systemd[27312]: Reached target Sockets. >Mar 20 03:01:01 spectre systemd[27312]: Starting Basic System. >Mar 20 03:01:01 spectre systemd[27312]: Reached target Basic System. >Mar 20 03:01:01 spectre systemd[27312]: Starting Default. >Mar 20 03:01:01 spectre systemd[27312]: Reached target Default. >Mar 20 03:01:01 spectre systemd[27312]: Startup finished in 21ms. >Mar 20 03:01:01 spectre systemd[1]: Started User Manager for UID 0. >Mar 20 03:01:01 spectre systemd[27312]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 20 03:01:01 spectre CROND[27316]: (root) CMD (run-parts /etc/cron.hourly) >Mar 20 03:01:01 spectre run-parts[27319]: (/etc/cron.hourly) starting 0anacron >Mar 20 03:01:01 spectre anacron[27326]: Anacron started on 2014-03-20 >Mar 20 03:01:01 spectre anacron[27326]: Will run job `cron.daily' in 8 min. >Mar 20 03:01:01 spectre anacron[27326]: Will run job `cron.weekly' in 28 min. >Mar 20 03:01:01 spectre anacron[27326]: Jobs will be executed sequentially >Mar 20 03:01:01 spectre run-parts[27328]: (/etc/cron.hourly) finished 0anacron >Mar 20 03:01:01 spectre run-parts[27330]: (/etc/cron.hourly) starting mcelog.cron >Mar 20 03:01:01 spectre run-parts[27334]: (/etc/cron.hourly) finished mcelog.cron >Mar 20 03:09:01 spectre anacron[27326]: Job `cron.daily' started >Mar 20 03:09:01 spectre run-parts[27338]: (/etc/cron.daily) starting logrotate >Mar 20 03:09:01 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 20 03:09:01 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 20 03:09:01 spectre run-parts[27345]: (/etc/cron.daily) finished logrotate >Mar 20 03:09:01 spectre run-parts[27347]: (/etc/cron.daily) starting man-db.cron >Mar 20 03:09:02 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 20 03:09:02 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 20 03:09:02 spectre setroubleshoot[27343]: RunFaultServer(10) >Mar 20 03:09:02 spectre setroubleshoot[27343]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 20 03:09:02 spectre setroubleshoot[27343]: database version 3.0 compatible with current 3.0 version >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 20 03:09:02 spectre setroubleshoot[27343]: Number of Plugins = 46 >Mar 20 03:09:02 spectre setroubleshoot[27343]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 20 03:09:02 spectre setroubleshoot[27343]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 20 03:09:02 spectre setroubleshoot[27343]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 20 03:09:02 spectre setroubleshoot[27343]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 20 03:09:02 spectre setroubleshoot[27343]: dbus avc(node=spectre type=AVC msg=audit(1395299341.730:1827): avc: denied { write } for pid=27341 comm="logrotate" path=2F72756E2F73797374656D642F73657373696F6E732F37362E726566202864656C6574656429 dev="tmpfs" ino=243292 scontext=system_u:system_r:logrotate_t:s0-s0:c0.c1023 tcontext=system_u:object_r:systemd_logind_sessions_t:s0 tclass=fifo_file >node=spectre type=SYSCALL msg=audit(1395299341.730:1827): arch=c000003e syscall=59 success=yes exit=0 a0=c3d5e0 a1=c3c5e0 a2=c3bf80 a3=8 items=0 ppid=27339 pid=27341 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=76 comm="logrotate" exe="/usr/sbin/logrotate" subj=system_u:system_r:logrotate_t:s0-s0:c0.c1023 key=(null) >node=spectre type=EOE msg=audit(1395299341.730:1827): >) called: 1 Connections >Mar 20 03:09:02 spectre setroubleshoot[27343]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395299341.730:1827): avc: denied { write } for pid=27341 comm="logrotate" path=2F72756E2F73797374656D642F73657373696F6E732F37362E726566202864656C6574656429 dev="tmpfs" ino=243292 scontext=system_u:system_r:logrotate_t:s0-s0:c0.c1023 tcontext=system_u:object_r:systemd_logind_sessions_t:s0 tclass=fifo_file >Mar 20 03:09:02 spectre setroubleshoot[27343]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395299341.730:1827): arch=c000003e syscall=59 success=yes exit=0 a0=c3d5e0 a1=c3c5e0 a2=c3bf80 a3=8 items=0 ppid=27339 pid=27341 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=76 comm="logrotate" exe="/usr/sbin/logrotate" subj=system_u:system_r:logrotate_t:s0-s0:c0.c1023 key=(null) >Mar 20 03:09:02 spectre setroubleshoot[27343]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395299341.730:1827): >Mar 20 03:09:02 spectre setroubleshoot[27343]: analyze_avc() avc=scontext=system_u:system_r:logrotate_t:s0-s0:c0.c1023 tcontext=system_u:object_r:systemd_logind_sessions_t:s0 access=['write'] tclass=fifo_file tpath= >Mar 20 03:09:02 spectre setroubleshoot[27343]: dbus avc(node=spectre type=AVC msg=audit(1395299341.808:1828): avc: denied { write } for pid=27348 comm="man-db.cron" path=2F72756E2F73797374656D642F73657373696F6E732F37362E726566202864656C6574656429 dev="tmpfs" ino=243292 scontext=system_u:system_r:mandb_t:s0-s0:c0.c1023 tcontext=system_u:object_r:systemd_logind_sessions_t:s0 tclass=fifo_file >node=spectre type=SYSCALL msg=audit(1395299341.808:1828): arch=c000003e syscall=59 success=yes exit=0 a0=1b91cc0 a1=1b8c7f0 a2=1b89f60 a3=8 items=0 ppid=27335 pid=27348 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=76 comm="man-db.cron" exe="/usr/bin/bash" subj=system_u:system_r:mandb_t:s0-s0:c0.c1023 key=(null) >node=spectre type=EOE msg=audit(1395299341.808:1828): >) called: 1 Connections >Mar 20 03:09:02 spectre setroubleshoot[27343]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395299341.808:1828): avc: denied { write } for pid=27348 comm="man-db.cron" path=2F72756E2F73797374656D642F73657373696F6E732F37362E726566202864656C6574656429 dev="tmpfs" ino=243292 scontext=system_u:system_r:mandb_t:s0-s0:c0.c1023 tcontext=system_u:object_r:systemd_logind_sessions_t:s0 tclass=fifo_file >Mar 20 03:09:02 spectre setroubleshoot[27343]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395299341.808:1828): arch=c000003e syscall=59 success=yes exit=0 a0=1b91cc0 a1=1b8c7f0 a2=1b89f60 a3=8 items=0 ppid=27335 pid=27348 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=76 comm="man-db.cron" exe="/usr/bin/bash" subj=system_u:system_r:mandb_t:s0-s0:c0.c1023 key=(null) >Mar 20 03:09:02 spectre setroubleshoot[27343]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395299341.808:1828): >Mar 20 03:09:02 spectre setroubleshoot[27343]: Plugin Exception restorecon_source >Mar 20 03:09:02 spectre setroubleshoot[27343]: lookup_signature: found 1 matches with scores 1.00 >Mar 20 03:09:02 spectre setroubleshoot[27343]: signature found in database >Mar 20 03:09:02 spectre setroubleshoot[27343]: sending alert to all clients >Mar 20 03:09:02 spectre setroubleshoot[27343]: SELinux is preventing /usr/sbin/logrotate from write access on the fifo_file . For complete SELinux messages. run sealert -l 301b536e-8c6c-427a-bc27-36034acc1338 >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.restorecon_source previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.rsync_data previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.kernel_modules previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.catchall_boolean previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.automount_exec_config previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.bind_ports previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.allow_execheap previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.cvs_data previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.mozplugger_remove previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.catchall previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.sandbox_connect previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.httpd_write_content previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.wine previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.catchall_labels previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.samba_share previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.sys_module previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.qemu_blk_image previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.allow_execmod previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.file previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.sys_resource previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.mmap_zero previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.openvpn previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.mozplugger previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.setenforce previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.disable_ipv6 previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.dac_override previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.public_content previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.allow_anon_write previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.selinuxpolicy previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.associate previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.xen_image previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.chrome previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.leaks previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.sshd_root previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.qemu_file_image previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.mounton previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.allow_execstack previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.filesystem_associate previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.restorecon previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.swapfile previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.connect_ports previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.vbetool previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.device previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: analyze_avc() avc=scontext=system_u:system_r:mandb_t:s0-s0:c0.c1023 tcontext=system_u:object_r:systemd_logind_sessions_t:s0 access=['write'] tclass=fifo_file tpath= >Mar 20 03:09:02 spectre python[27343]: SELinux is preventing /usr/sbin/logrotate from write access on the fifo_file . > >***** Plugin leaks (86.2 confidence) suggests ***************************** > >If you want to ignore logrotate trying to write access the fifo_file, because you believe it should not need this access. >Then you should report this as a bug. >You can generate a local policy module to dontaudit this access. >Do ># grep /usr/sbin/logrotate /var/log/audit/audit.log | audit2allow -D -M mypol ># semodule -i mypol.pp > >***** Plugin catchall (14.7 confidence) suggests ************************** > >If you believe that logrotate should be allowed write access on the fifo_file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep logrotate /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 20 03:09:02 spectre setroubleshoot[27343]: lookup_signature: found 1 matches with scores 1.00 >Mar 20 03:09:02 spectre setroubleshoot[27343]: signature found in database >Mar 20 03:09:02 spectre setroubleshoot[27343]: sending alert to all clients >Mar 20 03:09:02 spectre setroubleshoot[27343]: SELinux is preventing /usr/bin/bash from write access on the fifo_file . For complete SELinux messages. run sealert -l 7f66a60f-0426-430e-a44a-4d6a87d3ccc1 >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.restorecon_source previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.rsync_data previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.kernel_modules previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.catchall_boolean previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.automount_exec_config previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.bind_ports previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.allow_execheap previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.cvs_data previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.mozplugger_remove previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.catchall previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.sandbox_connect previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.httpd_write_content previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.wine previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.catchall_labels previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.samba_share previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.sys_module previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.qemu_blk_image previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.allow_execmod previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.file previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.sys_resource previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.mmap_zero previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.openvpn previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.mozplugger previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.setenforce previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.disable_ipv6 previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.dac_override previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.public_content previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.allow_anon_write previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.selinuxpolicy previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.associate previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.xen_image previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.chrome previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.leaks previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.sshd_root previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.qemu_file_image previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.mounton previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.allow_execstack previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.filesystem_associate previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.restorecon previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.swapfile previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.connect_ports previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.vbetool previously imported >Mar 20 03:09:02 spectre setroubleshoot[27343]: load_plugins() plugins.device previously imported >Mar 20 03:09:02 spectre python[27343]: SELinux is preventing /usr/bin/bash from write access on the fifo_file . > >***** Plugin leaks (86.2 confidence) suggests ***************************** > >If you want to ignore bash trying to write access the fifo_file, because you believe it should not need this access. >Then you should report this as a bug. >You can generate a local policy module to dontaudit this access. >Do ># grep /usr/bin/bash /var/log/audit/audit.log | audit2allow -D -M mypol ># semodule -i mypol.pp > >***** Plugin catchall (14.7 confidence) suggests ************************** > >If you believe that bash should be allowed write access on the fifo_file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep man-db.cron /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 20 03:09:12 spectre setroubleshoot[27343]: received signal=14 >Mar 20 03:09:12 spectre setroubleshoot[27343]: KeyboardInterrupt in RunFaultServer >Mar 20 03:09:12 spectre setroubleshoot[27343]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=2 >Mar 20 03:09:12 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 20 03:09:15 spectre run-parts[29340]: (/etc/cron.daily) finished man-db.cron >Mar 20 03:09:15 spectre run-parts[29342]: (/etc/cron.daily) starting mlocate >Mar 20 03:09:15 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 20 03:09:15 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 20 03:09:15 spectre run-parts[29355]: (/etc/cron.daily) finished mlocate >Mar 20 03:09:15 spectre run-parts[29357]: (/etc/cron.daily) starting prelink >Mar 20 03:09:15 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 20 03:09:15 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 20 03:09:15 spectre setroubleshoot[29348]: RunFaultServer(10) >Mar 20 03:09:15 spectre setroubleshoot[29348]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 20 03:09:15 spectre setroubleshoot[29348]: database version 3.0 compatible with current 3.0 version >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 20 03:09:15 spectre setroubleshoot[29348]: Number of Plugins = 46 >Mar 20 03:09:15 spectre setroubleshoot[29348]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 20 03:09:15 spectre setroubleshoot[29348]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 20 03:09:15 spectre setroubleshoot[29348]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 20 03:09:15 spectre setroubleshoot[29348]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 20 03:09:15 spectre setroubleshoot[29348]: dbus avc(node=spectre type=AVC msg=audit(1395299355.073:1829): avc: denied { write } for pid=29343 comm="mlocate" path=2F72756E2F73797374656D642F73657373696F6E732F37362E726566202864656C6574656429 dev="tmpfs" ino=243292 scontext=system_u:system_r:locate_t:s0-s0:c0.c1023 tcontext=system_u:object_r:systemd_logind_sessions_t:s0 tclass=fifo_file >node=spectre type=SYSCALL msg=audit(1395299355.073:1829): arch=c000003e syscall=59 success=yes exit=0 a0=1b8c790 a1=1b8c7f0 a2=1b89f60 a3=8 items=0 ppid=27335 pid=29343 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=76 comm="mlocate" exe="/usr/bin/bash" subj=system_u:system_r:locate_t:s0-s0:c0.c1023 key=(null) >node=spectre type=EOE msg=audit(1395299355.073:1829): >) called: 1 Connections >Mar 20 03:09:15 spectre setroubleshoot[29348]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395299355.73:1829): avc: denied { write } for pid=29343 comm="mlocate" path=2F72756E2F73797374656D642F73657373696F6E732F37362E726566202864656C6574656429 dev="tmpfs" ino=243292 scontext=system_u:system_r:locate_t:s0-s0:c0.c1023 tcontext=system_u:object_r:systemd_logind_sessions_t:s0 tclass=fifo_file >Mar 20 03:09:15 spectre setroubleshoot[29348]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395299355.73:1829): arch=c000003e syscall=59 success=yes exit=0 a0=1b8c790 a1=1b8c7f0 a2=1b89f60 a3=8 items=0 ppid=27335 pid=29343 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=76 comm="mlocate" exe="/usr/bin/bash" subj=system_u:system_r:locate_t:s0-s0:c0.c1023 key=(null) >Mar 20 03:09:15 spectre setroubleshoot[29348]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395299355.73:1829): >Mar 20 03:09:15 spectre setroubleshoot[29348]: analyze_avc() avc=scontext=system_u:system_r:locate_t:s0-s0:c0.c1023 tcontext=system_u:object_r:systemd_logind_sessions_t:s0 access=['write'] tclass=fifo_file tpath= >Mar 20 03:09:15 spectre setroubleshoot[29348]: dbus avc(node=spectre type=AVC msg=audit(1395299355.308:1830): avc: denied { write } for pid=29358 comm="prelink" path=2F72756E2F73797374656D642F73657373696F6E732F37362E726566202864656C6574656429 dev="tmpfs" ino=243292 scontext=system_u:system_r:prelink_cron_system_t:s0-s0:c0.c1023 tcontext=system_u:object_r:systemd_logind_sessions_t:s0 tclass=fifo_file >node=spectre type=SYSCALL msg=audit(1395299355.308:1830): arch=c000003e syscall=59 success=yes exit=0 a0=1b91790 a1=1b8c7f0 a2=1b89f60 a3=8 items=0 ppid=27335 pid=29358 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=76 comm="prelink" exe="/usr/bin/bash" subj=system_u:system_r:prelink_cron_system_t:s0-s0:c0.c1023 key=(null) >node=spectre type=EOE msg=audit(1395299355.308:1830): >) called: 1 Connections >Mar 20 03:09:15 spectre setroubleshoot[29348]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395299355.308:1830): avc: denied { write } for pid=29358 comm="prelink" path=2F72756E2F73797374656D642F73657373696F6E732F37362E726566202864656C6574656429 dev="tmpfs" ino=243292 scontext=system_u:system_r:prelink_cron_system_t:s0-s0:c0.c1023 tcontext=system_u:object_r:systemd_logind_sessions_t:s0 tclass=fifo_file >Mar 20 03:09:15 spectre setroubleshoot[29348]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395299355.308:1830): arch=c000003e syscall=59 success=yes exit=0 a0=1b91790 a1=1b8c7f0 a2=1b89f60 a3=8 items=0 ppid=27335 pid=29358 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=76 comm="prelink" exe="/usr/bin/bash" subj=system_u:system_r:prelink_cron_system_t:s0-s0:c0.c1023 key=(null) >Mar 20 03:09:15 spectre setroubleshoot[29348]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395299355.308:1830): >Mar 20 03:09:15 spectre setroubleshoot[29348]: Plugin Exception restorecon_source >Mar 20 03:09:15 spectre setroubleshoot[29348]: lookup_signature: found 1 matches with scores 1.00 >Mar 20 03:09:15 spectre setroubleshoot[29348]: signature found in database >Mar 20 03:09:15 spectre setroubleshoot[29348]: sending alert to all clients >Mar 20 03:09:15 spectre setroubleshoot[29348]: SELinux is preventing /usr/bin/bash from write access on the fifo_file . For complete SELinux messages. run sealert -l c1880770-e7ea-4b51-a75e-f499036c15ec >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.restorecon_source previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.rsync_data previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.kernel_modules previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.catchall_boolean previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.automount_exec_config previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.bind_ports previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.allow_execheap previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.cvs_data previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.mozplugger_remove previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.catchall previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.sandbox_connect previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.httpd_write_content previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.wine previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.catchall_labels previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.samba_share previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.sys_module previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.qemu_blk_image previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.allow_execmod previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.file previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.sys_resource previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.mmap_zero previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.openvpn previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.mozplugger previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.setenforce previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.disable_ipv6 previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.dac_override previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.public_content previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.allow_anon_write previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.selinuxpolicy previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.associate previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.xen_image previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.chrome previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.leaks previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.sshd_root previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.qemu_file_image previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.mounton previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.allow_execstack previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.filesystem_associate previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.restorecon previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.swapfile previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.connect_ports previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.vbetool previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.device previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: analyze_avc() avc=scontext=system_u:system_r:prelink_cron_system_t:s0-s0:c0.c1023 tcontext=system_u:object_r:systemd_logind_sessions_t:s0 access=['write'] tclass=fifo_file tpath= >Mar 20 03:09:15 spectre python[29348]: SELinux is preventing /usr/bin/bash from write access on the fifo_file . > >***** Plugin leaks (86.2 confidence) suggests ***************************** > >If you want to ignore bash trying to write access the fifo_file, because you believe it should not need this access. >Then you should report this as a bug. >You can generate a local policy module to dontaudit this access. >Do ># grep /usr/bin/bash /var/log/audit/audit.log | audit2allow -D -M mypol ># semodule -i mypol.pp > >***** Plugin catchall (14.7 confidence) suggests ************************** > >If you believe that bash should be allowed write access on the fifo_file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep mlocate /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 20 03:09:15 spectre setroubleshoot[29348]: lookup_signature: found 1 matches with scores 1.00 >Mar 20 03:09:15 spectre setroubleshoot[29348]: signature found in database >Mar 20 03:09:15 spectre setroubleshoot[29348]: sending alert to all clients >Mar 20 03:09:15 spectre setroubleshoot[29348]: SELinux is preventing /usr/bin/bash from write access on the fifo_file . For complete SELinux messages. run sealert -l f60c2f79-fe8f-47e9-ad83-72fd7ebd491a >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.restorecon_source previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.rsync_data previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.kernel_modules previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.catchall_boolean previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.automount_exec_config previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.bind_ports previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.allow_execheap previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.cvs_data previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.mozplugger_remove previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.catchall previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.sandbox_connect previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.httpd_write_content previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.wine previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.catchall_labels previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.samba_share previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.sys_module previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.qemu_blk_image previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.allow_execmod previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.file previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.sys_resource previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.mmap_zero previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.openvpn previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.mozplugger previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.setenforce previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.disable_ipv6 previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.dac_override previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.public_content previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.allow_anon_write previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.selinuxpolicy previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.associate previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.xen_image previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.chrome previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.leaks previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.sshd_root previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.qemu_file_image previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.mounton previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.allow_execstack previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.filesystem_associate previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.restorecon previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.swapfile previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.connect_ports previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.vbetool previously imported >Mar 20 03:09:15 spectre setroubleshoot[29348]: load_plugins() plugins.device previously imported >Mar 20 03:09:15 spectre python[29348]: SELinux is preventing /usr/bin/bash from write access on the fifo_file . > >***** Plugin leaks (86.2 confidence) suggests ***************************** > >If you want to ignore bash trying to write access the fifo_file, because you believe it should not need this access. >Then you should report this as a bug. >You can generate a local policy module to dontaudit this access. >Do ># grep /usr/bin/bash /var/log/audit/audit.log | audit2allow -D -M mypol ># semodule -i mypol.pp > >***** Plugin catchall (14.7 confidence) suggests ************************** > >If you believe that bash should be allowed write access on the fifo_file by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep prelink /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 20 03:09:25 spectre setroubleshoot[29348]: received signal=14 >Mar 20 03:09:25 spectre setroubleshoot[29348]: KeyboardInterrupt in RunFaultServer >Mar 20 03:09:25 spectre setroubleshoot[29348]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=2 >Mar 20 03:09:25 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 20 03:09:39 spectre systemd[1]: Reexecuting. >Mar 20 03:09:39 spectre systemd[1]: systemd 211 running in system mode. (+PAM +LIBWRAP +AUDIT +SELINUX +IMA +SYSVINIT +LIBCRYPTSETUP +GCRYPT +ACL +XZ +SECCOMP -APPARMOR) >Mar 20 03:09:39 spectre systemd[1]: Detected virtualization 'kvm'. >Mar 20 03:09:39 spectre systemd[1]: Detected architecture 'x86-64'. >Mar 20 03:09:39 spectre systemd-gpt-auto-generator[30636]: Out of memory. >Mar 20 03:09:39 spectre systemd[30630]: /usr/lib/systemd/system-generators/systemd-gpt-auto-generator failed with error code 1. >Mar 20 03:09:39 spectre systemd[1]: Configuration file /usr/lib/systemd/system/auditd.service is marked world-inaccessible. This has no effect as configuration data is accessible via APIs without restrictions. Proceeding anyway. >Mar 20 03:09:39 spectre run-parts[30641]: (/etc/cron.daily) finished prelink >Mar 20 03:09:39 spectre anacron[27326]: Job `cron.daily' terminated >Mar 20 03:16:03 spectre systemd[1]: Starting dnf makecache... >Mar 20 03:16:03 spectre dnf[30642]: Config time: 0.006 >Mar 20 03:16:03 spectre dnf[30642]: cachedir: /var/cache/dnf/x86_64/21 >Mar 20 03:16:03 spectre dnf[30642]: dnf version: 0.4.18 >Mar 20 03:16:03 spectre dnf[30642]: Making cache files for all metadata files. >Mar 20 03:16:03 spectre dnf[30642]: Metadata cache refreshed recently. >Mar 20 03:16:03 spectre systemd[1]: Started dnf makecache. >Mar 20 03:29:01 spectre anacron[27326]: Job `cron.weekly' started >Mar 20 03:29:01 spectre anacron[27326]: Job `cron.weekly' terminated >Mar 20 03:29:01 spectre anacron[27326]: Normal exit (2 jobs run) >Mar 20 03:29:01 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 20 03:29:01 spectre systemd[27312]: Stopping Default. >Mar 20 03:29:01 spectre systemd[27312]: Stopped target Default. >Mar 20 03:29:01 spectre systemd[27312]: Stopping Basic System. >Mar 20 03:29:01 spectre systemd[27312]: Stopped target Basic System. >Mar 20 03:29:01 spectre systemd[27312]: Stopping Paths. >Mar 20 03:29:01 spectre systemd[27312]: Stopped target Paths. >Mar 20 03:29:01 spectre systemd[27312]: Stopping Timers. >Mar 20 03:29:01 spectre systemd[27312]: Stopped target Timers. >Mar 20 03:29:01 spectre systemd[27312]: Stopping Sockets. >Mar 20 03:29:01 spectre systemd[27312]: Stopped target Sockets. >Mar 20 03:29:01 spectre systemd[27312]: Starting Shutdown. >Mar 20 03:29:01 spectre systemd[27312]: Reached target Shutdown. >Mar 20 03:29:01 spectre systemd[27312]: Starting Exit the Session... >Mar 20 03:29:01 spectre systemd[27312]: Received SIGRTMIN+24 from PID 30650 (kill). >Mar 20 03:29:01 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 20 03:29:01 spectre systemd[1]: Stopping user-0.slice. >Mar 20 03:29:01 spectre systemd[1]: Removed slice user-0.slice. >Mar 20 03:29:01 spectre systemd-logind[17665]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 20 03:29:01 spectre systemd-logind[17665]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 20 03:29:01 spectre systemd-logind[17665]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 20 03:29:01 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 20 03:29:01 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 20 03:29:02 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 20 03:29:02 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 20 03:29:02 spectre setroubleshoot[30656]: RunFaultServer(10) >Mar 20 03:29:02 spectre setroubleshoot[30656]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 20 03:29:02 spectre setroubleshoot[30656]: database version 3.0 compatible with current 3.0 version >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 20 03:29:02 spectre setroubleshoot[30656]: Number of Plugins = 46 >Mar 20 03:29:02 spectre setroubleshoot[30656]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 20 03:29:02 spectre setroubleshoot[30656]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 20 03:29:02 spectre setroubleshoot[30656]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 20 03:29:02 spectre setroubleshoot[30656]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 20 03:29:02 spectre setroubleshoot[30656]: dbus avc(node=spectre type=AVC msg=audit(1395300541.827:1835): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395300541.827:1835): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4efaf0 a1=f0800 a2=0 a3=ffffffffffffff08 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395300541.827:1835): >) called: 1 Connections >Mar 20 03:29:02 spectre setroubleshoot[30656]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395300541.827:1835): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 20 03:29:02 spectre setroubleshoot[30656]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395300541.827:1835): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4efaf0 a1=f0800 a2=0 a3=ffffffffffffff08 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 20 03:29:02 spectre setroubleshoot[30656]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395300541.827:1835): >Mar 20 03:29:02 spectre setroubleshoot[30656]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 20 03:29:02 spectre setroubleshoot[30656]: dbus avc(node=spectre type=AVC msg=audit(1395300541.828:1836): avc: denied { unmount } for pid=17665 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395300541.828:1836): arch=c000003e syscall=166 success=no exit=-13 a0=7f6abc4efaf0 a1=2 a2=0 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395300541.828:1836): >) called: 1 Connections >Mar 20 03:29:02 spectre setroubleshoot[30656]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395300541.828:1836): avc: denied { unmount } for pid=17665 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 20 03:29:02 spectre setroubleshoot[30656]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395300541.828:1836): arch=c000003e syscall=166 success=no exit=-13 a0=7f6abc4efaf0 a1=2 a2=0 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 20 03:29:02 spectre setroubleshoot[30656]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395300541.828:1836): >Mar 20 03:29:02 spectre setroubleshoot[30656]: dbus avc(node=spectre type=AVC msg=audit(1395300541.828:1837): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395300541.828:1837): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4efaf0 a1=f0800 a2=1 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395300541.828:1837): >) called: 1 Connections >Mar 20 03:29:02 spectre setroubleshoot[30656]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395300541.828:1837): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 20 03:29:02 spectre setroubleshoot[30656]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395300541.828:1837): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4efaf0 a1=f0800 a2=1 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 20 03:29:02 spectre setroubleshoot[30656]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395300541.828:1837): >Mar 20 03:29:02 spectre setroubleshoot[30656]: Plugin Exception restorecon_source >Mar 20 03:29:02 spectre setroubleshoot[30656]: Plugin Exception restorecon >Mar 20 03:29:02 spectre setroubleshoot[30656]: lookup_signature: found 1 matches with scores 1.00 >Mar 20 03:29:02 spectre setroubleshoot[30656]: signature found in database >Mar 20 03:29:02 spectre setroubleshoot[30656]: sending alert to all clients >Mar 20 03:29:02 spectre setroubleshoot[30656]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.restorecon_source previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.rsync_data previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.kernel_modules previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.catchall_boolean previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.automount_exec_config previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.bind_ports previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.allow_execheap previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.cvs_data previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.mozplugger_remove previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.catchall previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.sandbox_connect previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.httpd_write_content previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.wine previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.catchall_labels previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.samba_share previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.sys_module previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.qemu_blk_image previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.allow_execmod previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.file previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.sys_resource previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.mmap_zero previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.openvpn previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.mozplugger previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.setenforce previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.disable_ipv6 previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.dac_override previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.public_content previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.allow_anon_write previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.selinuxpolicy previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.associate previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.xen_image previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.chrome previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.leaks previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.sshd_root previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.qemu_file_image previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.mounton previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.allow_execstack previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.filesystem_associate previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.restorecon previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.swapfile previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.connect_ports previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.vbetool previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.device previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 20 03:29:02 spectre python[30656]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 20 03:29:02 spectre setroubleshoot[30656]: lookup_signature: found 1 matches with scores 1.00 >Mar 20 03:29:02 spectre setroubleshoot[30656]: signature found in database >Mar 20 03:29:02 spectre setroubleshoot[30656]: sending alert to all clients >Mar 20 03:29:02 spectre setroubleshoot[30656]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.restorecon_source previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.rsync_data previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.kernel_modules previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.catchall_boolean previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.automount_exec_config previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.bind_ports previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.allow_execheap previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.cvs_data previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.mozplugger_remove previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.catchall previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.sandbox_connect previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.httpd_write_content previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.wine previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.catchall_labels previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.samba_share previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.sys_module previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.qemu_blk_image previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.allow_execmod previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.file previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.sys_resource previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.mmap_zero previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.openvpn previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.mozplugger previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.setenforce previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.disable_ipv6 previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.dac_override previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.public_content previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.allow_anon_write previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.selinuxpolicy previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.associate previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.xen_image previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.chrome previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.leaks previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.sshd_root previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.qemu_file_image previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.mounton previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.allow_execstack previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.filesystem_associate previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.restorecon previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.swapfile previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.connect_ports previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.vbetool previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.device previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 20 03:29:02 spectre python[30656]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 20 03:29:02 spectre setroubleshoot[30656]: lookup_signature: found 1 matches with scores 1.00 >Mar 20 03:29:02 spectre setroubleshoot[30656]: signature found in database >Mar 20 03:29:02 spectre setroubleshoot[30656]: sending alert to all clients >Mar 20 03:29:02 spectre setroubleshoot[30656]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.restorecon_source previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.rsync_data previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.kernel_modules previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.catchall_boolean previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.automount_exec_config previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.bind_ports previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.allow_execheap previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.cvs_data previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.mozplugger_remove previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.catchall previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.sandbox_connect previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.httpd_write_content previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.wine previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.catchall_labels previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.samba_share previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.sys_module previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.qemu_blk_image previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.allow_execmod previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.file previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.sys_resource previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.mmap_zero previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.openvpn previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.mozplugger previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.setenforce previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.disable_ipv6 previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.dac_override previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.public_content previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.allow_anon_write previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.selinuxpolicy previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.associate previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.xen_image previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.chrome previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.leaks previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.sshd_root previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.qemu_file_image previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.mounton previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.allow_execstack previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.filesystem_associate previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.restorecon previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.swapfile previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.connect_ports previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.vbetool previously imported >Mar 20 03:29:02 spectre setroubleshoot[30656]: load_plugins() plugins.device previously imported >Mar 20 03:29:02 spectre python[30656]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 20 03:29:12 spectre setroubleshoot[30656]: received signal=14 >Mar 20 03:29:12 spectre setroubleshoot[30656]: KeyboardInterrupt in RunFaultServer >Mar 20 03:29:12 spectre setroubleshoot[30656]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 20 03:29:12 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 20 03:29:12 spectre dbus-daemon[637]: string index out of range >Mar 20 04:01:01 spectre systemd[1]: Starting user-0.slice. >Mar 20 04:01:01 spectre systemd[1]: Created slice user-0.slice. >Mar 20 04:01:01 spectre systemd[1]: Starting User Manager for UID 0... >Mar 20 04:01:01 spectre systemd[1]: Starting Session 77 of user root. >Mar 20 04:01:01 spectre systemd[1]: Started Session 77 of user root. >Mar 20 04:01:01 spectre systemd[30685]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 20 04:01:01 spectre systemd[30685]: Starting Paths. >Mar 20 04:01:01 spectre systemd[30685]: Reached target Paths. >Mar 20 04:01:01 spectre systemd[30685]: Starting Timers. >Mar 20 04:01:01 spectre systemd[30685]: Reached target Timers. >Mar 20 04:01:01 spectre systemd[30685]: Starting Sockets. >Mar 20 04:01:01 spectre systemd[30685]: Reached target Sockets. >Mar 20 04:01:01 spectre systemd[30685]: Starting Basic System. >Mar 20 04:01:01 spectre systemd[30685]: Reached target Basic System. >Mar 20 04:01:01 spectre systemd[30685]: Starting Default. >Mar 20 04:01:01 spectre systemd[30685]: Reached target Default. >Mar 20 04:01:01 spectre systemd[30685]: Startup finished in 10ms. >Mar 20 04:01:01 spectre systemd[1]: Started User Manager for UID 0. >Mar 20 04:01:01 spectre CROND[30689]: (root) CMD (run-parts /etc/cron.hourly) >Mar 20 04:01:01 spectre run-parts[30692]: (/etc/cron.hourly) starting 0anacron >Mar 20 04:01:01 spectre run-parts[30698]: (/etc/cron.hourly) finished 0anacron >Mar 20 04:01:01 spectre run-parts[30700]: (/etc/cron.hourly) starting mcelog.cron >Mar 20 04:01:01 spectre run-parts[30704]: (/etc/cron.hourly) finished mcelog.cron >Mar 20 04:01:01 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 20 04:01:01 spectre systemd[30685]: Stopping Default. >Mar 20 04:01:01 spectre systemd[30685]: Stopped target Default. >Mar 20 04:01:01 spectre systemd[30685]: Stopping Basic System. >Mar 20 04:01:01 spectre systemd[30685]: Stopped target Basic System. >Mar 20 04:01:01 spectre systemd[30685]: Stopping Paths. >Mar 20 04:01:01 spectre systemd[30685]: Stopped target Paths. >Mar 20 04:01:01 spectre systemd[30685]: Stopping Timers. >Mar 20 04:01:01 spectre systemd[30685]: Stopped target Timers. >Mar 20 04:01:01 spectre systemd[30685]: Stopping Sockets. >Mar 20 04:01:01 spectre systemd[30685]: Stopped target Sockets. >Mar 20 04:01:01 spectre systemd[30685]: Starting Shutdown. >Mar 20 04:01:01 spectre systemd[30685]: Reached target Shutdown. >Mar 20 04:01:01 spectre systemd[30685]: Starting Exit the Session... >Mar 20 04:01:01 spectre systemd[30685]: Received SIGRTMIN+24 from PID 30707 (kill). >Mar 20 04:01:01 spectre systemd[30687]: pam_unix(systemd-user:session): session closed for user root >Mar 20 04:01:01 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 20 04:01:01 spectre systemd[1]: Stopping user-0.slice. >Mar 20 04:01:01 spectre systemd[1]: Removed slice user-0.slice. >Mar 20 04:01:01 spectre systemd-logind[17665]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 20 04:01:01 spectre systemd-logind[17665]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 20 04:01:01 spectre systemd-logind[17665]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 20 04:01:01 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 20 04:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 20 04:01:02 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 20 04:01:02 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 20 04:01:02 spectre setroubleshoot[30713]: RunFaultServer(10) >Mar 20 04:01:02 spectre setroubleshoot[30713]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 20 04:01:02 spectre setroubleshoot[30713]: database version 3.0 compatible with current 3.0 version >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 20 04:01:02 spectre setroubleshoot[30713]: Number of Plugins = 46 >Mar 20 04:01:02 spectre setroubleshoot[30713]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 20 04:01:02 spectre setroubleshoot[30713]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 20 04:01:02 spectre setroubleshoot[30713]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 20 04:01:02 spectre setroubleshoot[30713]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 20 04:01:02 spectre setroubleshoot[30713]: dbus avc(node=spectre type=AVC msg=audit(1395302461.958:1850): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395302461.958:1850): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4f14a0 a1=f0800 a2=0 a3=7f6aba682680 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395302461.958:1850): >) called: 1 Connections >Mar 20 04:01:02 spectre setroubleshoot[30713]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395302461.958:1850): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 20 04:01:02 spectre setroubleshoot[30713]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395302461.958:1850): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4f14a0 a1=f0800 a2=0 a3=7f6aba682680 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 20 04:01:02 spectre setroubleshoot[30713]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395302461.958:1850): >Mar 20 04:01:02 spectre setroubleshoot[30713]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 20 04:01:02 spectre setroubleshoot[30713]: dbus avc(node=spectre type=AVC msg=audit(1395302461.959:1851): avc: denied { unmount } for pid=17665 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395302461.959:1851): arch=c000003e syscall=166 success=no exit=-13 a0=7f6abc4f14a0 a1=2 a2=0 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395302461.959:1851): >) called: 1 Connections >Mar 20 04:01:02 spectre setroubleshoot[30713]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395302461.959:1851): avc: denied { unmount } for pid=17665 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 20 04:01:02 spectre setroubleshoot[30713]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395302461.959:1851): arch=c000003e syscall=166 success=no exit=-13 a0=7f6abc4f14a0 a1=2 a2=0 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 20 04:01:02 spectre setroubleshoot[30713]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395302461.959:1851): >Mar 20 04:01:02 spectre setroubleshoot[30713]: dbus avc(node=spectre type=AVC msg=audit(1395302461.959:1852): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395302461.959:1852): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4f14a0 a1=f0800 a2=1 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395302461.959:1852): >) called: 1 Connections >Mar 20 04:01:02 spectre setroubleshoot[30713]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395302461.959:1852): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 20 04:01:02 spectre setroubleshoot[30713]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395302461.959:1852): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4f14a0 a1=f0800 a2=1 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 20 04:01:02 spectre setroubleshoot[30713]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395302461.959:1852): >Mar 20 04:01:02 spectre setroubleshoot[30713]: Plugin Exception restorecon_source >Mar 20 04:01:02 spectre setroubleshoot[30713]: Plugin Exception restorecon >Mar 20 04:01:02 spectre setroubleshoot[30713]: lookup_signature: found 1 matches with scores 1.00 >Mar 20 04:01:02 spectre setroubleshoot[30713]: signature found in database >Mar 20 04:01:02 spectre setroubleshoot[30713]: sending alert to all clients >Mar 20 04:01:02 spectre setroubleshoot[30713]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.restorecon_source previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.rsync_data previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.kernel_modules previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.catchall_boolean previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.automount_exec_config previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.bind_ports previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.allow_execheap previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.cvs_data previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.mozplugger_remove previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.catchall previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.sandbox_connect previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.httpd_write_content previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.wine previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.catchall_labels previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.samba_share previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.sys_module previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.qemu_blk_image previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.allow_execmod previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.file previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.sys_resource previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.mmap_zero previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.openvpn previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.mozplugger previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.setenforce previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.disable_ipv6 previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.dac_override previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.public_content previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.allow_anon_write previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.selinuxpolicy previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.associate previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.xen_image previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.chrome previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.leaks previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.sshd_root previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.qemu_file_image previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.mounton previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.allow_execstack previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.filesystem_associate previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.restorecon previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.swapfile previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.connect_ports previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.vbetool previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.device previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 20 04:01:02 spectre python[30713]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 20 04:01:02 spectre setroubleshoot[30713]: lookup_signature: found 1 matches with scores 1.00 >Mar 20 04:01:02 spectre setroubleshoot[30713]: signature found in database >Mar 20 04:01:02 spectre setroubleshoot[30713]: sending alert to all clients >Mar 20 04:01:02 spectre setroubleshoot[30713]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.restorecon_source previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.rsync_data previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.kernel_modules previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.catchall_boolean previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.automount_exec_config previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.bind_ports previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.allow_execheap previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.cvs_data previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.mozplugger_remove previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.catchall previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.sandbox_connect previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.httpd_write_content previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.wine previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.catchall_labels previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.samba_share previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.sys_module previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.qemu_blk_image previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.allow_execmod previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.file previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.sys_resource previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.mmap_zero previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.openvpn previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.mozplugger previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.setenforce previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.disable_ipv6 previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.dac_override previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.public_content previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.allow_anon_write previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.selinuxpolicy previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.associate previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.xen_image previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.chrome previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.leaks previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.sshd_root previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.qemu_file_image previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.mounton previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.allow_execstack previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.filesystem_associate previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.restorecon previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.swapfile previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.connect_ports previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.vbetool previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.device previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 20 04:01:02 spectre python[30713]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 20 04:01:02 spectre setroubleshoot[30713]: lookup_signature: found 1 matches with scores 1.00 >Mar 20 04:01:02 spectre setroubleshoot[30713]: signature found in database >Mar 20 04:01:02 spectre setroubleshoot[30713]: sending alert to all clients >Mar 20 04:01:02 spectre setroubleshoot[30713]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.restorecon_source previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.rsync_data previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.kernel_modules previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.catchall_boolean previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.automount_exec_config previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.bind_ports previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.allow_execheap previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.cvs_data previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.mozplugger_remove previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.catchall previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.sandbox_connect previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.httpd_write_content previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.wine previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.catchall_labels previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.samba_share previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.sys_module previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.qemu_blk_image previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.allow_execmod previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.file previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.sys_resource previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.mmap_zero previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.openvpn previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.mozplugger previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.setenforce previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.disable_ipv6 previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.dac_override previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.public_content previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.allow_anon_write previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.selinuxpolicy previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.associate previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.xen_image previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.chrome previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.leaks previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.sshd_root previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.qemu_file_image previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.mounton previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.allow_execstack previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.filesystem_associate previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.restorecon previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.swapfile previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.connect_ports previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.vbetool previously imported >Mar 20 04:01:02 spectre setroubleshoot[30713]: load_plugins() plugins.device previously imported >Mar 20 04:01:02 spectre python[30713]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 20 04:01:12 spectre setroubleshoot[30713]: received signal=14 >Mar 20 04:01:12 spectre setroubleshoot[30713]: KeyboardInterrupt in RunFaultServer >Mar 20 04:01:12 spectre setroubleshoot[30713]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 20 04:01:12 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 20 04:01:12 spectre dbus-daemon[637]: string index out of range >Mar 20 04:16:04 spectre systemd[1]: Starting dnf makecache... >Mar 20 04:16:04 spectre dnf[30739]: Config time: 0.006 >Mar 20 04:16:04 spectre dnf[30739]: cachedir: /var/cache/dnf/x86_64/21 >Mar 20 04:16:04 spectre dnf[30739]: dnf version: 0.4.18 >Mar 20 04:16:04 spectre dnf[30739]: Making cache files for all metadata files. >Mar 20 04:16:04 spectre dnf[30739]: rawhide: will expire after 32376 seconds. >Mar 20 04:16:04 spectre dnf[30739]: repo: using cache for: rawhide >Mar 20 04:16:04 spectre dnf[30739]: hawkey sack setup time: 0.129 >Mar 20 04:16:04 spectre dnf[30739]: Metadata cache created. >Mar 20 04:16:04 spectre systemd[1]: Started dnf makecache. >Mar 20 05:01:01 spectre systemd[1]: Starting user-0.slice. >Mar 20 05:01:01 spectre systemd[1]: Created slice user-0.slice. >Mar 20 05:01:01 spectre systemd[1]: Starting User Manager for UID 0... >Mar 20 05:01:01 spectre systemd[1]: Starting Session 78 of user root. >Mar 20 05:01:01 spectre systemd[1]: Started Session 78 of user root. >Mar 20 05:01:02 spectre systemd[30749]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 20 05:01:02 spectre systemd[30749]: Starting Paths. >Mar 20 05:01:02 spectre systemd[30749]: Reached target Paths. >Mar 20 05:01:02 spectre systemd[30749]: Starting Timers. >Mar 20 05:01:02 spectre systemd[30749]: Reached target Timers. >Mar 20 05:01:02 spectre systemd[30749]: Starting Sockets. >Mar 20 05:01:02 spectre systemd[30749]: Reached target Sockets. >Mar 20 05:01:02 spectre systemd[30749]: Starting Basic System. >Mar 20 05:01:02 spectre systemd[30749]: Reached target Basic System. >Mar 20 05:01:02 spectre systemd[30749]: Starting Default. >Mar 20 05:01:02 spectre systemd[30749]: Reached target Default. >Mar 20 05:01:02 spectre systemd[30749]: Startup finished in 15ms. >Mar 20 05:01:02 spectre systemd[1]: Started User Manager for UID 0. >Mar 20 05:01:02 spectre CROND[30753]: (root) CMD (run-parts /etc/cron.hourly) >Mar 20 05:01:02 spectre run-parts[30756]: (/etc/cron.hourly) starting 0anacron >Mar 20 05:01:02 spectre run-parts[30762]: (/etc/cron.hourly) finished 0anacron >Mar 20 05:01:02 spectre run-parts[30764]: (/etc/cron.hourly) starting mcelog.cron >Mar 20 05:01:02 spectre run-parts[30768]: (/etc/cron.hourly) finished mcelog.cron >Mar 20 05:01:02 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 20 05:01:02 spectre systemd[30749]: Stopping Default. >Mar 20 05:01:02 spectre systemd[30749]: Stopped target Default. >Mar 20 05:01:02 spectre systemd[30749]: Stopping Basic System. >Mar 20 05:01:02 spectre systemd[30749]: Stopped target Basic System. >Mar 20 05:01:02 spectre systemd[30749]: Stopping Paths. >Mar 20 05:01:02 spectre systemd[30749]: Stopped target Paths. >Mar 20 05:01:02 spectre systemd[30749]: Stopping Timers. >Mar 20 05:01:02 spectre systemd[30749]: Stopped target Timers. >Mar 20 05:01:02 spectre systemd[30749]: Stopping Sockets. >Mar 20 05:01:02 spectre systemd[30749]: Stopped target Sockets. >Mar 20 05:01:02 spectre systemd[30749]: Starting Shutdown. >Mar 20 05:01:02 spectre systemd[30749]: Reached target Shutdown. >Mar 20 05:01:02 spectre systemd[30749]: Starting Exit the Session... >Mar 20 05:01:02 spectre systemd[30749]: Received SIGRTMIN+24 from PID 30771 (kill). >Mar 20 05:01:02 spectre systemd[30751]: pam_unix(systemd-user:session): session closed for user root >Mar 20 05:01:02 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 20 05:01:02 spectre systemd[1]: Stopping user-0.slice. >Mar 20 05:01:02 spectre systemd[1]: Removed slice user-0.slice. >Mar 20 05:01:02 spectre systemd-logind[17665]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 20 05:01:02 spectre systemd-logind[17665]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 20 05:01:02 spectre systemd-logind[17665]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 20 05:01:02 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 20 05:01:02 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 20 05:01:02 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 20 05:01:02 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 20 05:01:02 spectre setroubleshoot[30776]: RunFaultServer(10) >Mar 20 05:01:02 spectre setroubleshoot[30776]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 20 05:01:02 spectre setroubleshoot[30776]: database version 3.0 compatible with current 3.0 version >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 20 05:01:02 spectre setroubleshoot[30776]: Number of Plugins = 46 >Mar 20 05:01:02 spectre setroubleshoot[30776]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 20 05:01:02 spectre setroubleshoot[30776]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 20 05:01:02 spectre setroubleshoot[30776]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 20 05:01:02 spectre setroubleshoot[30776]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 20 05:01:02 spectre setroubleshoot[30776]: dbus avc(node=spectre type=AVC msg=audit(1395306062.140:1867): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395306062.140:1867): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4e4b70 a1=f0800 a2=0 a3=7f6aba682680 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395306062.140:1867): >) called: 1 Connections >Mar 20 05:01:02 spectre setroubleshoot[30776]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395306062.140:1867): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 20 05:01:02 spectre setroubleshoot[30776]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395306062.140:1867): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4e4b70 a1=f0800 a2=0 a3=7f6aba682680 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 20 05:01:02 spectre setroubleshoot[30776]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395306062.140:1867): >Mar 20 05:01:02 spectre setroubleshoot[30776]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 20 05:01:02 spectre setroubleshoot[30776]: dbus avc(node=spectre type=AVC msg=audit(1395306062.140:1868): avc: denied { unmount } for pid=17665 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395306062.140:1868): arch=c000003e syscall=166 success=no exit=-13 a0=7f6abc4e4b70 a1=2 a2=0 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395306062.140:1868): >) called: 1 Connections >Mar 20 05:01:02 spectre setroubleshoot[30776]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395306062.140:1868): avc: denied { unmount } for pid=17665 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 20 05:01:02 spectre setroubleshoot[30776]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395306062.140:1868): arch=c000003e syscall=166 success=no exit=-13 a0=7f6abc4e4b70 a1=2 a2=0 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 20 05:01:02 spectre setroubleshoot[30776]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395306062.140:1868): >Mar 20 05:01:02 spectre setroubleshoot[30776]: dbus avc(node=spectre type=AVC msg=audit(1395306062.140:1869): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395306062.140:1869): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4e4b70 a1=f0800 a2=1 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395306062.140:1869): >) called: 1 Connections >Mar 20 05:01:02 spectre setroubleshoot[30776]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395306062.140:1869): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 20 05:01:02 spectre setroubleshoot[30776]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395306062.140:1869): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4e4b70 a1=f0800 a2=1 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 20 05:01:02 spectre setroubleshoot[30776]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395306062.140:1869): >Mar 20 05:01:02 spectre setroubleshoot[30776]: Plugin Exception restorecon_source >Mar 20 05:01:02 spectre setroubleshoot[30776]: Plugin Exception restorecon >Mar 20 05:01:02 spectre setroubleshoot[30776]: lookup_signature: found 1 matches with scores 1.00 >Mar 20 05:01:02 spectre setroubleshoot[30776]: signature found in database >Mar 20 05:01:02 spectre setroubleshoot[30776]: sending alert to all clients >Mar 20 05:01:02 spectre setroubleshoot[30776]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.restorecon_source previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.rsync_data previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.kernel_modules previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.catchall_boolean previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.automount_exec_config previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.bind_ports previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.allow_execheap previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.cvs_data previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.mozplugger_remove previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.catchall previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.sandbox_connect previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.httpd_write_content previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.wine previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.catchall_labels previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.samba_share previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.sys_module previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.qemu_blk_image previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.allow_execmod previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.file previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.sys_resource previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.mmap_zero previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.openvpn previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.mozplugger previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.setenforce previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.disable_ipv6 previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.dac_override previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.public_content previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.allow_anon_write previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.selinuxpolicy previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.associate previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.xen_image previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.chrome previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.leaks previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.sshd_root previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.qemu_file_image previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.mounton previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.allow_execstack previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.filesystem_associate previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.restorecon previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.swapfile previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.connect_ports previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.vbetool previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.device previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 20 05:01:02 spectre python[30776]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 20 05:01:02 spectre setroubleshoot[30776]: lookup_signature: found 1 matches with scores 1.00 >Mar 20 05:01:02 spectre setroubleshoot[30776]: signature found in database >Mar 20 05:01:02 spectre setroubleshoot[30776]: sending alert to all clients >Mar 20 05:01:02 spectre setroubleshoot[30776]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.restorecon_source previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.rsync_data previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.kernel_modules previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.catchall_boolean previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.automount_exec_config previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.bind_ports previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.allow_execheap previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.cvs_data previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.mozplugger_remove previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.catchall previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.sandbox_connect previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.httpd_write_content previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.wine previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.catchall_labels previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.samba_share previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.sys_module previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.qemu_blk_image previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.allow_execmod previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.file previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.sys_resource previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.mmap_zero previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.openvpn previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.mozplugger previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.setenforce previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.disable_ipv6 previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.dac_override previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.public_content previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.allow_anon_write previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.selinuxpolicy previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.associate previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.xen_image previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.chrome previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.leaks previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.sshd_root previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.qemu_file_image previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.mounton previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.allow_execstack previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.filesystem_associate previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.restorecon previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.swapfile previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.connect_ports previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.vbetool previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.device previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 20 05:01:02 spectre python[30776]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 20 05:01:02 spectre setroubleshoot[30776]: lookup_signature: found 1 matches with scores 1.00 >Mar 20 05:01:02 spectre setroubleshoot[30776]: signature found in database >Mar 20 05:01:02 spectre setroubleshoot[30776]: sending alert to all clients >Mar 20 05:01:02 spectre setroubleshoot[30776]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.restorecon_source previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.rsync_data previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.kernel_modules previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.catchall_boolean previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.automount_exec_config previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.bind_ports previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.allow_execheap previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.cvs_data previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.mozplugger_remove previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.catchall previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.sandbox_connect previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.httpd_write_content previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.wine previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.catchall_labels previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.samba_share previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.sys_module previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.qemu_blk_image previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.allow_execmod previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.file previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.sys_resource previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.mmap_zero previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.openvpn previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.mozplugger previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.setenforce previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.disable_ipv6 previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.dac_override previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.public_content previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.allow_anon_write previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.selinuxpolicy previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.associate previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.xen_image previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.chrome previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.leaks previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.sshd_root previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.qemu_file_image previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.mounton previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.allow_execstack previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.filesystem_associate previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.restorecon previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.swapfile previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.connect_ports previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.vbetool previously imported >Mar 20 05:01:02 spectre setroubleshoot[30776]: load_plugins() plugins.device previously imported >Mar 20 05:01:02 spectre python[30776]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 20 05:01:12 spectre setroubleshoot[30776]: received signal=14 >Mar 20 05:01:12 spectre setroubleshoot[30776]: KeyboardInterrupt in RunFaultServer >Mar 20 05:01:12 spectre setroubleshoot[30776]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 20 05:01:12 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 20 05:01:12 spectre dbus-daemon[637]: string index out of range >Mar 20 05:16:05 spectre systemd[1]: Starting dnf makecache... >Mar 20 05:16:05 spectre dnf[30803]: Config time: 0.006 >Mar 20 05:16:05 spectre dnf[30803]: cachedir: /var/cache/dnf/x86_64/21 >Mar 20 05:16:05 spectre dnf[30803]: dnf version: 0.4.18 >Mar 20 05:16:05 spectre dnf[30803]: Making cache files for all metadata files. >Mar 20 05:16:05 spectre dnf[30803]: Metadata cache refreshed recently. >Mar 20 05:16:05 spectre systemd[1]: Started dnf makecache. >Mar 20 06:01:01 spectre systemd[1]: Starting user-0.slice. >Mar 20 06:01:01 spectre systemd[1]: Created slice user-0.slice. >Mar 20 06:01:01 spectre systemd[1]: Starting User Manager for UID 0... >Mar 20 06:01:01 spectre systemd[1]: Starting Session 79 of user root. >Mar 20 06:01:01 spectre systemd[1]: Started Session 79 of user root. >Mar 20 06:01:01 spectre systemd[30813]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 20 06:01:01 spectre systemd[30813]: Starting Paths. >Mar 20 06:01:01 spectre systemd[30813]: Reached target Paths. >Mar 20 06:01:01 spectre systemd[30813]: Starting Timers. >Mar 20 06:01:01 spectre systemd[30813]: Reached target Timers. >Mar 20 06:01:01 spectre systemd[30813]: Starting Sockets. >Mar 20 06:01:01 spectre systemd[30813]: Reached target Sockets. >Mar 20 06:01:01 spectre systemd[30813]: Starting Basic System. >Mar 20 06:01:01 spectre systemd[30813]: Reached target Basic System. >Mar 20 06:01:01 spectre systemd[30813]: Starting Default. >Mar 20 06:01:01 spectre systemd[30813]: Reached target Default. >Mar 20 06:01:01 spectre systemd[30813]: Startup finished in 11ms. >Mar 20 06:01:01 spectre systemd[1]: Started User Manager for UID 0. >Mar 20 06:01:01 spectre CROND[30817]: (root) CMD (run-parts /etc/cron.hourly) >Mar 20 06:01:01 spectre run-parts[30820]: (/etc/cron.hourly) starting 0anacron >Mar 20 06:01:01 spectre run-parts[30826]: (/etc/cron.hourly) finished 0anacron >Mar 20 06:01:01 spectre run-parts[30828]: (/etc/cron.hourly) starting mcelog.cron >Mar 20 06:01:01 spectre run-parts[30832]: (/etc/cron.hourly) finished mcelog.cron >Mar 20 06:01:01 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 20 06:01:01 spectre systemd[30813]: Stopping Default. >Mar 20 06:01:01 spectre systemd[30813]: Stopped target Default. >Mar 20 06:01:01 spectre systemd[30813]: Stopping Basic System. >Mar 20 06:01:01 spectre systemd[30813]: Stopped target Basic System. >Mar 20 06:01:01 spectre systemd[30813]: Stopping Paths. >Mar 20 06:01:01 spectre systemd[30813]: Stopped target Paths. >Mar 20 06:01:01 spectre systemd[30813]: Stopping Timers. >Mar 20 06:01:01 spectre systemd[30813]: Stopped target Timers. >Mar 20 06:01:01 spectre systemd[30813]: Stopping Sockets. >Mar 20 06:01:01 spectre systemd[30813]: Stopped target Sockets. >Mar 20 06:01:01 spectre systemd[30813]: Starting Shutdown. >Mar 20 06:01:01 spectre systemd[30813]: Reached target Shutdown. >Mar 20 06:01:01 spectre systemd[30813]: Starting Exit the Session... >Mar 20 06:01:01 spectre systemd[30813]: Received SIGRTMIN+24 from PID 30835 (kill). >Mar 20 06:01:01 spectre systemd[30815]: pam_unix(systemd-user:session): session closed for user root >Mar 20 06:01:01 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 20 06:01:01 spectre systemd[1]: Stopping user-0.slice. >Mar 20 06:01:01 spectre systemd[1]: Removed slice user-0.slice. >Mar 20 06:01:01 spectre systemd-logind[17665]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 20 06:01:01 spectre systemd-logind[17665]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 20 06:01:01 spectre systemd-logind[17665]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 20 06:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 20 06:01:01 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 20 06:01:01 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 20 06:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 20 06:01:01 spectre setroubleshoot[30840]: RunFaultServer(10) >Mar 20 06:01:01 spectre setroubleshoot[30840]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 20 06:01:01 spectre setroubleshoot[30840]: database version 3.0 compatible with current 3.0 version >Mar 20 06:01:01 spectre setroubleshoot[30840]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 20 06:01:01 spectre setroubleshoot[30840]: Number of Plugins = 46 >Mar 20 06:01:01 spectre setroubleshoot[30840]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 20 06:01:01 spectre setroubleshoot[30840]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 20 06:01:01 spectre setroubleshoot[30840]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 20 06:01:01 spectre setroubleshoot[30840]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 20 06:01:01 spectre setroubleshoot[30840]: dbus avc(node=spectre type=AVC msg=audit(1395309661.315:1884): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395309661.315:1884): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4e4b50 a1=f0800 a2=0 a3=fffffffffffff5c8 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395309661.315:1884): >) called: 1 Connections >Mar 20 06:01:01 spectre setroubleshoot[30840]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395309661.315:1884): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 20 06:01:01 spectre setroubleshoot[30840]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395309661.315:1884): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4e4b50 a1=f0800 a2=0 a3=fffffffffffff5c8 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 20 06:01:01 spectre setroubleshoot[30840]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395309661.315:1884): >Mar 20 06:01:01 spectre setroubleshoot[30840]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 20 06:01:01 spectre setroubleshoot[30840]: dbus avc(node=spectre type=AVC msg=audit(1395309661.315:1885): avc: denied { unmount } for pid=17665 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395309661.315:1885): arch=c000003e syscall=166 success=no exit=-13 a0=7f6abc4e4b50 a1=2 a2=0 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395309661.315:1885): >) called: 1 Connections >Mar 20 06:01:01 spectre setroubleshoot[30840]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395309661.315:1885): avc: denied { unmount } for pid=17665 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 20 06:01:01 spectre setroubleshoot[30840]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395309661.315:1885): arch=c000003e syscall=166 success=no exit=-13 a0=7f6abc4e4b50 a1=2 a2=0 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 20 06:01:01 spectre setroubleshoot[30840]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395309661.315:1885): >Mar 20 06:01:01 spectre setroubleshoot[30840]: dbus avc(node=spectre type=AVC msg=audit(1395309661.315:1886): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395309661.315:1886): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4e4b50 a1=f0800 a2=1 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395309661.315:1886): >) called: 1 Connections >Mar 20 06:01:01 spectre setroubleshoot[30840]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395309661.315:1886): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 20 06:01:01 spectre setroubleshoot[30840]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395309661.315:1886): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4e4b50 a1=f0800 a2=1 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 20 06:01:01 spectre setroubleshoot[30840]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395309661.315:1886): >Mar 20 06:01:01 spectre setroubleshoot[30840]: Plugin Exception restorecon_source >Mar 20 06:01:01 spectre setroubleshoot[30840]: Plugin Exception restorecon >Mar 20 06:01:01 spectre setroubleshoot[30840]: lookup_signature: found 1 matches with scores 1.00 >Mar 20 06:01:01 spectre setroubleshoot[30840]: signature found in database >Mar 20 06:01:01 spectre setroubleshoot[30840]: sending alert to all clients >Mar 20 06:01:01 spectre setroubleshoot[30840]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 20 06:01:01 spectre setroubleshoot[30840]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 20 06:01:01 spectre setroubleshoot[30840]: load_plugins() plugins.restorecon_source previously imported >Mar 20 06:01:01 spectre setroubleshoot[30840]: load_plugins() plugins.rsync_data previously imported >Mar 20 06:01:01 spectre setroubleshoot[30840]: load_plugins() plugins.kernel_modules previously imported >Mar 20 06:01:01 spectre setroubleshoot[30840]: load_plugins() plugins.catchall_boolean previously imported >Mar 20 06:01:01 spectre setroubleshoot[30840]: load_plugins() plugins.automount_exec_config previously imported >Mar 20 06:01:01 spectre setroubleshoot[30840]: load_plugins() plugins.bind_ports previously imported >Mar 20 06:01:01 spectre setroubleshoot[30840]: load_plugins() plugins.allow_execheap previously imported >Mar 20 06:01:01 spectre setroubleshoot[30840]: load_plugins() plugins.cvs_data previously imported >Mar 20 06:01:01 spectre setroubleshoot[30840]: load_plugins() plugins.mozplugger_remove previously imported >Mar 20 06:01:01 spectre setroubleshoot[30840]: load_plugins() plugins.catchall previously imported >Mar 20 06:01:01 spectre setroubleshoot[30840]: load_plugins() plugins.sandbox_connect previously imported >Mar 20 06:01:01 spectre setroubleshoot[30840]: load_plugins() plugins.httpd_write_content previously imported >Mar 20 06:01:01 spectre setroubleshoot[30840]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 20 06:01:01 spectre setroubleshoot[30840]: load_plugins() plugins.wine previously imported >Mar 20 06:01:01 spectre setroubleshoot[30840]: load_plugins() plugins.catchall_labels previously imported >Mar 20 06:01:01 spectre setroubleshoot[30840]: load_plugins() plugins.samba_share previously imported >Mar 20 06:01:01 spectre setroubleshoot[30840]: load_plugins() plugins.sys_module previously imported >Mar 20 06:01:01 spectre setroubleshoot[30840]: load_plugins() plugins.qemu_blk_image previously imported >Mar 20 06:01:01 spectre setroubleshoot[30840]: load_plugins() plugins.allow_execmod previously imported >Mar 20 06:01:01 spectre setroubleshoot[30840]: load_plugins() plugins.file previously imported >Mar 20 06:01:01 spectre setroubleshoot[30840]: load_plugins() plugins.sys_resource previously imported >Mar 20 06:01:01 spectre setroubleshoot[30840]: load_plugins() plugins.mmap_zero previously imported >Mar 20 06:01:01 spectre setroubleshoot[30840]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 20 06:01:01 spectre setroubleshoot[30840]: load_plugins() plugins.openvpn previously imported >Mar 20 06:01:01 spectre setroubleshoot[30840]: load_plugins() plugins.mozplugger previously imported >Mar 20 06:01:01 spectre setroubleshoot[30840]: load_plugins() plugins.setenforce previously imported >Mar 20 06:01:01 spectre setroubleshoot[30840]: load_plugins() plugins.disable_ipv6 previously imported >Mar 20 06:01:01 spectre setroubleshoot[30840]: load_plugins() plugins.dac_override previously imported >Mar 20 06:01:01 spectre setroubleshoot[30840]: load_plugins() plugins.public_content previously imported >Mar 20 06:01:01 spectre setroubleshoot[30840]: load_plugins() plugins.allow_anon_write previously imported >Mar 20 06:01:01 spectre setroubleshoot[30840]: load_plugins() plugins.selinuxpolicy previously imported >Mar 20 06:01:01 spectre setroubleshoot[30840]: load_plugins() plugins.associate previously imported >Mar 20 06:01:01 spectre setroubleshoot[30840]: load_plugins() plugins.xen_image previously imported >Mar 20 06:01:01 spectre setroubleshoot[30840]: load_plugins() plugins.chrome previously imported >Mar 20 06:01:01 spectre setroubleshoot[30840]: load_plugins() plugins.leaks previously imported >Mar 20 06:01:01 spectre setroubleshoot[30840]: load_plugins() plugins.sshd_root previously imported >Mar 20 06:01:01 spectre setroubleshoot[30840]: load_plugins() plugins.qemu_file_image previously imported >Mar 20 06:01:01 spectre setroubleshoot[30840]: load_plugins() plugins.mounton previously imported >Mar 20 06:01:01 spectre setroubleshoot[30840]: load_plugins() plugins.allow_execstack previously imported >Mar 20 06:01:01 spectre setroubleshoot[30840]: load_plugins() plugins.filesystem_associate previously imported >Mar 20 06:01:01 spectre setroubleshoot[30840]: load_plugins() plugins.restorecon previously imported >Mar 20 06:01:01 spectre setroubleshoot[30840]: load_plugins() plugins.swapfile previously imported >Mar 20 06:01:01 spectre setroubleshoot[30840]: load_plugins() plugins.connect_ports previously imported >Mar 20 06:01:01 spectre setroubleshoot[30840]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 20 06:01:01 spectre setroubleshoot[30840]: load_plugins() plugins.vbetool previously imported >Mar 20 06:01:01 spectre setroubleshoot[30840]: load_plugins() plugins.device previously imported >Mar 20 06:01:01 spectre setroubleshoot[30840]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 20 06:01:01 spectre python[30840]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 20 06:01:02 spectre setroubleshoot[30840]: lookup_signature: found 1 matches with scores 1.00 >Mar 20 06:01:02 spectre setroubleshoot[30840]: signature found in database >Mar 20 06:01:02 spectre setroubleshoot[30840]: sending alert to all clients >Mar 20 06:01:02 spectre setroubleshoot[30840]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.restorecon_source previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.rsync_data previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.kernel_modules previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.catchall_boolean previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.automount_exec_config previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.bind_ports previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.allow_execheap previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.cvs_data previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.mozplugger_remove previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.catchall previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.sandbox_connect previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.httpd_write_content previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.wine previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.catchall_labels previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.samba_share previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.sys_module previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.qemu_blk_image previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.allow_execmod previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.file previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.sys_resource previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.mmap_zero previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.openvpn previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.mozplugger previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.setenforce previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.disable_ipv6 previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.dac_override previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.public_content previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.allow_anon_write previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.selinuxpolicy previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.associate previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.xen_image previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.chrome previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.leaks previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.sshd_root previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.qemu_file_image previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.mounton previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.allow_execstack previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.filesystem_associate previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.restorecon previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.swapfile previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.connect_ports previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.vbetool previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.device previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 20 06:01:02 spectre python[30840]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 20 06:01:02 spectre setroubleshoot[30840]: lookup_signature: found 1 matches with scores 1.00 >Mar 20 06:01:02 spectre setroubleshoot[30840]: signature found in database >Mar 20 06:01:02 spectre setroubleshoot[30840]: sending alert to all clients >Mar 20 06:01:02 spectre setroubleshoot[30840]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.restorecon_source previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.rsync_data previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.kernel_modules previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.catchall_boolean previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.automount_exec_config previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.bind_ports previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.allow_execheap previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.cvs_data previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.mozplugger_remove previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.catchall previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.sandbox_connect previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.httpd_write_content previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.wine previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.catchall_labels previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.samba_share previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.sys_module previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.qemu_blk_image previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.allow_execmod previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.file previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.sys_resource previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.mmap_zero previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.openvpn previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.mozplugger previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.setenforce previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.disable_ipv6 previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.dac_override previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.public_content previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.allow_anon_write previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.selinuxpolicy previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.associate previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.xen_image previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.chrome previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.leaks previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.sshd_root previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.qemu_file_image previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.mounton previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.allow_execstack previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.filesystem_associate previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.restorecon previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.swapfile previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.connect_ports previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.vbetool previously imported >Mar 20 06:01:02 spectre setroubleshoot[30840]: load_plugins() plugins.device previously imported >Mar 20 06:01:02 spectre python[30840]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 20 06:01:11 spectre setroubleshoot[30840]: received signal=14 >Mar 20 06:01:11 spectre setroubleshoot[30840]: KeyboardInterrupt in RunFaultServer >Mar 20 06:01:11 spectre setroubleshoot[30840]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 20 06:01:11 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 20 06:01:11 spectre dbus-daemon[637]: string index out of range >Mar 20 06:16:29 spectre systemd[1]: Starting dnf makecache... >Mar 20 06:16:29 spectre dnf[30864]: Config time: 0.006 >Mar 20 06:16:29 spectre dnf[30864]: cachedir: /var/cache/dnf/x86_64/21 >Mar 20 06:16:29 spectre dnf[30864]: dnf version: 0.4.18 >Mar 20 06:16:29 spectre dnf[30864]: Making cache files for all metadata files. >Mar 20 06:16:29 spectre dnf[30864]: Metadata cache refreshed recently. >Mar 20 06:16:29 spectre systemd[1]: Started dnf makecache. >Mar 20 07:01:01 spectre systemd[1]: Starting user-0.slice. >Mar 20 07:01:01 spectre systemd[1]: Created slice user-0.slice. >Mar 20 07:01:01 spectre systemd[1]: Starting User Manager for UID 0... >Mar 20 07:01:01 spectre systemd[1]: Starting Session 80 of user root. >Mar 20 07:01:01 spectre systemd[1]: Started Session 80 of user root. >Mar 20 07:01:01 spectre systemd[30872]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 20 07:01:01 spectre systemd[30872]: Starting Paths. >Mar 20 07:01:01 spectre systemd[30872]: Reached target Paths. >Mar 20 07:01:01 spectre systemd[30872]: Starting Timers. >Mar 20 07:01:01 spectre systemd[30872]: Reached target Timers. >Mar 20 07:01:01 spectre systemd[30872]: Starting Sockets. >Mar 20 07:01:01 spectre systemd[30872]: Reached target Sockets. >Mar 20 07:01:01 spectre systemd[30872]: Starting Basic System. >Mar 20 07:01:01 spectre systemd[30872]: Reached target Basic System. >Mar 20 07:01:01 spectre systemd[30872]: Starting Default. >Mar 20 07:01:01 spectre systemd[30872]: Reached target Default. >Mar 20 07:01:01 spectre systemd[30872]: Startup finished in 11ms. >Mar 20 07:01:01 spectre systemd[1]: Started User Manager for UID 0. >Mar 20 07:01:01 spectre CROND[30876]: (root) CMD (run-parts /etc/cron.hourly) >Mar 20 07:01:01 spectre run-parts[30879]: (/etc/cron.hourly) starting 0anacron >Mar 20 07:01:01 spectre run-parts[30885]: (/etc/cron.hourly) finished 0anacron >Mar 20 07:01:01 spectre run-parts[30887]: (/etc/cron.hourly) starting mcelog.cron >Mar 20 07:01:01 spectre run-parts[30891]: (/etc/cron.hourly) finished mcelog.cron >Mar 20 07:01:01 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 20 07:01:01 spectre systemd[30872]: Stopping Default. >Mar 20 07:01:01 spectre systemd[30872]: Stopped target Default. >Mar 20 07:01:01 spectre systemd[30872]: Stopping Basic System. >Mar 20 07:01:01 spectre systemd[30872]: Stopped target Basic System. >Mar 20 07:01:01 spectre systemd[30872]: Stopping Paths. >Mar 20 07:01:01 spectre systemd[30872]: Stopped target Paths. >Mar 20 07:01:01 spectre systemd[30872]: Stopping Timers. >Mar 20 07:01:01 spectre systemd[30872]: Stopped target Timers. >Mar 20 07:01:01 spectre systemd[30872]: Stopping Sockets. >Mar 20 07:01:01 spectre systemd[30872]: Stopped target Sockets. >Mar 20 07:01:01 spectre systemd[30872]: Starting Shutdown. >Mar 20 07:01:01 spectre systemd[30872]: Reached target Shutdown. >Mar 20 07:01:01 spectre systemd[30872]: Starting Exit the Session... >Mar 20 07:01:01 spectre systemd[30872]: Received SIGRTMIN+24 from PID 30894 (kill). >Mar 20 07:01:01 spectre systemd[30874]: pam_unix(systemd-user:session): session closed for user root >Mar 20 07:01:01 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 20 07:01:01 spectre systemd[1]: Stopping user-0.slice. >Mar 20 07:01:01 spectre systemd[1]: Removed slice user-0.slice. >Mar 20 07:01:01 spectre systemd-logind[17665]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 20 07:01:01 spectre systemd-logind[17665]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 20 07:01:01 spectre systemd-logind[17665]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 20 07:01:01 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 20 07:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 20 07:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 20 07:01:01 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 20 07:01:01 spectre setroubleshoot[30900]: RunFaultServer(10) >Mar 20 07:01:01 spectre setroubleshoot[30900]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 20 07:01:01 spectre setroubleshoot[30900]: database version 3.0 compatible with current 3.0 version >Mar 20 07:01:01 spectre setroubleshoot[30900]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 20 07:01:01 spectre setroubleshoot[30900]: Number of Plugins = 46 >Mar 20 07:01:01 spectre setroubleshoot[30900]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 20 07:01:01 spectre setroubleshoot[30900]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 20 07:01:01 spectre setroubleshoot[30900]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 20 07:01:01 spectre setroubleshoot[30900]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 20 07:01:01 spectre setroubleshoot[30900]: dbus avc(node=spectre type=AVC msg=audit(1395313261.491:1901): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395313261.491:1901): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc536ac0 a1=f0800 a2=0 a3=7f6aba682680 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395313261.491:1901): >) called: 1 Connections >Mar 20 07:01:01 spectre setroubleshoot[30900]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395313261.491:1901): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 20 07:01:01 spectre setroubleshoot[30900]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395313261.491:1901): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc536ac0 a1=f0800 a2=0 a3=7f6aba682680 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 20 07:01:01 spectre setroubleshoot[30900]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395313261.491:1901): >Mar 20 07:01:02 spectre setroubleshoot[30900]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 20 07:01:02 spectre setroubleshoot[30900]: dbus avc(node=spectre type=AVC msg=audit(1395313261.492:1902): avc: denied { unmount } for pid=17665 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395313261.492:1902): arch=c000003e syscall=166 success=no exit=-13 a0=7f6abc536ac0 a1=2 a2=0 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395313261.492:1902): >) called: 1 Connections >Mar 20 07:01:02 spectre setroubleshoot[30900]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395313261.492:1902): avc: denied { unmount } for pid=17665 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 20 07:01:02 spectre setroubleshoot[30900]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395313261.492:1902): arch=c000003e syscall=166 success=no exit=-13 a0=7f6abc536ac0 a1=2 a2=0 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 20 07:01:02 spectre setroubleshoot[30900]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395313261.492:1902): >Mar 20 07:01:02 spectre setroubleshoot[30900]: dbus avc(node=spectre type=AVC msg=audit(1395313261.492:1903): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395313261.492:1903): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc536ac0 a1=f0800 a2=1 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395313261.492:1903): >) called: 1 Connections >Mar 20 07:01:02 spectre setroubleshoot[30900]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395313261.492:1903): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 20 07:01:02 spectre setroubleshoot[30900]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395313261.492:1903): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc536ac0 a1=f0800 a2=1 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 20 07:01:02 spectre setroubleshoot[30900]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395313261.492:1903): >Mar 20 07:01:02 spectre setroubleshoot[30900]: Plugin Exception restorecon_source >Mar 20 07:01:02 spectre setroubleshoot[30900]: Plugin Exception restorecon >Mar 20 07:01:02 spectre setroubleshoot[30900]: lookup_signature: found 1 matches with scores 1.00 >Mar 20 07:01:02 spectre setroubleshoot[30900]: signature found in database >Mar 20 07:01:02 spectre setroubleshoot[30900]: sending alert to all clients >Mar 20 07:01:02 spectre setroubleshoot[30900]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.restorecon_source previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.rsync_data previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.kernel_modules previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.catchall_boolean previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.automount_exec_config previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.bind_ports previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.allow_execheap previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.cvs_data previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.mozplugger_remove previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.catchall previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.sandbox_connect previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.httpd_write_content previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.wine previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.catchall_labels previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.samba_share previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.sys_module previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.qemu_blk_image previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.allow_execmod previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.file previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.sys_resource previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.mmap_zero previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.openvpn previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.mozplugger previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.setenforce previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.disable_ipv6 previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.dac_override previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.public_content previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.allow_anon_write previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.selinuxpolicy previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.associate previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.xen_image previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.chrome previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.leaks previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.sshd_root previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.qemu_file_image previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.mounton previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.allow_execstack previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.filesystem_associate previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.restorecon previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.swapfile previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.connect_ports previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.vbetool previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.device previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 20 07:01:02 spectre python[30900]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 20 07:01:02 spectre setroubleshoot[30900]: lookup_signature: found 1 matches with scores 1.00 >Mar 20 07:01:02 spectre setroubleshoot[30900]: signature found in database >Mar 20 07:01:02 spectre setroubleshoot[30900]: sending alert to all clients >Mar 20 07:01:02 spectre setroubleshoot[30900]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.restorecon_source previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.rsync_data previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.kernel_modules previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.catchall_boolean previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.automount_exec_config previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.bind_ports previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.allow_execheap previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.cvs_data previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.mozplugger_remove previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.catchall previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.sandbox_connect previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.httpd_write_content previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.wine previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.catchall_labels previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.samba_share previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.sys_module previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.qemu_blk_image previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.allow_execmod previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.file previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.sys_resource previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.mmap_zero previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.openvpn previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.mozplugger previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.setenforce previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.disable_ipv6 previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.dac_override previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.public_content previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.allow_anon_write previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.selinuxpolicy previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.associate previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.xen_image previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.chrome previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.leaks previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.sshd_root previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.qemu_file_image previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.mounton previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.allow_execstack previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.filesystem_associate previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.restorecon previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.swapfile previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.connect_ports previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.vbetool previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.device previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 20 07:01:02 spectre python[30900]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 20 07:01:02 spectre setroubleshoot[30900]: lookup_signature: found 1 matches with scores 1.00 >Mar 20 07:01:02 spectre setroubleshoot[30900]: signature found in database >Mar 20 07:01:02 spectre setroubleshoot[30900]: sending alert to all clients >Mar 20 07:01:02 spectre setroubleshoot[30900]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.restorecon_source previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.rsync_data previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.kernel_modules previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.catchall_boolean previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.automount_exec_config previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.bind_ports previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.allow_execheap previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.cvs_data previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.mozplugger_remove previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.catchall previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.sandbox_connect previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.httpd_write_content previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.wine previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.catchall_labels previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.samba_share previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.sys_module previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.qemu_blk_image previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.allow_execmod previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.file previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.sys_resource previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.mmap_zero previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.openvpn previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.mozplugger previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.setenforce previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.disable_ipv6 previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.dac_override previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.public_content previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.allow_anon_write previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.selinuxpolicy previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.associate previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.xen_image previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.chrome previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.leaks previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.sshd_root previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.qemu_file_image previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.mounton previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.allow_execstack previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.filesystem_associate previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.restorecon previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.swapfile previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.connect_ports previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.vbetool previously imported >Mar 20 07:01:02 spectre setroubleshoot[30900]: load_plugins() plugins.device previously imported >Mar 20 07:01:02 spectre python[30900]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 20 07:01:12 spectre setroubleshoot[30900]: received signal=14 >Mar 20 07:01:12 spectre setroubleshoot[30900]: KeyboardInterrupt in RunFaultServer >Mar 20 07:01:12 spectre setroubleshoot[30900]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 20 07:01:12 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 20 07:01:12 spectre dbus-daemon[637]: string index out of range >Mar 20 07:16:38 spectre systemd[1]: Starting dnf makecache... >Mar 20 07:16:38 spectre dnf[30927]: Config time: 0.006 >Mar 20 07:16:38 spectre dnf[30927]: cachedir: /var/cache/dnf/x86_64/21 >Mar 20 07:16:38 spectre dnf[30927]: dnf version: 0.4.18 >Mar 20 07:16:38 spectre dnf[30927]: Making cache files for all metadata files. >Mar 20 07:16:38 spectre dnf[30927]: rawhide: will expire after 21542 seconds. >Mar 20 07:16:38 spectre dnf[30927]: repo: using cache for: rawhide >Mar 20 07:16:38 spectre dnf[30927]: hawkey sack setup time: 0.134 >Mar 20 07:16:38 spectre dnf[30927]: Metadata cache created. >Mar 20 07:16:38 spectre systemd[1]: Started dnf makecache. >Mar 20 08:01:01 spectre systemd[1]: Starting user-0.slice. >Mar 20 08:01:01 spectre systemd[1]: Created slice user-0.slice. >Mar 20 08:01:01 spectre systemd[1]: Starting User Manager for UID 0... >Mar 20 08:01:01 spectre systemd[1]: Starting Session 81 of user root. >Mar 20 08:01:01 spectre systemd[1]: Started Session 81 of user root. >Mar 20 08:01:01 spectre systemd[30934]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 20 08:01:01 spectre systemd[30934]: Starting Paths. >Mar 20 08:01:01 spectre systemd[30934]: Reached target Paths. >Mar 20 08:01:01 spectre systemd[30934]: Starting Timers. >Mar 20 08:01:01 spectre systemd[30934]: Reached target Timers. >Mar 20 08:01:01 spectre systemd[30934]: Starting Sockets. >Mar 20 08:01:01 spectre systemd[30934]: Reached target Sockets. >Mar 20 08:01:01 spectre systemd[30934]: Starting Basic System. >Mar 20 08:01:01 spectre systemd[30934]: Reached target Basic System. >Mar 20 08:01:01 spectre systemd[30934]: Starting Default. >Mar 20 08:01:01 spectre systemd[30934]: Reached target Default. >Mar 20 08:01:01 spectre systemd[30934]: Startup finished in 13ms. >Mar 20 08:01:01 spectre systemd[1]: Started User Manager for UID 0. >Mar 20 08:01:01 spectre CROND[30938]: (root) CMD (run-parts /etc/cron.hourly) >Mar 20 08:01:01 spectre run-parts[30941]: (/etc/cron.hourly) starting 0anacron >Mar 20 08:01:01 spectre run-parts[30947]: (/etc/cron.hourly) finished 0anacron >Mar 20 08:01:01 spectre run-parts[30949]: (/etc/cron.hourly) starting mcelog.cron >Mar 20 08:01:01 spectre run-parts[30953]: (/etc/cron.hourly) finished mcelog.cron >Mar 20 08:01:01 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 20 08:01:01 spectre systemd[30934]: Stopping Default. >Mar 20 08:01:01 spectre systemd[30934]: Stopped target Default. >Mar 20 08:01:01 spectre systemd[30934]: Stopping Basic System. >Mar 20 08:01:01 spectre systemd[30934]: Stopped target Basic System. >Mar 20 08:01:01 spectre systemd[30934]: Stopping Paths. >Mar 20 08:01:01 spectre systemd[30934]: Stopped target Paths. >Mar 20 08:01:01 spectre systemd[30934]: Stopping Timers. >Mar 20 08:01:01 spectre systemd[30934]: Stopped target Timers. >Mar 20 08:01:01 spectre systemd[30934]: Stopping Sockets. >Mar 20 08:01:01 spectre systemd[30934]: Stopped target Sockets. >Mar 20 08:01:01 spectre systemd[30934]: Starting Shutdown. >Mar 20 08:01:01 spectre systemd[30934]: Reached target Shutdown. >Mar 20 08:01:01 spectre systemd[30934]: Starting Exit the Session... >Mar 20 08:01:01 spectre systemd[30934]: Received SIGRTMIN+24 from PID 30956 (kill). >Mar 20 08:01:01 spectre systemd[30936]: pam_unix(systemd-user:session): session closed for user root >Mar 20 08:01:01 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 20 08:01:01 spectre systemd[1]: Stopping user-0.slice. >Mar 20 08:01:01 spectre systemd[1]: Removed slice user-0.slice. >Mar 20 08:01:01 spectre systemd-logind[17665]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 20 08:01:01 spectre systemd-logind[17665]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 20 08:01:01 spectre systemd-logind[17665]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 20 08:01:01 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 20 08:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 20 08:01:02 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 20 08:01:02 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 20 08:01:02 spectre setroubleshoot[30962]: RunFaultServer(10) >Mar 20 08:01:02 spectre setroubleshoot[30962]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 20 08:01:02 spectre setroubleshoot[30962]: database version 3.0 compatible with current 3.0 version >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 20 08:01:02 spectre setroubleshoot[30962]: Number of Plugins = 46 >Mar 20 08:01:02 spectre setroubleshoot[30962]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 20 08:01:02 spectre setroubleshoot[30962]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 20 08:01:02 spectre setroubleshoot[30962]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 20 08:01:02 spectre setroubleshoot[30962]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 20 08:01:02 spectre setroubleshoot[30962]: dbus avc(node=spectre type=AVC msg=audit(1395316861.668:1918): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395316861.668:1918): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4f0ca0 a1=f0800 a2=0 a3=7f6aba682680 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395316861.668:1918): >) called: 1 Connections >Mar 20 08:01:02 spectre setroubleshoot[30962]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395316861.668:1918): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 20 08:01:02 spectre setroubleshoot[30962]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395316861.668:1918): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4f0ca0 a1=f0800 a2=0 a3=7f6aba682680 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 20 08:01:02 spectre setroubleshoot[30962]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395316861.668:1918): >Mar 20 08:01:02 spectre setroubleshoot[30962]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 20 08:01:02 spectre setroubleshoot[30962]: dbus avc(node=spectre type=AVC msg=audit(1395316861.668:1919): avc: denied { unmount } for pid=17665 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395316861.668:1919): arch=c000003e syscall=166 success=no exit=-13 a0=7f6abc4f0ca0 a1=2 a2=0 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395316861.668:1919): >) called: 1 Connections >Mar 20 08:01:02 spectre setroubleshoot[30962]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395316861.668:1919): avc: denied { unmount } for pid=17665 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 20 08:01:02 spectre setroubleshoot[30962]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395316861.668:1919): arch=c000003e syscall=166 success=no exit=-13 a0=7f6abc4f0ca0 a1=2 a2=0 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 20 08:01:02 spectre setroubleshoot[30962]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395316861.668:1919): >Mar 20 08:01:02 spectre setroubleshoot[30962]: dbus avc(node=spectre type=AVC msg=audit(1395316861.668:1920): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395316861.668:1920): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4f0ca0 a1=f0800 a2=1 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395316861.668:1920): >) called: 1 Connections >Mar 20 08:01:02 spectre setroubleshoot[30962]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395316861.668:1920): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 20 08:01:02 spectre setroubleshoot[30962]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395316861.668:1920): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4f0ca0 a1=f0800 a2=1 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 20 08:01:02 spectre setroubleshoot[30962]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395316861.668:1920): >Mar 20 08:01:02 spectre setroubleshoot[30962]: Plugin Exception restorecon_source >Mar 20 08:01:02 spectre setroubleshoot[30962]: Plugin Exception restorecon >Mar 20 08:01:02 spectre setroubleshoot[30962]: lookup_signature: found 1 matches with scores 1.00 >Mar 20 08:01:02 spectre setroubleshoot[30962]: signature found in database >Mar 20 08:01:02 spectre setroubleshoot[30962]: sending alert to all clients >Mar 20 08:01:02 spectre setroubleshoot[30962]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.restorecon_source previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.rsync_data previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.kernel_modules previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.catchall_boolean previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.automount_exec_config previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.bind_ports previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.allow_execheap previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.cvs_data previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.mozplugger_remove previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.catchall previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.sandbox_connect previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.httpd_write_content previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.wine previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.catchall_labels previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.samba_share previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.sys_module previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.qemu_blk_image previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.allow_execmod previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.file previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.sys_resource previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.mmap_zero previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.openvpn previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.mozplugger previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.setenforce previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.disable_ipv6 previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.dac_override previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.public_content previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.allow_anon_write previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.selinuxpolicy previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.associate previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.xen_image previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.chrome previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.leaks previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.sshd_root previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.qemu_file_image previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.mounton previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.allow_execstack previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.filesystem_associate previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.restorecon previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.swapfile previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.connect_ports previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.vbetool previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.device previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 20 08:01:02 spectre python[30962]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 20 08:01:02 spectre setroubleshoot[30962]: lookup_signature: found 1 matches with scores 1.00 >Mar 20 08:01:02 spectre setroubleshoot[30962]: signature found in database >Mar 20 08:01:02 spectre setroubleshoot[30962]: sending alert to all clients >Mar 20 08:01:02 spectre setroubleshoot[30962]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.restorecon_source previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.rsync_data previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.kernel_modules previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.catchall_boolean previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.automount_exec_config previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.bind_ports previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.allow_execheap previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.cvs_data previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.mozplugger_remove previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.catchall previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.sandbox_connect previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.httpd_write_content previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.wine previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.catchall_labels previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.samba_share previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.sys_module previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.qemu_blk_image previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.allow_execmod previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.file previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.sys_resource previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.mmap_zero previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.openvpn previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.mozplugger previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.setenforce previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.disable_ipv6 previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.dac_override previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.public_content previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.allow_anon_write previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.selinuxpolicy previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.associate previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.xen_image previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.chrome previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.leaks previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.sshd_root previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.qemu_file_image previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.mounton previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.allow_execstack previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.filesystem_associate previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.restorecon previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.swapfile previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.connect_ports previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.vbetool previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.device previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 20 08:01:02 spectre python[30962]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 20 08:01:02 spectre setroubleshoot[30962]: lookup_signature: found 1 matches with scores 1.00 >Mar 20 08:01:02 spectre setroubleshoot[30962]: signature found in database >Mar 20 08:01:02 spectre setroubleshoot[30962]: sending alert to all clients >Mar 20 08:01:02 spectre setroubleshoot[30962]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.restorecon_source previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.rsync_data previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.kernel_modules previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.catchall_boolean previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.automount_exec_config previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.bind_ports previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.allow_execheap previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.cvs_data previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.mozplugger_remove previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.catchall previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.sandbox_connect previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.httpd_write_content previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.wine previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.catchall_labels previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.samba_share previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.sys_module previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.qemu_blk_image previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.allow_execmod previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.file previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.sys_resource previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.mmap_zero previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.openvpn previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.mozplugger previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.setenforce previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.disable_ipv6 previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.dac_override previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.public_content previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.allow_anon_write previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.selinuxpolicy previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.associate previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.xen_image previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.chrome previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.leaks previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.sshd_root previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.qemu_file_image previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.mounton previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.allow_execstack previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.filesystem_associate previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.restorecon previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.swapfile previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.connect_ports previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.vbetool previously imported >Mar 20 08:01:02 spectre setroubleshoot[30962]: load_plugins() plugins.device previously imported >Mar 20 08:01:02 spectre python[30962]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 20 08:01:12 spectre setroubleshoot[30962]: received signal=14 >Mar 20 08:01:12 spectre setroubleshoot[30962]: KeyboardInterrupt in RunFaultServer >Mar 20 08:01:12 spectre setroubleshoot[30962]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 20 08:01:12 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 20 08:01:12 spectre dbus-daemon[637]: string index out of range >Mar 20 08:16:38 spectre systemd[1]: Starting dnf makecache... >Mar 20 08:16:38 spectre dnf[30987]: Config time: 0.006 >Mar 20 08:16:38 spectre dnf[30987]: cachedir: /var/cache/dnf/x86_64/21 >Mar 20 08:16:38 spectre dnf[30987]: dnf version: 0.4.18 >Mar 20 08:16:38 spectre dnf[30987]: Making cache files for all metadata files. >Mar 20 08:16:38 spectre dnf[30987]: Metadata cache refreshed recently. >Mar 20 08:16:38 spectre systemd[1]: Started dnf makecache. >Mar 20 09:01:01 spectre systemd[1]: Starting user-0.slice. >Mar 20 09:01:01 spectre systemd[1]: Created slice user-0.slice. >Mar 20 09:01:01 spectre systemd[1]: Starting User Manager for UID 0... >Mar 20 09:01:01 spectre systemd[1]: Starting Session 82 of user root. >Mar 20 09:01:01 spectre systemd[1]: Started Session 82 of user root. >Mar 20 09:01:01 spectre systemd[30997]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 20 09:01:01 spectre systemd[30997]: Starting Paths. >Mar 20 09:01:01 spectre systemd[30997]: Reached target Paths. >Mar 20 09:01:01 spectre systemd[30997]: Starting Timers. >Mar 20 09:01:01 spectre systemd[30997]: Reached target Timers. >Mar 20 09:01:01 spectre systemd[30997]: Starting Sockets. >Mar 20 09:01:01 spectre systemd[30997]: Reached target Sockets. >Mar 20 09:01:01 spectre systemd[30997]: Starting Basic System. >Mar 20 09:01:01 spectre systemd[30997]: Reached target Basic System. >Mar 20 09:01:01 spectre systemd[30997]: Starting Default. >Mar 20 09:01:01 spectre systemd[30997]: Reached target Default. >Mar 20 09:01:01 spectre systemd[30997]: Startup finished in 10ms. >Mar 20 09:01:01 spectre systemd[1]: Started User Manager for UID 0. >Mar 20 09:01:01 spectre CROND[31001]: (root) CMD (run-parts /etc/cron.hourly) >Mar 20 09:01:01 spectre run-parts[31004]: (/etc/cron.hourly) starting 0anacron >Mar 20 09:01:01 spectre run-parts[31010]: (/etc/cron.hourly) finished 0anacron >Mar 20 09:01:01 spectre run-parts[31012]: (/etc/cron.hourly) starting mcelog.cron >Mar 20 09:01:01 spectre run-parts[31016]: (/etc/cron.hourly) finished mcelog.cron >Mar 20 09:01:01 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 20 09:01:01 spectre systemd[30997]: Stopping Default. >Mar 20 09:01:01 spectre systemd[30997]: Stopped target Default. >Mar 20 09:01:01 spectre systemd[30997]: Stopping Basic System. >Mar 20 09:01:01 spectre systemd[30997]: Stopped target Basic System. >Mar 20 09:01:01 spectre systemd[30997]: Stopping Paths. >Mar 20 09:01:01 spectre systemd[30997]: Stopped target Paths. >Mar 20 09:01:01 spectre systemd[30997]: Stopping Timers. >Mar 20 09:01:01 spectre systemd[30997]: Stopped target Timers. >Mar 20 09:01:01 spectre systemd[30997]: Stopping Sockets. >Mar 20 09:01:01 spectre systemd[30997]: Stopped target Sockets. >Mar 20 09:01:01 spectre systemd[30997]: Starting Shutdown. >Mar 20 09:01:01 spectre systemd[30997]: Reached target Shutdown. >Mar 20 09:01:01 spectre systemd[30997]: Starting Exit the Session... >Mar 20 09:01:01 spectre systemd[30997]: Received SIGRTMIN+24 from PID 31019 (kill). >Mar 20 09:01:01 spectre systemd[30999]: pam_unix(systemd-user:session): session closed for user root >Mar 20 09:01:01 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 20 09:01:01 spectre systemd[1]: Stopping user-0.slice. >Mar 20 09:01:01 spectre systemd[1]: Removed slice user-0.slice. >Mar 20 09:01:01 spectre systemd-logind[17665]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 20 09:01:01 spectre systemd-logind[17665]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 20 09:01:01 spectre systemd-logind[17665]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 20 09:01:01 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 20 09:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 20 09:01:02 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 20 09:01:02 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 20 09:01:02 spectre setroubleshoot[31025]: RunFaultServer(10) >Mar 20 09:01:02 spectre setroubleshoot[31025]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 20 09:01:02 spectre setroubleshoot[31025]: database version 3.0 compatible with current 3.0 version >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 20 09:01:02 spectre setroubleshoot[31025]: Number of Plugins = 46 >Mar 20 09:01:02 spectre setroubleshoot[31025]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 20 09:01:02 spectre setroubleshoot[31025]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 20 09:01:02 spectre setroubleshoot[31025]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 20 09:01:02 spectre setroubleshoot[31025]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 20 09:01:02 spectre setroubleshoot[31025]: dbus avc(node=spectre type=AVC msg=audit(1395320461.838:1935): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395320461.838:1935): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4e3f00 a1=f0800 a2=0 a3=fffffffffffff998 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395320461.838:1935): >) called: 1 Connections >Mar 20 09:01:02 spectre setroubleshoot[31025]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395320461.838:1935): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 20 09:01:02 spectre setroubleshoot[31025]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395320461.838:1935): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4e3f00 a1=f0800 a2=0 a3=fffffffffffff998 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 20 09:01:02 spectre setroubleshoot[31025]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395320461.838:1935): >Mar 20 09:01:02 spectre setroubleshoot[31025]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 20 09:01:02 spectre setroubleshoot[31025]: dbus avc(node=spectre type=AVC msg=audit(1395320461.838:1936): avc: denied { unmount } for pid=17665 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395320461.838:1936): arch=c000003e syscall=166 success=no exit=-13 a0=7f6abc4e3f00 a1=2 a2=0 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395320461.838:1936): >) called: 1 Connections >Mar 20 09:01:02 spectre setroubleshoot[31025]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395320461.838:1936): avc: denied { unmount } for pid=17665 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 20 09:01:02 spectre setroubleshoot[31025]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395320461.838:1936): arch=c000003e syscall=166 success=no exit=-13 a0=7f6abc4e3f00 a1=2 a2=0 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 20 09:01:02 spectre setroubleshoot[31025]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395320461.838:1936): >Mar 20 09:01:02 spectre setroubleshoot[31025]: dbus avc(node=spectre type=AVC msg=audit(1395320461.838:1937): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395320461.838:1937): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4e3f00 a1=f0800 a2=1 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395320461.838:1937): >) called: 1 Connections >Mar 20 09:01:02 spectre setroubleshoot[31025]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395320461.838:1937): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 20 09:01:02 spectre setroubleshoot[31025]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395320461.838:1937): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4e3f00 a1=f0800 a2=1 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 20 09:01:02 spectre setroubleshoot[31025]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395320461.838:1937): >Mar 20 09:01:02 spectre setroubleshoot[31025]: Plugin Exception restorecon_source >Mar 20 09:01:02 spectre setroubleshoot[31025]: Plugin Exception restorecon >Mar 20 09:01:02 spectre setroubleshoot[31025]: lookup_signature: found 1 matches with scores 1.00 >Mar 20 09:01:02 spectre setroubleshoot[31025]: signature found in database >Mar 20 09:01:02 spectre setroubleshoot[31025]: sending alert to all clients >Mar 20 09:01:02 spectre setroubleshoot[31025]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.restorecon_source previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.rsync_data previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.kernel_modules previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.catchall_boolean previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.automount_exec_config previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.bind_ports previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.allow_execheap previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.cvs_data previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.mozplugger_remove previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.catchall previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.sandbox_connect previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.httpd_write_content previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.wine previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.catchall_labels previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.samba_share previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.sys_module previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.qemu_blk_image previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.allow_execmod previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.file previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.sys_resource previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.mmap_zero previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.openvpn previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.mozplugger previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.setenforce previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.disable_ipv6 previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.dac_override previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.public_content previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.allow_anon_write previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.selinuxpolicy previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.associate previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.xen_image previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.chrome previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.leaks previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.sshd_root previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.qemu_file_image previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.mounton previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.allow_execstack previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.filesystem_associate previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.restorecon previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.swapfile previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.connect_ports previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.vbetool previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.device previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 20 09:01:02 spectre python[31025]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 20 09:01:02 spectre setroubleshoot[31025]: lookup_signature: found 1 matches with scores 1.00 >Mar 20 09:01:02 spectre setroubleshoot[31025]: signature found in database >Mar 20 09:01:02 spectre setroubleshoot[31025]: sending alert to all clients >Mar 20 09:01:02 spectre setroubleshoot[31025]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.restorecon_source previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.rsync_data previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.kernel_modules previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.catchall_boolean previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.automount_exec_config previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.bind_ports previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.allow_execheap previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.cvs_data previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.mozplugger_remove previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.catchall previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.sandbox_connect previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.httpd_write_content previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.wine previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.catchall_labels previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.samba_share previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.sys_module previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.qemu_blk_image previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.allow_execmod previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.file previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.sys_resource previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.mmap_zero previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.openvpn previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.mozplugger previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.setenforce previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.disable_ipv6 previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.dac_override previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.public_content previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.allow_anon_write previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.selinuxpolicy previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.associate previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.xen_image previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.chrome previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.leaks previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.sshd_root previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.qemu_file_image previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.mounton previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.allow_execstack previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.filesystem_associate previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.restorecon previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.swapfile previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.connect_ports previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.vbetool previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.device previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 20 09:01:02 spectre python[31025]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 20 09:01:02 spectre setroubleshoot[31025]: lookup_signature: found 1 matches with scores 1.00 >Mar 20 09:01:02 spectre setroubleshoot[31025]: signature found in database >Mar 20 09:01:02 spectre setroubleshoot[31025]: sending alert to all clients >Mar 20 09:01:02 spectre setroubleshoot[31025]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.restorecon_source previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.rsync_data previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.kernel_modules previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.catchall_boolean previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.automount_exec_config previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.bind_ports previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.allow_execheap previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.cvs_data previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.mozplugger_remove previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.catchall previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.sandbox_connect previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.httpd_write_content previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.wine previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.catchall_labels previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.samba_share previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.sys_module previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.qemu_blk_image previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.allow_execmod previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.file previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.sys_resource previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.mmap_zero previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.openvpn previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.mozplugger previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.setenforce previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.disable_ipv6 previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.dac_override previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.public_content previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.allow_anon_write previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.selinuxpolicy previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.associate previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.xen_image previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.chrome previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.leaks previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.sshd_root previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.qemu_file_image previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.mounton previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.allow_execstack previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.filesystem_associate previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.restorecon previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.swapfile previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.connect_ports previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.vbetool previously imported >Mar 20 09:01:02 spectre setroubleshoot[31025]: load_plugins() plugins.device previously imported >Mar 20 09:01:02 spectre python[31025]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 20 09:01:12 spectre setroubleshoot[31025]: received signal=14 >Mar 20 09:01:12 spectre setroubleshoot[31025]: KeyboardInterrupt in RunFaultServer >Mar 20 09:01:12 spectre setroubleshoot[31025]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 20 09:01:12 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 20 09:01:12 spectre dbus-daemon[637]: string index out of range >Mar 20 09:16:39 spectre systemd[1]: Starting dnf makecache... >Mar 20 09:16:39 spectre dnf[31053]: Config time: 0.006 >Mar 20 09:16:39 spectre dnf[31053]: cachedir: /var/cache/dnf/x86_64/21 >Mar 20 09:16:39 spectre dnf[31053]: dnf version: 0.4.18 >Mar 20 09:16:39 spectre dnf[31053]: Making cache files for all metadata files. >Mar 20 09:16:39 spectre dnf[31053]: Metadata cache refreshed recently. >Mar 20 09:16:39 spectre systemd[1]: Started dnf makecache. >Mar 20 09:33:22 spectre sshd[31058]: Accepted publickey for dshea from 192.168.100.1 port 53755 ssh2: RSA 29:71:d3:be:dc:71:8e:0d:ef:a5:2f:ab:31:0c:82:d4 >Mar 20 09:33:22 spectre systemd[1]: Starting user-1000.slice. >Mar 20 09:33:22 spectre systemd[1]: Created slice user-1000.slice. >Mar 20 09:33:22 spectre systemd[1]: Starting User Manager for UID 1000... >Mar 20 09:33:22 spectre systemd-logind[17665]: New session 83 of user dshea. >Mar 20 09:33:22 spectre systemd[1]: Starting Session 83 of user dshea. >Mar 20 09:33:22 spectre systemd[1]: Started Session 83 of user dshea. >Mar 20 09:33:22 spectre systemd[31061]: pam_unix(systemd-user:session): session opened for user dshea by (uid=0) >Mar 20 09:33:22 spectre systemd[31061]: Starting Paths. >Mar 20 09:33:22 spectre systemd[31061]: Reached target Paths. >Mar 20 09:33:22 spectre systemd[31061]: Starting Timers. >Mar 20 09:33:22 spectre systemd[31061]: Reached target Timers. >Mar 20 09:33:22 spectre systemd[31061]: Starting Sockets. >Mar 20 09:33:22 spectre systemd[31061]: Reached target Sockets. >Mar 20 09:33:22 spectre systemd[31061]: Starting Basic System. >Mar 20 09:33:22 spectre systemd[31061]: Reached target Basic System. >Mar 20 09:33:22 spectre systemd[31061]: Starting Default. >Mar 20 09:33:22 spectre systemd[31061]: Reached target Default. >Mar 20 09:33:22 spectre systemd[31061]: Startup finished in 10ms. >Mar 20 09:33:22 spectre systemd[1]: Started User Manager for UID 1000. >Mar 20 09:33:22 spectre sshd[31058]: pam_unix(sshd:session): session opened for user dshea by (uid=0) >Mar 20 10:00:04 spectre sshd[31065]: Received disconnect from 192.168.100.1: 11: disconnected by user >Mar 20 10:00:04 spectre sshd[31058]: pam_unix(sshd:session): session closed for user dshea >Mar 20 10:00:04 spectre systemd-logind[17665]: Removed session 83. >Mar 20 10:00:04 spectre systemd[1]: Stopping User Manager for UID 1000... >Mar 20 10:00:04 spectre systemd[31061]: Stopping Default. >Mar 20 10:00:04 spectre systemd[31061]: Stopped target Default. >Mar 20 10:00:04 spectre systemd[31061]: Stopping Basic System. >Mar 20 10:00:04 spectre systemd[31061]: Stopped target Basic System. >Mar 20 10:00:04 spectre systemd[31061]: Stopping Paths. >Mar 20 10:00:04 spectre systemd[31061]: Stopped target Paths. >Mar 20 10:00:04 spectre systemd[31061]: Stopping Timers. >Mar 20 10:00:04 spectre systemd[31061]: Stopped target Timers. >Mar 20 10:00:04 spectre systemd[31061]: Stopping Sockets. >Mar 20 10:00:04 spectre systemd[31061]: Stopped target Sockets. >Mar 20 10:00:04 spectre systemd[31061]: Starting Shutdown. >Mar 20 10:00:04 spectre systemd[31061]: Reached target Shutdown. >Mar 20 10:00:04 spectre systemd[31061]: Starting Exit the Session... >Mar 20 10:00:04 spectre systemd[31061]: Received SIGRTMIN+24 from PID 1442 (kill). >Mar 20 10:00:04 spectre systemd[1]: Stopped User Manager for UID 1000. >Mar 20 10:00:04 spectre systemd[1]: Stopping user-1000.slice. >Mar 20 10:00:04 spectre systemd[1]: Removed slice user-1000.slice. >Mar 20 10:00:04 spectre systemd-logind[17665]: Failed to remove runtime directory /run/user/1000: Permission denied >Mar 20 10:00:04 spectre systemd-logind[17665]: Failed to unmount user runtime directory /run/user/1000: Permission denied >Mar 20 10:00:04 spectre systemd-logind[17665]: Failed to remove runtime directory /run/user/1000: Permission denied >Mar 20 10:00:04 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 20 10:00:04 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 20 10:00:04 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 20 10:00:04 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 20 10:00:04 spectre setroubleshoot[1447]: RunFaultServer(10) >Mar 20 10:00:04 spectre setroubleshoot[1447]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 20 10:00:04 spectre setroubleshoot[1447]: database version 3.0 compatible with current 3.0 version >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 20 10:00:04 spectre setroubleshoot[1447]: Number of Plugins = 46 >Mar 20 10:00:04 spectre setroubleshoot[1447]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 20 10:00:04 spectre setroubleshoot[1447]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 20 10:00:04 spectre setroubleshoot[1447]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 20 10:00:04 spectre setroubleshoot[1447]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 20 10:00:04 spectre setroubleshoot[1447]: dbus avc(node=spectre type=AVC msg=audit(1395324004.166:1970): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=29033 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395324004.166:1970): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4e59e0 a1=f0800 a2=0 a3=7f6aba682680 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395324004.166:1970): >) called: 1 Connections >Mar 20 10:00:04 spectre setroubleshoot[1447]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395324004.166:1970): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=29033 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 20 10:00:04 spectre setroubleshoot[1447]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395324004.166:1970): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4e59e0 a1=f0800 a2=0 a3=7f6aba682680 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 20 10:00:04 spectre setroubleshoot[1447]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395324004.166:1970): >Mar 20 10:00:04 spectre setroubleshoot[1447]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 20 10:00:04 spectre setroubleshoot[1447]: dbus avc(node=spectre type=AVC msg=audit(1395324004.166:1971): avc: denied { unmount } for pid=17665 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395324004.166:1971): arch=c000003e syscall=166 success=no exit=-13 a0=7f6abc4e59e0 a1=2 a2=0 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395324004.166:1971): >) called: 1 Connections >Mar 20 10:00:04 spectre setroubleshoot[1447]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395324004.166:1971): avc: denied { unmount } for pid=17665 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 20 10:00:04 spectre setroubleshoot[1447]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395324004.166:1971): arch=c000003e syscall=166 success=no exit=-13 a0=7f6abc4e59e0 a1=2 a2=0 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 20 10:00:04 spectre setroubleshoot[1447]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395324004.166:1971): >Mar 20 10:00:04 spectre setroubleshoot[1447]: dbus avc(node=spectre type=AVC msg=audit(1395324004.166:1972): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=29033 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395324004.166:1972): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4e59e0 a1=f0800 a2=1 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395324004.166:1972): >) called: 1 Connections >Mar 20 10:00:04 spectre setroubleshoot[1447]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395324004.166:1972): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=29033 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 20 10:00:04 spectre setroubleshoot[1447]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395324004.166:1972): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4e59e0 a1=f0800 a2=1 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 20 10:00:04 spectre setroubleshoot[1447]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395324004.166:1972): >Mar 20 10:00:04 spectre setroubleshoot[1447]: Plugin Exception restorecon_source >Mar 20 10:00:04 spectre setroubleshoot[1447]: Plugin Exception restorecon >Mar 20 10:00:04 spectre setroubleshoot[1447]: lookup_signature: found 1 matches with scores 1.00 >Mar 20 10:00:04 spectre setroubleshoot[1447]: signature found in database >Mar 20 10:00:04 spectre setroubleshoot[1447]: sending alert to all clients >Mar 20 10:00:04 spectre setroubleshoot[1447]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.restorecon_source previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.rsync_data previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.kernel_modules previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.catchall_boolean previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.automount_exec_config previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.bind_ports previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.allow_execheap previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.cvs_data previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.mozplugger_remove previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.catchall previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.sandbox_connect previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.httpd_write_content previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.wine previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.catchall_labels previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.samba_share previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.sys_module previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.qemu_blk_image previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.allow_execmod previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.file previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.sys_resource previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.mmap_zero previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.openvpn previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.mozplugger previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.setenforce previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.disable_ipv6 previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.dac_override previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.public_content previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.allow_anon_write previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.selinuxpolicy previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.associate previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.xen_image previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.chrome previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.leaks previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.sshd_root previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.qemu_file_image previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.mounton previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.allow_execstack previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.filesystem_associate previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.restorecon previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.swapfile previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.connect_ports previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.vbetool previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.device previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 20 10:00:04 spectre python[1447]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 20 10:00:04 spectre setroubleshoot[1447]: lookup_signature: found 1 matches with scores 1.00 >Mar 20 10:00:04 spectre setroubleshoot[1447]: signature found in database >Mar 20 10:00:04 spectre setroubleshoot[1447]: sending alert to all clients >Mar 20 10:00:04 spectre setroubleshoot[1447]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.restorecon_source previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.rsync_data previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.kernel_modules previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.catchall_boolean previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.automount_exec_config previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.bind_ports previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.allow_execheap previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.cvs_data previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.mozplugger_remove previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.catchall previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.sandbox_connect previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.httpd_write_content previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.wine previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.catchall_labels previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.samba_share previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.sys_module previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.qemu_blk_image previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.allow_execmod previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.file previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.sys_resource previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.mmap_zero previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.openvpn previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.mozplugger previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.setenforce previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.disable_ipv6 previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.dac_override previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.public_content previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.allow_anon_write previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.selinuxpolicy previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.associate previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.xen_image previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.chrome previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.leaks previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.sshd_root previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.qemu_file_image previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.mounton previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.allow_execstack previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.filesystem_associate previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.restorecon previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.swapfile previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.connect_ports previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.vbetool previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.device previously imported >Mar 20 10:00:04 spectre python[1447]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 20 10:00:04 spectre setroubleshoot[1447]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 20 10:00:04 spectre setroubleshoot[1447]: lookup_signature: found 1 matches with scores 1.00 >Mar 20 10:00:04 spectre setroubleshoot[1447]: signature found in database >Mar 20 10:00:04 spectre setroubleshoot[1447]: sending alert to all clients >Mar 20 10:00:04 spectre setroubleshoot[1447]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.restorecon_source previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.rsync_data previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.kernel_modules previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.catchall_boolean previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.automount_exec_config previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.bind_ports previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.allow_execheap previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.cvs_data previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.mozplugger_remove previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.catchall previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.sandbox_connect previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.httpd_write_content previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.wine previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.catchall_labels previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.samba_share previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.sys_module previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.qemu_blk_image previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.allow_execmod previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.file previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.sys_resource previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.mmap_zero previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.openvpn previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.mozplugger previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.setenforce previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.disable_ipv6 previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.dac_override previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.public_content previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.allow_anon_write previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.selinuxpolicy previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.associate previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.xen_image previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.chrome previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.leaks previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.sshd_root previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.qemu_file_image previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.mounton previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.allow_execstack previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.filesystem_associate previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.restorecon previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.swapfile previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.connect_ports previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.vbetool previously imported >Mar 20 10:00:04 spectre setroubleshoot[1447]: load_plugins() plugins.device previously imported >Mar 20 10:00:04 spectre python[1447]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 20 10:00:14 spectre setroubleshoot[1447]: received signal=14 >Mar 20 10:00:14 spectre setroubleshoot[1447]: KeyboardInterrupt in RunFaultServer >Mar 20 10:00:14 spectre setroubleshoot[1447]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 20 10:00:14 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 20 10:00:14 spectre dbus-daemon[637]: string index out of range >Mar 20 10:01:01 spectre systemd[1]: Starting user-0.slice. >Mar 20 10:01:01 spectre systemd[1]: Created slice user-0.slice. >Mar 20 10:01:01 spectre systemd[1]: Starting User Manager for UID 0... >Mar 20 10:01:01 spectre systemd[1]: Starting Session 84 of user root. >Mar 20 10:01:01 spectre systemd[1]: Started Session 84 of user root. >Mar 20 10:01:01 spectre systemd[1474]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 20 10:01:01 spectre systemd[1474]: Starting Paths. >Mar 20 10:01:01 spectre systemd[1474]: Reached target Paths. >Mar 20 10:01:01 spectre systemd[1474]: Starting Timers. >Mar 20 10:01:01 spectre systemd[1474]: Reached target Timers. >Mar 20 10:01:01 spectre systemd[1474]: Starting Sockets. >Mar 20 10:01:01 spectre systemd[1474]: Reached target Sockets. >Mar 20 10:01:01 spectre systemd[1474]: Starting Basic System. >Mar 20 10:01:01 spectre systemd[1474]: Reached target Basic System. >Mar 20 10:01:01 spectre systemd[1474]: Starting Default. >Mar 20 10:01:01 spectre systemd[1474]: Reached target Default. >Mar 20 10:01:01 spectre systemd[1474]: Startup finished in 11ms. >Mar 20 10:01:01 spectre systemd[1]: Started User Manager for UID 0. >Mar 20 10:01:01 spectre CROND[1478]: (root) CMD (run-parts /etc/cron.hourly) >Mar 20 10:01:01 spectre run-parts[1481]: (/etc/cron.hourly) starting 0anacron >Mar 20 10:01:01 spectre run-parts[1487]: (/etc/cron.hourly) finished 0anacron >Mar 20 10:01:01 spectre run-parts[1489]: (/etc/cron.hourly) starting mcelog.cron >Mar 20 10:01:01 spectre run-parts[1493]: (/etc/cron.hourly) finished mcelog.cron >Mar 20 10:01:01 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 20 10:01:01 spectre systemd[1474]: Stopping Default. >Mar 20 10:01:01 spectre systemd[1474]: Stopped target Default. >Mar 20 10:01:01 spectre systemd[1474]: Stopping Basic System. >Mar 20 10:01:01 spectre systemd[1474]: Stopped target Basic System. >Mar 20 10:01:01 spectre systemd[1474]: Stopping Paths. >Mar 20 10:01:01 spectre systemd[1474]: Stopped target Paths. >Mar 20 10:01:01 spectre systemd[1474]: Stopping Timers. >Mar 20 10:01:01 spectre systemd[1474]: Stopped target Timers. >Mar 20 10:01:01 spectre systemd[1474]: Stopping Sockets. >Mar 20 10:01:01 spectre systemd[1474]: Stopped target Sockets. >Mar 20 10:01:01 spectre systemd[1474]: Starting Shutdown. >Mar 20 10:01:01 spectre systemd[1474]: Reached target Shutdown. >Mar 20 10:01:01 spectre systemd[1474]: Starting Exit the Session... >Mar 20 10:01:02 spectre systemd[1474]: Received SIGRTMIN+24 from PID 1495 (kill). >Mar 20 10:01:02 spectre systemd[1476]: pam_unix(systemd-user:session): session closed for user root >Mar 20 10:01:02 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 20 10:01:02 spectre systemd[1]: Stopping user-0.slice. >Mar 20 10:01:02 spectre systemd[1]: Removed slice user-0.slice. >Mar 20 10:01:02 spectre systemd-logind[17665]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 20 10:01:02 spectre systemd-logind[17665]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 20 10:01:02 spectre systemd-logind[17665]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 20 10:01:02 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 20 10:01:02 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 20 10:01:02 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 20 10:01:02 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 20 10:01:02 spectre setroubleshoot[1500]: RunFaultServer(10) >Mar 20 10:01:02 spectre setroubleshoot[1500]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 20 10:01:02 spectre setroubleshoot[1500]: database version 3.0 compatible with current 3.0 version >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 20 10:01:02 spectre setroubleshoot[1500]: Number of Plugins = 46 >Mar 20 10:01:02 spectre setroubleshoot[1500]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 20 10:01:02 spectre setroubleshoot[1500]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 20 10:01:02 spectre setroubleshoot[1500]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 20 10:01:02 spectre setroubleshoot[1500]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 20 10:01:02 spectre setroubleshoot[1500]: dbus avc(node=spectre type=AVC msg=audit(1395324062.035:1985): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395324062.035:1985): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4f0940 a1=f0800 a2=0 a3=7f6aba682680 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395324062.035:1985): >) called: 1 Connections >Mar 20 10:01:02 spectre setroubleshoot[1500]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395324062.35:1985): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 20 10:01:02 spectre setroubleshoot[1500]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395324062.35:1985): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4f0940 a1=f0800 a2=0 a3=7f6aba682680 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 20 10:01:02 spectre setroubleshoot[1500]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395324062.35:1985): >Mar 20 10:01:02 spectre setroubleshoot[1500]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 20 10:01:02 spectre setroubleshoot[1500]: dbus avc(node=spectre type=AVC msg=audit(1395324062.035:1986): avc: denied { unmount } for pid=17665 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395324062.035:1986): arch=c000003e syscall=166 success=no exit=-13 a0=7f6abc4f0940 a1=2 a2=0 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395324062.035:1986): >) called: 1 Connections >Mar 20 10:01:02 spectre setroubleshoot[1500]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395324062.35:1986): avc: denied { unmount } for pid=17665 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 20 10:01:02 spectre setroubleshoot[1500]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395324062.35:1986): arch=c000003e syscall=166 success=no exit=-13 a0=7f6abc4f0940 a1=2 a2=0 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 20 10:01:02 spectre setroubleshoot[1500]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395324062.35:1986): >Mar 20 10:01:02 spectre setroubleshoot[1500]: dbus avc(node=spectre type=AVC msg=audit(1395324062.035:1987): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395324062.035:1987): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4f0940 a1=f0800 a2=1 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395324062.035:1987): >) called: 1 Connections >Mar 20 10:01:02 spectre setroubleshoot[1500]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395324062.35:1987): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 20 10:01:02 spectre setroubleshoot[1500]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395324062.35:1987): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4f0940 a1=f0800 a2=1 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 20 10:01:02 spectre setroubleshoot[1500]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395324062.35:1987): >Mar 20 10:01:02 spectre setroubleshoot[1500]: Plugin Exception restorecon_source >Mar 20 10:01:02 spectre setroubleshoot[1500]: Plugin Exception restorecon >Mar 20 10:01:02 spectre setroubleshoot[1500]: lookup_signature: found 1 matches with scores 1.00 >Mar 20 10:01:02 spectre setroubleshoot[1500]: signature found in database >Mar 20 10:01:02 spectre setroubleshoot[1500]: sending alert to all clients >Mar 20 10:01:02 spectre setroubleshoot[1500]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.restorecon_source previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.rsync_data previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.kernel_modules previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.catchall_boolean previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.automount_exec_config previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.bind_ports previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.allow_execheap previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.cvs_data previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.mozplugger_remove previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.catchall previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.sandbox_connect previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.httpd_write_content previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.wine previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.catchall_labels previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.samba_share previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.sys_module previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.qemu_blk_image previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.allow_execmod previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.file previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.sys_resource previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.mmap_zero previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.openvpn previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.mozplugger previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.setenforce previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.disable_ipv6 previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.dac_override previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.public_content previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.allow_anon_write previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.selinuxpolicy previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.associate previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.xen_image previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.chrome previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.leaks previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.sshd_root previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.qemu_file_image previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.mounton previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.allow_execstack previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.filesystem_associate previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.restorecon previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.swapfile previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.connect_ports previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.vbetool previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.device previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 20 10:01:02 spectre python[1500]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 20 10:01:02 spectre setroubleshoot[1500]: lookup_signature: found 1 matches with scores 1.00 >Mar 20 10:01:02 spectre setroubleshoot[1500]: signature found in database >Mar 20 10:01:02 spectre setroubleshoot[1500]: sending alert to all clients >Mar 20 10:01:02 spectre setroubleshoot[1500]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.restorecon_source previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.rsync_data previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.kernel_modules previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.catchall_boolean previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.automount_exec_config previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.bind_ports previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.allow_execheap previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.cvs_data previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.mozplugger_remove previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.catchall previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.sandbox_connect previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.httpd_write_content previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.wine previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.catchall_labels previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.samba_share previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.sys_module previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.qemu_blk_image previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.allow_execmod previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.file previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.sys_resource previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.mmap_zero previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.openvpn previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.mozplugger previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.setenforce previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.disable_ipv6 previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.dac_override previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.public_content previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.allow_anon_write previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.selinuxpolicy previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.associate previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.xen_image previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.chrome previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.leaks previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.sshd_root previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.qemu_file_image previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.mounton previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.allow_execstack previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.filesystem_associate previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.restorecon previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.swapfile previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.connect_ports previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.vbetool previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.device previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 20 10:01:02 spectre python[1500]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 20 10:01:02 spectre setroubleshoot[1500]: lookup_signature: found 1 matches with scores 1.00 >Mar 20 10:01:02 spectre setroubleshoot[1500]: signature found in database >Mar 20 10:01:02 spectre setroubleshoot[1500]: sending alert to all clients >Mar 20 10:01:02 spectre setroubleshoot[1500]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.restorecon_source previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.rsync_data previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.kernel_modules previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.catchall_boolean previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.automount_exec_config previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.bind_ports previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.allow_execheap previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.cvs_data previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.mozplugger_remove previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.catchall previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.sandbox_connect previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.httpd_write_content previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.wine previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.catchall_labels previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.samba_share previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.sys_module previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.qemu_blk_image previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.allow_execmod previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.file previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.sys_resource previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.mmap_zero previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.openvpn previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.mozplugger previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.setenforce previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.disable_ipv6 previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.dac_override previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.public_content previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.allow_anon_write previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.selinuxpolicy previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.associate previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.xen_image previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.chrome previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.leaks previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.sshd_root previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.qemu_file_image previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.mounton previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.allow_execstack previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.filesystem_associate previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.restorecon previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.swapfile previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.connect_ports previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.vbetool previously imported >Mar 20 10:01:02 spectre setroubleshoot[1500]: load_plugins() plugins.device previously imported >Mar 20 10:01:02 spectre python[1500]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 20 10:01:12 spectre setroubleshoot[1500]: received signal=14 >Mar 20 10:01:12 spectre setroubleshoot[1500]: KeyboardInterrupt in RunFaultServer >Mar 20 10:01:12 spectre setroubleshoot[1500]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 20 10:01:12 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 20 10:01:12 spectre dbus-daemon[637]: string index out of range >Mar 20 10:16:41 spectre systemd[1]: Starting dnf makecache... >Mar 20 10:16:42 spectre dnf[1527]: Config time: 0.006 >Mar 20 10:16:42 spectre dnf[1527]: cachedir: /var/cache/dnf/x86_64/21 >Mar 20 10:16:42 spectre dnf[1527]: dnf version: 0.4.18 >Mar 20 10:16:42 spectre dnf[1527]: Making cache files for all metadata files. >Mar 20 10:16:42 spectre dnf[1527]: rawhide: metadata will expire after 10739 seconds and will be refreshed now >Mar 20 10:16:42 spectre dnf[1527]: reviving: 'rawhide' can be revived. >Mar 20 10:16:43 spectre dnf[1527]: hawkey sack setup time: 0.971 >Mar 20 10:16:43 spectre dnf[1527]: Metadata cache created. >Mar 20 10:16:43 spectre systemd[1]: Started dnf makecache. >Mar 20 10:31:49 spectre sshd[1534]: Accepted publickey for dshea from 192.168.100.1 port 54586 ssh2: RSA 29:71:d3:be:dc:71:8e:0d:ef:a5:2f:ab:31:0c:82:d4 >Mar 20 10:31:49 spectre systemd[1]: Starting user-1000.slice. >Mar 20 10:31:49 spectre systemd[1]: Created slice user-1000.slice. >Mar 20 10:31:49 spectre systemd[1]: Starting User Manager for UID 1000... >Mar 20 10:31:49 spectre systemd[1]: Starting Session 85 of user dshea. >Mar 20 10:31:49 spectre systemd-logind[17665]: New session 85 of user dshea. >Mar 20 10:31:49 spectre systemd[1]: Started Session 85 of user dshea. >Mar 20 10:31:49 spectre systemd[1537]: pam_unix(systemd-user:session): session opened for user dshea by (uid=0) >Mar 20 10:31:49 spectre systemd[1537]: Starting Paths. >Mar 20 10:31:49 spectre systemd[1537]: Reached target Paths. >Mar 20 10:31:49 spectre systemd[1537]: Starting Timers. >Mar 20 10:31:49 spectre systemd[1537]: Reached target Timers. >Mar 20 10:31:49 spectre systemd[1537]: Starting Sockets. >Mar 20 10:31:49 spectre systemd[1537]: Reached target Sockets. >Mar 20 10:31:49 spectre systemd[1537]: Starting Basic System. >Mar 20 10:31:49 spectre systemd[1537]: Reached target Basic System. >Mar 20 10:31:49 spectre systemd[1537]: Starting Default. >Mar 20 10:31:49 spectre systemd[1537]: Reached target Default. >Mar 20 10:31:49 spectre systemd[1537]: Startup finished in 10ms. >Mar 20 10:31:49 spectre systemd[1]: Started User Manager for UID 1000. >Mar 20 10:31:49 spectre sshd[1534]: pam_unix(sshd:session): session opened for user dshea by (uid=0) >Mar 20 10:32:05 spectre sudo[1573]: dshea : TTY=pts/0 ; PWD=/home/dshea ; USER=root ; COMMAND=/bin/yum remove dbus-x11 >Mar 20 10:32:36 spectre yum[1574]: Erased: gnome-classic-session-3.11.91-1.fc21.noarch >Mar 20 10:32:37 spectre yum[1574]: Erased: system-config-printer-1.4.4-1.fc21.x86_64 >Mar 20 10:32:38 spectre yum[1574]: Erased: gnome-shell-extension-alternate-tab-3.11.91-1.fc21.noarch >Mar 20 10:32:39 spectre yum[1574]: Erased: gnome-shell-extension-apps-menu-3.11.91-1.fc21.noarch >Mar 20 10:32:39 spectre yum[1574]: Erased: gnome-shell-extension-launch-new-instance-3.11.91-1.fc21.noarch >Mar 20 10:32:40 spectre yum[1574]: Erased: gnome-shell-extension-places-menu-3.11.91-1.fc21.noarch >Mar 20 10:32:40 spectre yum[1574]: Erased: gnome-shell-extension-window-list-3.11.91-1.fc21.noarch >Mar 20 10:32:41 spectre yum[1574]: Erased: gnome-shell-extension-common-3.11.91-1.fc21.noarch >Mar 20 10:32:42 spectre yum[1574]: Erased: orca-3.11.91-1.fc21.noarch >Mar 20 10:32:46 spectre yum[1574]: Erased: ibus-typing-booster-1.2.10-1.fc21.noarch >Mar 20 10:32:48 spectre yum[1574]: Erased: gnome-initial-setup-3.10.1.1-5.fc21.x86_64 >Mar 20 10:32:49 spectre yum[1574]: Erased: pulseaudio-gdm-hooks-5.0-2.fc21.x86_64 >Mar 20 10:32:49 spectre systemd[1]: Stopping GNOME Display Manager... >Mar 20 10:32:49 spectre gdm[675]: GLib-GObject: g_object_ref: assertion 'object->ref_count > 0' failed >Mar 20 10:32:49 spectre systemd[1]: Stopped GNOME Display Manager. >Mar 20 10:32:49 spectre gnome-session[1106]: Window manager warning: Log level 16: gnome-shell: Fatal IO error 0 (Success) on X server :0. >Mar 20 10:32:49 spectre colord[1230]: device removed: xrandr-Virtual-0 >Mar 20 10:32:50 spectre gdm-launch-environment][820]: pam_unix(gdm-launch-environment:session): session closed for user gdm >Mar 20 10:32:50 spectre gnome-session[1106]: g_dbus_connection_real_closed: Remote peer vanished with error: Underlying GIOStream returned 0 bytes on an async read (g-io-error-quark, 0). Exiting. >Mar 20 10:32:50 spectre gnome-session[1106]: (gnome-settings-daemon:1169): Gdk-WARNING **: gnome-settings-daemon: Fatal IO error 11 (Resource temporarily unavailable) on X server :0. >Mar 20 10:32:50 spectre yum[1574]: Erased: 1:gdm-3.11.90-1.fc21.x86_64 >Mar 20 10:32:50 spectre dbus[637]: [system] Reloaded configuration >Mar 20 10:32:50 spectre dbus-daemon[637]: dbus[637]: [system] Reloaded configuration >Mar 20 10:32:50 spectre systemd[1]: Reloading. >Mar 20 10:32:50 spectre systemd-gpt-auto-generator[1606]: Out of memory. >Mar 20 10:32:50 spectre systemd[1600]: /usr/lib/systemd/system-generators/systemd-gpt-auto-generator failed with error code 1. >Mar 20 10:32:50 spectre systemd[1]: Configuration file /usr/lib/systemd/system/auditd.service is marked world-inaccessible. This has no effect as configuration data is accessible via APIs without restrictions. Proceeding anyway. >Mar 20 10:32:52 spectre yum[1574]: Erased: gnome-shell-3.11.91-2.fc21.x86_64 >Mar 20 10:32:53 spectre yum[1574]: Erased: 1:gdm-libs-3.11.90-1.fc21.x86_64 >Mar 20 10:32:54 spectre yum[1574]: Erased: mutter-wayland-3.11.91-1.fc21.x86_64 >Mar 20 10:32:55 spectre yum[1574]: Erased: gnome-session-xsession-3.11.4-2.fc21.x86_64 >Mar 20 10:32:55 spectre yum[1574]: Erased: gnome-session-3.11.4-2.fc21.x86_64 >Mar 20 10:32:57 spectre yum[1574]: Erased: mutter-3.11.91-1.fc21.x86_64 >Mar 20 10:32:58 spectre sshd[1623]: Accepted publickey for dshea from 192.168.100.1 port 54596 ssh2: RSA 29:71:d3:be:dc:71:8e:0d:ef:a5:2f:ab:31:0c:82:d4 >Mar 20 10:32:58 spectre systemd-logind[17665]: New session 86 of user dshea. >Mar 20 10:32:58 spectre systemd[1]: Starting Session 86 of user dshea. >Mar 20 10:32:58 spectre systemd[1]: Started Session 86 of user dshea. >Mar 20 10:32:58 spectre sshd[1623]: pam_unix(sshd:session): session opened for user dshea by (uid=0) >Mar 20 10:32:59 spectre yum[1574]: Erased: 1:control-center-3.11.91-1.fc21.x86_64 >Mar 20 10:33:38 spectre yum[1574]: Erased: ibus-hangul-1.4.2-7.fc21.x86_64 >Mar 20 10:33:39 spectre yum[1574]: Erased: ibus-libpinyin-1.6.92-2.fc21.x86_64 >Mar 20 10:33:44 spectre yum[1574]: Erased: ibus-chewing-1.4.10.1-1.fc21.x86_64 >Mar 20 10:33:45 spectre yum[1574]: Erased: ibus-kkc-1.5.19-1.fc21.x86_64 >Mar 20 10:33:46 spectre yum[1574]: Erased: ibus-rawcode-1.3.2-3.fc21.x86_64 >Mar 20 10:33:47 spectre yum[1574]: Erased: ibus-m17n-1.3.4-12.fc21.x86_64 >Mar 20 10:33:48 spectre yum[1574]: Erased: ibus-gtk2-1.5.6-1.fc21.x86_64 >Mar 20 10:33:49 spectre yum[1574]: Erased: ibus-setup-1.5.6-1.fc21.noarch >Mar 20 10:33:50 spectre yum[1574]: Erased: ibus-wayland-1.5.6-1.fc21.x86_64 >Mar 20 10:33:50 spectre yum[1574]: Erased: ibus-1.5.6-1.fc21.x86_64 >Mar 20 10:33:52 spectre yum[1574]: Erased: ibus-gtk3-1.5.6-1.fc21.x86_64 >Mar 20 10:33:53 spectre yum[1574]: Erased: gnome-packagekit-3.11.5-1.fc21.x86_64 >Mar 20 10:34:30 spectre yum[1574]: Erased: 1:dbus-x11-1.6.18-3.fc21.x86_64 >Mar 20 10:38:28 spectre sshd[4146]: Accepted publickey for dshea from 192.168.100.1 port 54647 ssh2: RSA 29:71:d3:be:dc:71:8e:0d:ef:a5:2f:ab:31:0c:82:d4 >Mar 20 10:38:28 spectre systemd-logind[17665]: New session 87 of user dshea. >Mar 20 10:38:28 spectre systemd[1]: Starting Session 87 of user dshea. >Mar 20 10:38:28 spectre systemd[1]: Started Session 87 of user dshea. >Mar 20 10:38:28 spectre sshd[4146]: pam_unix(sshd:session): session opened for user dshea by (uid=0) >Mar 20 11:01:02 spectre systemd[1]: Starting user-0.slice. >Mar 20 11:01:02 spectre systemd[1]: Created slice user-0.slice. >Mar 20 11:01:02 spectre systemd[1]: Starting User Manager for UID 0... >Mar 20 11:01:02 spectre systemd[1]: Starting Session 88 of user root. >Mar 20 11:01:02 spectre systemd[1]: Started Session 88 of user root. >Mar 20 11:01:02 spectre systemd[7091]: Starting Paths. >Mar 20 11:01:02 spectre systemd[7091]: Reached target Paths. >Mar 20 11:01:02 spectre systemd[7091]: Starting Timers. >Mar 20 11:01:02 spectre systemd[7091]: Reached target Timers. >Mar 20 11:01:02 spectre systemd[7091]: Starting Sockets. >Mar 20 11:01:02 spectre systemd[7091]: Reached target Sockets. >Mar 20 11:01:02 spectre systemd[7091]: Starting Basic System. >Mar 20 11:01:02 spectre systemd[7091]: Reached target Basic System. >Mar 20 11:01:02 spectre systemd[7091]: Starting Default. >Mar 20 11:01:02 spectre systemd[7091]: Reached target Default. >Mar 20 11:01:02 spectre systemd[7091]: Startup finished in 16ms. >Mar 20 11:01:02 spectre systemd[1]: Started User Manager for UID 0. >Mar 20 11:01:02 spectre systemd[7091]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 20 11:01:02 spectre CROND[7095]: (root) CMD (run-parts /etc/cron.hourly) >Mar 20 11:01:02 spectre run-parts[7098]: (/etc/cron.hourly) starting 0anacron >Mar 20 11:01:02 spectre run-parts[7104]: (/etc/cron.hourly) finished 0anacron >Mar 20 11:01:02 spectre run-parts[7106]: (/etc/cron.hourly) starting mcelog.cron >Mar 20 11:01:02 spectre run-parts[7110]: (/etc/cron.hourly) finished mcelog.cron >Mar 20 11:01:02 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 20 11:01:02 spectre systemd[7091]: Stopping Default. >Mar 20 11:01:02 spectre systemd[7091]: Stopped target Default. >Mar 20 11:01:02 spectre systemd[7091]: Stopping Basic System. >Mar 20 11:01:02 spectre systemd[7091]: Stopped target Basic System. >Mar 20 11:01:02 spectre systemd[7091]: Stopping Paths. >Mar 20 11:01:02 spectre systemd[7091]: Stopped target Paths. >Mar 20 11:01:02 spectre systemd[7091]: Stopping Timers. >Mar 20 11:01:02 spectre systemd[7091]: Stopped target Timers. >Mar 20 11:01:02 spectre systemd[7091]: Stopping Sockets. >Mar 20 11:01:02 spectre systemd[7091]: Stopped target Sockets. >Mar 20 11:01:02 spectre systemd[7091]: Starting Shutdown. >Mar 20 11:01:02 spectre systemd[7091]: Reached target Shutdown. >Mar 20 11:01:02 spectre systemd[7091]: Starting Exit the Session... >Mar 20 11:01:02 spectre systemd[7091]: Received SIGRTMIN+24 from PID 7112 (kill). >Mar 20 11:01:02 spectre systemd[7093]: pam_unix(systemd-user:session): session closed for user root >Mar 20 11:01:02 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 20 11:01:02 spectre systemd[1]: Stopping user-0.slice. >Mar 20 11:01:02 spectre systemd[1]: Removed slice user-0.slice. >Mar 20 11:01:02 spectre systemd-logind[17665]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 20 11:01:02 spectre systemd-logind[17665]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 20 11:01:02 spectre systemd-logind[17665]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 20 11:01:02 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 20 11:01:02 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 20 11:01:02 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 20 11:01:02 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 20 11:01:02 spectre setroubleshoot[7118]: RunFaultServer(10) >Mar 20 11:01:02 spectre setroubleshoot[7118]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 20 11:01:02 spectre setroubleshoot[7118]: database version 3.0 compatible with current 3.0 version >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 20 11:01:02 spectre setroubleshoot[7118]: Number of Plugins = 46 >Mar 20 11:01:02 spectre setroubleshoot[7118]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 20 11:01:02 spectre setroubleshoot[7118]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 20 11:01:02 spectre setroubleshoot[7118]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 20 11:01:02 spectre setroubleshoot[7118]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 20 11:01:02 spectre setroubleshoot[7118]: dbus avc(node=spectre type=AVC msg=audit(1395327662.180:2071): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395327662.180:2071): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4e5a00 a1=f0800 a2=0 a3=7f6aba682680 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395327662.180:2071): >) called: 1 Connections >Mar 20 11:01:02 spectre setroubleshoot[7118]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395327662.180:2071): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 20 11:01:02 spectre setroubleshoot[7118]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395327662.180:2071): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4e5a00 a1=f0800 a2=0 a3=7f6aba682680 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 20 11:01:02 spectre setroubleshoot[7118]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395327662.180:2071): >Mar 20 11:01:02 spectre setroubleshoot[7118]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 20 11:01:02 spectre setroubleshoot[7118]: dbus avc(node=spectre type=AVC msg=audit(1395327662.180:2072): avc: denied { unmount } for pid=17665 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395327662.180:2072): arch=c000003e syscall=166 success=no exit=-13 a0=7f6abc4e5a00 a1=2 a2=0 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395327662.180:2072): >) called: 1 Connections >Mar 20 11:01:02 spectre setroubleshoot[7118]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395327662.180:2072): avc: denied { unmount } for pid=17665 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 20 11:01:02 spectre setroubleshoot[7118]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395327662.180:2072): arch=c000003e syscall=166 success=no exit=-13 a0=7f6abc4e5a00 a1=2 a2=0 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 20 11:01:02 spectre setroubleshoot[7118]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395327662.180:2072): >Mar 20 11:01:02 spectre setroubleshoot[7118]: dbus avc(node=spectre type=AVC msg=audit(1395327662.180:2073): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395327662.180:2073): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4e5a00 a1=f0800 a2=1 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395327662.180:2073): >) called: 1 Connections >Mar 20 11:01:02 spectre setroubleshoot[7118]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395327662.180:2073): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 20 11:01:02 spectre setroubleshoot[7118]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395327662.180:2073): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4e5a00 a1=f0800 a2=1 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 20 11:01:02 spectre setroubleshoot[7118]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395327662.180:2073): >Mar 20 11:01:02 spectre setroubleshoot[7118]: Plugin Exception restorecon_source >Mar 20 11:01:02 spectre setroubleshoot[7118]: Plugin Exception restorecon >Mar 20 11:01:02 spectre setroubleshoot[7118]: lookup_signature: found 1 matches with scores 1.00 >Mar 20 11:01:02 spectre setroubleshoot[7118]: signature found in database >Mar 20 11:01:02 spectre setroubleshoot[7118]: sending alert to all clients >Mar 20 11:01:02 spectre setroubleshoot[7118]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.restorecon_source previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.rsync_data previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.kernel_modules previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.catchall_boolean previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.automount_exec_config previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.bind_ports previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.allow_execheap previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.cvs_data previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.mozplugger_remove previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.catchall previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.sandbox_connect previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.httpd_write_content previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.wine previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.catchall_labels previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.samba_share previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.sys_module previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.qemu_blk_image previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.allow_execmod previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.file previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.sys_resource previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.mmap_zero previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.openvpn previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.mozplugger previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.setenforce previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.disable_ipv6 previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.dac_override previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.public_content previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.allow_anon_write previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.selinuxpolicy previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.associate previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.xen_image previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.chrome previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.leaks previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.sshd_root previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.qemu_file_image previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.mounton previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.allow_execstack previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.filesystem_associate previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.restorecon previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.swapfile previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.connect_ports previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.vbetool previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.device previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 20 11:01:02 spectre python[7118]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 20 11:01:02 spectre setroubleshoot[7118]: lookup_signature: found 1 matches with scores 1.00 >Mar 20 11:01:02 spectre setroubleshoot[7118]: signature found in database >Mar 20 11:01:02 spectre setroubleshoot[7118]: sending alert to all clients >Mar 20 11:01:02 spectre setroubleshoot[7118]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.restorecon_source previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.rsync_data previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.kernel_modules previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.catchall_boolean previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.automount_exec_config previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.bind_ports previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.allow_execheap previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.cvs_data previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.mozplugger_remove previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.catchall previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.sandbox_connect previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.httpd_write_content previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.wine previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.catchall_labels previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.samba_share previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.sys_module previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.qemu_blk_image previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.allow_execmod previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.file previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.sys_resource previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.mmap_zero previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.openvpn previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.mozplugger previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.setenforce previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.disable_ipv6 previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.dac_override previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.public_content previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.allow_anon_write previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.selinuxpolicy previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.associate previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.xen_image previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.chrome previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.leaks previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.sshd_root previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.qemu_file_image previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.mounton previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.allow_execstack previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.filesystem_associate previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.restorecon previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.swapfile previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.connect_ports previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.vbetool previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.device previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 20 11:01:02 spectre python[7118]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 20 11:01:02 spectre setroubleshoot[7118]: lookup_signature: found 1 matches with scores 1.00 >Mar 20 11:01:02 spectre setroubleshoot[7118]: signature found in database >Mar 20 11:01:02 spectre setroubleshoot[7118]: sending alert to all clients >Mar 20 11:01:02 spectre setroubleshoot[7118]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.restorecon_source previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.rsync_data previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.kernel_modules previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.catchall_boolean previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.automount_exec_config previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.bind_ports previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.allow_execheap previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.cvs_data previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.mozplugger_remove previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.catchall previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.sandbox_connect previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.httpd_write_content previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.wine previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.catchall_labels previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.samba_share previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.sys_module previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.qemu_blk_image previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.allow_execmod previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.file previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.sys_resource previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.mmap_zero previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.openvpn previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.mozplugger previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.setenforce previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.disable_ipv6 previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.dac_override previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.public_content previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.allow_anon_write previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.selinuxpolicy previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.associate previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.xen_image previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.chrome previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.leaks previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.sshd_root previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.qemu_file_image previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.mounton previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.allow_execstack previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.filesystem_associate previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.restorecon previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.swapfile previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.connect_ports previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.vbetool previously imported >Mar 20 11:01:02 spectre setroubleshoot[7118]: load_plugins() plugins.device previously imported >Mar 20 11:01:02 spectre python[7118]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 20 11:01:12 spectre setroubleshoot[7118]: received signal=14 >Mar 20 11:01:12 spectre setroubleshoot[7118]: KeyboardInterrupt in RunFaultServer >Mar 20 11:01:12 spectre setroubleshoot[7118]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 20 11:01:12 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 20 11:01:12 spectre dbus-daemon[637]: string index out of range >Mar 20 11:16:44 spectre systemd[1]: Starting dnf makecache... >Mar 20 11:16:44 spectre dnf[7143]: Config time: 0.007 >Mar 20 11:16:44 spectre dnf[7143]: cachedir: /var/cache/dnf/x86_64/21 >Mar 20 11:16:44 spectre dnf[7143]: dnf version: 0.4.18 >Mar 20 11:16:44 spectre dnf[7143]: Making cache files for all metadata files. >Mar 20 11:16:44 spectre dnf[7143]: Metadata cache refreshed recently. >Mar 20 11:16:44 spectre systemd[1]: Started dnf makecache. >Mar 20 12:01:01 spectre systemd[1]: Starting user-0.slice. >Mar 20 12:01:01 spectre systemd[1]: Created slice user-0.slice. >Mar 20 12:01:01 spectre systemd[1]: Starting User Manager for UID 0... >Mar 20 12:01:01 spectre systemd[1]: Starting Session 89 of user root. >Mar 20 12:01:01 spectre systemd[1]: Started Session 89 of user root. >Mar 20 12:01:01 spectre systemd[7152]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 20 12:01:01 spectre systemd[7152]: Starting Paths. >Mar 20 12:01:01 spectre systemd[7152]: Reached target Paths. >Mar 20 12:01:01 spectre systemd[7152]: Starting Timers. >Mar 20 12:01:01 spectre systemd[7152]: Reached target Timers. >Mar 20 12:01:01 spectre systemd[7152]: Starting Sockets. >Mar 20 12:01:01 spectre systemd[7152]: Reached target Sockets. >Mar 20 12:01:01 spectre systemd[7152]: Starting Basic System. >Mar 20 12:01:01 spectre systemd[7152]: Reached target Basic System. >Mar 20 12:01:01 spectre systemd[7152]: Starting Default. >Mar 20 12:01:01 spectre systemd[7152]: Reached target Default. >Mar 20 12:01:01 spectre systemd[7152]: Startup finished in 12ms. >Mar 20 12:01:01 spectre systemd[1]: Started User Manager for UID 0. >Mar 20 12:01:01 spectre CROND[7156]: (root) CMD (run-parts /etc/cron.hourly) >Mar 20 12:01:01 spectre run-parts[7159]: (/etc/cron.hourly) starting 0anacron >Mar 20 12:01:01 spectre run-parts[7165]: (/etc/cron.hourly) finished 0anacron >Mar 20 12:01:01 spectre run-parts[7167]: (/etc/cron.hourly) starting mcelog.cron >Mar 20 12:01:01 spectre run-parts[7171]: (/etc/cron.hourly) finished mcelog.cron >Mar 20 12:01:01 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 20 12:01:01 spectre systemd[7152]: Stopping Default. >Mar 20 12:01:01 spectre systemd[7152]: Stopped target Default. >Mar 20 12:01:01 spectre systemd[7152]: Stopping Basic System. >Mar 20 12:01:01 spectre systemd[7152]: Stopped target Basic System. >Mar 20 12:01:01 spectre systemd[7152]: Stopping Paths. >Mar 20 12:01:01 spectre systemd[7152]: Stopped target Paths. >Mar 20 12:01:01 spectre systemd[7152]: Stopping Timers. >Mar 20 12:01:01 spectre systemd[7152]: Stopped target Timers. >Mar 20 12:01:01 spectre systemd[7152]: Stopping Sockets. >Mar 20 12:01:01 spectre systemd[7152]: Stopped target Sockets. >Mar 20 12:01:01 spectre systemd[7152]: Starting Shutdown. >Mar 20 12:01:01 spectre systemd[7152]: Reached target Shutdown. >Mar 20 12:01:01 spectre systemd[7152]: Starting Exit the Session... >Mar 20 12:01:01 spectre systemd[7152]: Received SIGRTMIN+24 from PID 7174 (kill). >Mar 20 12:01:01 spectre systemd[7154]: pam_unix(systemd-user:session): session closed for user root >Mar 20 12:01:01 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 20 12:01:01 spectre systemd[1]: Stopping user-0.slice. >Mar 20 12:01:01 spectre systemd[1]: Removed slice user-0.slice. >Mar 20 12:01:01 spectre systemd-logind[17665]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 20 12:01:01 spectre systemd-logind[17665]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 20 12:01:01 spectre systemd-logind[17665]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 20 12:01:01 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 20 12:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 20 12:01:01 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 20 12:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 20 12:01:01 spectre setroubleshoot[7179]: RunFaultServer(10) >Mar 20 12:01:01 spectre setroubleshoot[7179]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 20 12:01:01 spectre setroubleshoot[7179]: database version 3.0 compatible with current 3.0 version >Mar 20 12:01:01 spectre setroubleshoot[7179]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 20 12:01:01 spectre setroubleshoot[7179]: Number of Plugins = 46 >Mar 20 12:01:01 spectre setroubleshoot[7179]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 20 12:01:01 spectre setroubleshoot[7179]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 20 12:01:01 spectre setroubleshoot[7179]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 20 12:01:01 spectre setroubleshoot[7179]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 20 12:01:01 spectre setroubleshoot[7179]: dbus avc(node=spectre type=AVC msg=audit(1395331261.377:2088): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395331261.377:2088): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4e4b50 a1=f0800 a2=0 a3=7f6aba682680 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395331261.377:2088): >) called: 1 Connections >Mar 20 12:01:01 spectre setroubleshoot[7179]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395331261.377:2088): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 20 12:01:01 spectre setroubleshoot[7179]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395331261.377:2088): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4e4b50 a1=f0800 a2=0 a3=7f6aba682680 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 20 12:01:01 spectre setroubleshoot[7179]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395331261.377:2088): >Mar 20 12:01:01 spectre setroubleshoot[7179]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 20 12:01:01 spectre setroubleshoot[7179]: dbus avc(node=spectre type=AVC msg=audit(1395331261.377:2089): avc: denied { unmount } for pid=17665 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395331261.377:2089): arch=c000003e syscall=166 success=no exit=-13 a0=7f6abc4e4b50 a1=2 a2=0 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395331261.377:2089): >) called: 1 Connections >Mar 20 12:01:01 spectre setroubleshoot[7179]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395331261.377:2089): avc: denied { unmount } for pid=17665 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 20 12:01:01 spectre setroubleshoot[7179]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395331261.377:2089): arch=c000003e syscall=166 success=no exit=-13 a0=7f6abc4e4b50 a1=2 a2=0 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 20 12:01:01 spectre setroubleshoot[7179]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395331261.377:2089): >Mar 20 12:01:01 spectre setroubleshoot[7179]: dbus avc(node=spectre type=AVC msg=audit(1395331261.377:2090): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395331261.377:2090): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4e4b50 a1=f0800 a2=1 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395331261.377:2090): >) called: 1 Connections >Mar 20 12:01:01 spectre setroubleshoot[7179]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395331261.377:2090): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 20 12:01:01 spectre setroubleshoot[7179]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395331261.377:2090): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4e4b50 a1=f0800 a2=1 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 20 12:01:01 spectre setroubleshoot[7179]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395331261.377:2090): >Mar 20 12:01:01 spectre setroubleshoot[7179]: Plugin Exception restorecon_source >Mar 20 12:01:01 spectre setroubleshoot[7179]: Plugin Exception restorecon >Mar 20 12:01:01 spectre setroubleshoot[7179]: lookup_signature: found 1 matches with scores 1.00 >Mar 20 12:01:01 spectre setroubleshoot[7179]: signature found in database >Mar 20 12:01:01 spectre setroubleshoot[7179]: sending alert to all clients >Mar 20 12:01:01 spectre setroubleshoot[7179]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 20 12:01:01 spectre setroubleshoot[7179]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 20 12:01:01 spectre setroubleshoot[7179]: load_plugins() plugins.restorecon_source previously imported >Mar 20 12:01:01 spectre setroubleshoot[7179]: load_plugins() plugins.rsync_data previously imported >Mar 20 12:01:01 spectre setroubleshoot[7179]: load_plugins() plugins.kernel_modules previously imported >Mar 20 12:01:01 spectre setroubleshoot[7179]: load_plugins() plugins.catchall_boolean previously imported >Mar 20 12:01:01 spectre setroubleshoot[7179]: load_plugins() plugins.automount_exec_config previously imported >Mar 20 12:01:01 spectre setroubleshoot[7179]: load_plugins() plugins.bind_ports previously imported >Mar 20 12:01:01 spectre setroubleshoot[7179]: load_plugins() plugins.allow_execheap previously imported >Mar 20 12:01:01 spectre setroubleshoot[7179]: load_plugins() plugins.cvs_data previously imported >Mar 20 12:01:01 spectre setroubleshoot[7179]: load_plugins() plugins.mozplugger_remove previously imported >Mar 20 12:01:01 spectre setroubleshoot[7179]: load_plugins() plugins.catchall previously imported >Mar 20 12:01:01 spectre setroubleshoot[7179]: load_plugins() plugins.sandbox_connect previously imported >Mar 20 12:01:01 spectre setroubleshoot[7179]: load_plugins() plugins.httpd_write_content previously imported >Mar 20 12:01:01 spectre setroubleshoot[7179]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 20 12:01:01 spectre setroubleshoot[7179]: load_plugins() plugins.wine previously imported >Mar 20 12:01:01 spectre setroubleshoot[7179]: load_plugins() plugins.catchall_labels previously imported >Mar 20 12:01:01 spectre setroubleshoot[7179]: load_plugins() plugins.samba_share previously imported >Mar 20 12:01:01 spectre setroubleshoot[7179]: load_plugins() plugins.sys_module previously imported >Mar 20 12:01:01 spectre setroubleshoot[7179]: load_plugins() plugins.qemu_blk_image previously imported >Mar 20 12:01:01 spectre setroubleshoot[7179]: load_plugins() plugins.allow_execmod previously imported >Mar 20 12:01:01 spectre setroubleshoot[7179]: load_plugins() plugins.file previously imported >Mar 20 12:01:01 spectre setroubleshoot[7179]: load_plugins() plugins.sys_resource previously imported >Mar 20 12:01:01 spectre setroubleshoot[7179]: load_plugins() plugins.mmap_zero previously imported >Mar 20 12:01:01 spectre setroubleshoot[7179]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 20 12:01:01 spectre setroubleshoot[7179]: load_plugins() plugins.openvpn previously imported >Mar 20 12:01:01 spectre setroubleshoot[7179]: load_plugins() plugins.mozplugger previously imported >Mar 20 12:01:01 spectre setroubleshoot[7179]: load_plugins() plugins.setenforce previously imported >Mar 20 12:01:01 spectre setroubleshoot[7179]: load_plugins() plugins.disable_ipv6 previously imported >Mar 20 12:01:01 spectre setroubleshoot[7179]: load_plugins() plugins.dac_override previously imported >Mar 20 12:01:01 spectre setroubleshoot[7179]: load_plugins() plugins.public_content previously imported >Mar 20 12:01:01 spectre setroubleshoot[7179]: load_plugins() plugins.allow_anon_write previously imported >Mar 20 12:01:01 spectre setroubleshoot[7179]: load_plugins() plugins.selinuxpolicy previously imported >Mar 20 12:01:01 spectre setroubleshoot[7179]: load_plugins() plugins.associate previously imported >Mar 20 12:01:01 spectre setroubleshoot[7179]: load_plugins() plugins.xen_image previously imported >Mar 20 12:01:01 spectre setroubleshoot[7179]: load_plugins() plugins.chrome previously imported >Mar 20 12:01:01 spectre setroubleshoot[7179]: load_plugins() plugins.leaks previously imported >Mar 20 12:01:01 spectre setroubleshoot[7179]: load_plugins() plugins.sshd_root previously imported >Mar 20 12:01:01 spectre setroubleshoot[7179]: load_plugins() plugins.qemu_file_image previously imported >Mar 20 12:01:01 spectre setroubleshoot[7179]: load_plugins() plugins.mounton previously imported >Mar 20 12:01:01 spectre setroubleshoot[7179]: load_plugins() plugins.allow_execstack previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.filesystem_associate previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.restorecon previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.swapfile previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.connect_ports previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.vbetool previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.device previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 20 12:01:02 spectre python[7179]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 20 12:01:02 spectre setroubleshoot[7179]: lookup_signature: found 1 matches with scores 1.00 >Mar 20 12:01:02 spectre setroubleshoot[7179]: signature found in database >Mar 20 12:01:02 spectre setroubleshoot[7179]: sending alert to all clients >Mar 20 12:01:02 spectre setroubleshoot[7179]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.restorecon_source previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.rsync_data previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.kernel_modules previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.catchall_boolean previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.automount_exec_config previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.bind_ports previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.allow_execheap previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.cvs_data previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.mozplugger_remove previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.catchall previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.sandbox_connect previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.httpd_write_content previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.wine previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.catchall_labels previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.samba_share previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.sys_module previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.qemu_blk_image previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.allow_execmod previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.file previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.sys_resource previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.mmap_zero previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.openvpn previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.mozplugger previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.setenforce previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.disable_ipv6 previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.dac_override previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.public_content previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.allow_anon_write previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.selinuxpolicy previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.associate previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.xen_image previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.chrome previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.leaks previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.sshd_root previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.qemu_file_image previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.mounton previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.allow_execstack previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.filesystem_associate previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.restorecon previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.swapfile previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.connect_ports previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.vbetool previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.device previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 20 12:01:02 spectre python[7179]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 20 12:01:02 spectre setroubleshoot[7179]: lookup_signature: found 1 matches with scores 1.00 >Mar 20 12:01:02 spectre setroubleshoot[7179]: signature found in database >Mar 20 12:01:02 spectre setroubleshoot[7179]: sending alert to all clients >Mar 20 12:01:02 spectre setroubleshoot[7179]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.restorecon_source previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.rsync_data previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.kernel_modules previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.catchall_boolean previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.automount_exec_config previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.bind_ports previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.allow_execheap previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.cvs_data previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.mozplugger_remove previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.catchall previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.sandbox_connect previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.httpd_write_content previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.wine previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.catchall_labels previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.samba_share previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.sys_module previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.qemu_blk_image previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.allow_execmod previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.file previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.sys_resource previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.mmap_zero previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.openvpn previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.mozplugger previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.setenforce previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.disable_ipv6 previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.dac_override previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.public_content previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.allow_anon_write previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.selinuxpolicy previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.associate previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.xen_image previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.chrome previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.leaks previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.sshd_root previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.qemu_file_image previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.mounton previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.allow_execstack previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.filesystem_associate previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.restorecon previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.swapfile previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.connect_ports previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.vbetool previously imported >Mar 20 12:01:02 spectre setroubleshoot[7179]: load_plugins() plugins.device previously imported >Mar 20 12:01:02 spectre python[7179]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 20 12:01:11 spectre setroubleshoot[7179]: received signal=14 >Mar 20 12:01:11 spectre setroubleshoot[7179]: KeyboardInterrupt in RunFaultServer >Mar 20 12:01:11 spectre setroubleshoot[7179]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 20 12:01:11 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 20 12:01:11 spectre dbus-daemon[637]: string index out of range >Mar 20 12:16:44 spectre systemd[1]: Starting dnf makecache... >Mar 20 12:16:44 spectre dnf[7206]: Config time: 0.006 >Mar 20 12:16:44 spectre dnf[7206]: cachedir: /var/cache/dnf/x86_64/21 >Mar 20 12:16:44 spectre dnf[7206]: dnf version: 0.4.18 >Mar 20 12:16:44 spectre dnf[7206]: Making cache files for all metadata files. >Mar 20 12:16:44 spectre dnf[7206]: Metadata cache refreshed recently. >Mar 20 12:16:44 spectre systemd[1]: Started dnf makecache. >Mar 20 13:01:01 spectre systemd[1]: Starting user-0.slice. >Mar 20 13:01:01 spectre systemd[1]: Created slice user-0.slice. >Mar 20 13:01:01 spectre systemd[1]: Starting User Manager for UID 0... >Mar 20 13:01:01 spectre systemd[1]: Starting Session 90 of user root. >Mar 20 13:01:01 spectre systemd[1]: Started Session 90 of user root. >Mar 20 13:01:01 spectre systemd[7213]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 20 13:01:01 spectre systemd[7213]: Starting Paths. >Mar 20 13:01:01 spectre systemd[7213]: Reached target Paths. >Mar 20 13:01:01 spectre systemd[7213]: Starting Timers. >Mar 20 13:01:01 spectre systemd[7213]: Reached target Timers. >Mar 20 13:01:01 spectre systemd[7213]: Starting Sockets. >Mar 20 13:01:01 spectre systemd[7213]: Reached target Sockets. >Mar 20 13:01:01 spectre systemd[7213]: Starting Basic System. >Mar 20 13:01:01 spectre systemd[7213]: Reached target Basic System. >Mar 20 13:01:01 spectre systemd[7213]: Starting Default. >Mar 20 13:01:01 spectre systemd[7213]: Reached target Default. >Mar 20 13:01:01 spectre systemd[7213]: Startup finished in 10ms. >Mar 20 13:01:01 spectre systemd[1]: Started User Manager for UID 0. >Mar 20 13:01:01 spectre CROND[7217]: (root) CMD (run-parts /etc/cron.hourly) >Mar 20 13:01:01 spectre run-parts[7220]: (/etc/cron.hourly) starting 0anacron >Mar 20 13:01:01 spectre run-parts[7226]: (/etc/cron.hourly) finished 0anacron >Mar 20 13:01:01 spectre run-parts[7228]: (/etc/cron.hourly) starting mcelog.cron >Mar 20 13:01:01 spectre run-parts[7232]: (/etc/cron.hourly) finished mcelog.cron >Mar 20 13:01:01 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 20 13:01:01 spectre systemd[7213]: Stopping Default. >Mar 20 13:01:01 spectre systemd[7213]: Stopped target Default. >Mar 20 13:01:01 spectre systemd[7213]: Stopping Basic System. >Mar 20 13:01:01 spectre systemd[7213]: Stopped target Basic System. >Mar 20 13:01:01 spectre systemd[7213]: Stopping Paths. >Mar 20 13:01:01 spectre systemd[7213]: Stopped target Paths. >Mar 20 13:01:01 spectre systemd[7213]: Stopping Timers. >Mar 20 13:01:01 spectre systemd[7213]: Stopped target Timers. >Mar 20 13:01:01 spectre systemd[7213]: Stopping Sockets. >Mar 20 13:01:01 spectre systemd[7213]: Stopped target Sockets. >Mar 20 13:01:01 spectre systemd[7213]: Starting Shutdown. >Mar 20 13:01:01 spectre systemd[7213]: Reached target Shutdown. >Mar 20 13:01:01 spectre systemd[7213]: Starting Exit the Session... >Mar 20 13:01:01 spectre systemd[7213]: Received SIGRTMIN+24 from PID 7234 (kill). >Mar 20 13:01:01 spectre systemd[7215]: pam_unix(systemd-user:session): session closed for user root >Mar 20 13:01:01 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 20 13:01:01 spectre systemd[1]: Stopping user-0.slice. >Mar 20 13:01:01 spectre systemd[1]: Removed slice user-0.slice. >Mar 20 13:01:01 spectre systemd-logind[17665]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 20 13:01:01 spectre systemd-logind[17665]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 20 13:01:01 spectre systemd-logind[17665]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 20 13:01:01 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 20 13:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 20 13:01:01 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 20 13:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 20 13:01:01 spectre setroubleshoot[7240]: RunFaultServer(10) >Mar 20 13:01:01 spectre setroubleshoot[7240]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 20 13:01:01 spectre setroubleshoot[7240]: database version 3.0 compatible with current 3.0 version >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 20 13:01:02 spectre setroubleshoot[7240]: Number of Plugins = 46 >Mar 20 13:01:02 spectre setroubleshoot[7240]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 20 13:01:02 spectre setroubleshoot[7240]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 20 13:01:02 spectre setroubleshoot[7240]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 20 13:01:02 spectre setroubleshoot[7240]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 20 13:01:02 spectre setroubleshoot[7240]: dbus avc(node=spectre type=AVC msg=audit(1395334861.520:2105): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395334861.520:2105): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4e6330 a1=f0800 a2=0 a3=fffffffffffffcb8 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395334861.520:2105): >) called: 1 Connections >Mar 20 13:01:02 spectre setroubleshoot[7240]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395334861.520:2105): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 20 13:01:02 spectre setroubleshoot[7240]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395334861.520:2105): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4e6330 a1=f0800 a2=0 a3=fffffffffffffcb8 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 20 13:01:02 spectre setroubleshoot[7240]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395334861.520:2105): >Mar 20 13:01:02 spectre setroubleshoot[7240]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 20 13:01:02 spectre setroubleshoot[7240]: dbus avc(node=spectre type=AVC msg=audit(1395334861.520:2106): avc: denied { unmount } for pid=17665 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395334861.520:2106): arch=c000003e syscall=166 success=no exit=-13 a0=7f6abc4e6330 a1=2 a2=0 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395334861.520:2106): >) called: 1 Connections >Mar 20 13:01:02 spectre setroubleshoot[7240]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395334861.520:2106): avc: denied { unmount } for pid=17665 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 20 13:01:02 spectre setroubleshoot[7240]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395334861.520:2106): arch=c000003e syscall=166 success=no exit=-13 a0=7f6abc4e6330 a1=2 a2=0 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 20 13:01:02 spectre setroubleshoot[7240]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395334861.520:2106): >Mar 20 13:01:02 spectre setroubleshoot[7240]: dbus avc(node=spectre type=AVC msg=audit(1395334861.520:2107): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395334861.520:2107): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4e6330 a1=f0800 a2=1 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395334861.520:2107): >) called: 1 Connections >Mar 20 13:01:02 spectre setroubleshoot[7240]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395334861.520:2107): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 20 13:01:02 spectre setroubleshoot[7240]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395334861.520:2107): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4e6330 a1=f0800 a2=1 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 20 13:01:02 spectre setroubleshoot[7240]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395334861.520:2107): >Mar 20 13:01:02 spectre setroubleshoot[7240]: Plugin Exception restorecon_source >Mar 20 13:01:02 spectre setroubleshoot[7240]: Plugin Exception restorecon >Mar 20 13:01:02 spectre setroubleshoot[7240]: lookup_signature: found 1 matches with scores 1.00 >Mar 20 13:01:02 spectre setroubleshoot[7240]: signature found in database >Mar 20 13:01:02 spectre setroubleshoot[7240]: sending alert to all clients >Mar 20 13:01:02 spectre setroubleshoot[7240]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.restorecon_source previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.rsync_data previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.kernel_modules previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.catchall_boolean previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.automount_exec_config previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.bind_ports previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.allow_execheap previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.cvs_data previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.mozplugger_remove previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.catchall previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.sandbox_connect previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.httpd_write_content previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.wine previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.catchall_labels previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.samba_share previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.sys_module previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.qemu_blk_image previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.allow_execmod previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.file previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.sys_resource previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.mmap_zero previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.openvpn previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.mozplugger previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.setenforce previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.disable_ipv6 previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.dac_override previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.public_content previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.allow_anon_write previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.selinuxpolicy previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.associate previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.xen_image previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.chrome previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.leaks previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.sshd_root previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.qemu_file_image previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.mounton previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.allow_execstack previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.filesystem_associate previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.restorecon previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.swapfile previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.connect_ports previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.vbetool previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.device previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 20 13:01:02 spectre python[7240]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 20 13:01:02 spectre setroubleshoot[7240]: lookup_signature: found 1 matches with scores 1.00 >Mar 20 13:01:02 spectre setroubleshoot[7240]: signature found in database >Mar 20 13:01:02 spectre setroubleshoot[7240]: sending alert to all clients >Mar 20 13:01:02 spectre setroubleshoot[7240]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.restorecon_source previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.rsync_data previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.kernel_modules previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.catchall_boolean previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.automount_exec_config previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.bind_ports previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.allow_execheap previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.cvs_data previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.mozplugger_remove previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.catchall previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.sandbox_connect previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.httpd_write_content previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.wine previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.catchall_labels previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.samba_share previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.sys_module previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.qemu_blk_image previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.allow_execmod previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.file previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.sys_resource previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.mmap_zero previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.openvpn previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.mozplugger previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.setenforce previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.disable_ipv6 previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.dac_override previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.public_content previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.allow_anon_write previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.selinuxpolicy previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.associate previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.xen_image previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.chrome previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.leaks previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.sshd_root previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.qemu_file_image previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.mounton previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.allow_execstack previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.filesystem_associate previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.restorecon previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.swapfile previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.connect_ports previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.vbetool previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.device previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 20 13:01:02 spectre python[7240]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 20 13:01:02 spectre setroubleshoot[7240]: lookup_signature: found 1 matches with scores 1.00 >Mar 20 13:01:02 spectre setroubleshoot[7240]: signature found in database >Mar 20 13:01:02 spectre setroubleshoot[7240]: sending alert to all clients >Mar 20 13:01:02 spectre setroubleshoot[7240]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.restorecon_source previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.rsync_data previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.kernel_modules previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.catchall_boolean previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.automount_exec_config previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.bind_ports previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.allow_execheap previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.cvs_data previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.mozplugger_remove previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.catchall previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.sandbox_connect previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.httpd_write_content previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.wine previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.catchall_labels previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.samba_share previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.sys_module previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.qemu_blk_image previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.allow_execmod previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.file previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.sys_resource previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.mmap_zero previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.openvpn previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.mozplugger previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.setenforce previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.disable_ipv6 previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.dac_override previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.public_content previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.allow_anon_write previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.selinuxpolicy previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.associate previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.xen_image previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.chrome previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.leaks previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.sshd_root previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.qemu_file_image previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.mounton previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.allow_execstack previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.filesystem_associate previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.restorecon previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.swapfile previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.connect_ports previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.vbetool previously imported >Mar 20 13:01:02 spectre setroubleshoot[7240]: load_plugins() plugins.device previously imported >Mar 20 13:01:02 spectre python[7240]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 20 13:01:12 spectre setroubleshoot[7240]: received signal=14 >Mar 20 13:01:12 spectre setroubleshoot[7240]: KeyboardInterrupt in RunFaultServer >Mar 20 13:01:12 spectre setroubleshoot[7240]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 20 13:01:12 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 20 13:01:12 spectre dbus-daemon[637]: string index out of range >Mar 20 13:16:46 spectre systemd[1]: Starting dnf makecache... >Mar 20 13:16:46 spectre dnf[7266]: Config time: 0.006 >Mar 20 13:16:46 spectre dnf[7266]: cachedir: /var/cache/dnf/x86_64/21 >Mar 20 13:16:46 spectre dnf[7266]: dnf version: 0.4.18 >Mar 20 13:16:46 spectre dnf[7266]: Making cache files for all metadata files. >Mar 20 13:16:46 spectre dnf[7266]: rawhide: will expire after 32396 seconds. >Mar 20 13:16:46 spectre dnf[7266]: repo: using cache for: rawhide >Mar 20 13:16:46 spectre dnf[7266]: hawkey sack setup time: 0.255 >Mar 20 13:16:46 spectre dnf[7266]: Metadata cache created. >Mar 20 13:16:46 spectre systemd[1]: Started dnf makecache. >Mar 20 13:48:27 spectre sshd[7272]: Accepted publickey for dshea from 192.168.100.1 port 55128 ssh2: RSA 29:71:d3:be:dc:71:8e:0d:ef:a5:2f:ab:31:0c:82:d4 >Mar 20 13:48:27 spectre sshd[7272]: pam_unix(sshd:session): session opened for user dshea by (uid=0) >Mar 20 13:48:27 spectre systemd-logind[17665]: New session 91 of user dshea. >Mar 20 13:48:27 spectre systemd[1]: Starting Session 91 of user dshea. >Mar 20 13:48:27 spectre systemd[1]: Started Session 91 of user dshea. >Mar 20 14:01:01 spectre systemd[1]: Starting user-0.slice. >Mar 20 14:01:01 spectre systemd[1]: Created slice user-0.slice. >Mar 20 14:01:01 spectre systemd[1]: Starting User Manager for UID 0... >Mar 20 14:01:01 spectre systemd[1]: Starting Session 92 of user root. >Mar 20 14:01:01 spectre systemd[1]: Started Session 92 of user root. >Mar 20 14:01:01 spectre systemd[7413]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 20 14:01:01 spectre systemd[7413]: Starting Paths. >Mar 20 14:01:01 spectre systemd[7413]: Reached target Paths. >Mar 20 14:01:01 spectre systemd[7413]: Starting Timers. >Mar 20 14:01:01 spectre systemd[7413]: Reached target Timers. >Mar 20 14:01:01 spectre systemd[7413]: Starting Sockets. >Mar 20 14:01:01 spectre systemd[7413]: Reached target Sockets. >Mar 20 14:01:01 spectre systemd[7413]: Starting Basic System. >Mar 20 14:01:01 spectre systemd[7413]: Reached target Basic System. >Mar 20 14:01:01 spectre systemd[7413]: Starting Default. >Mar 20 14:01:01 spectre systemd[7413]: Reached target Default. >Mar 20 14:01:01 spectre systemd[7413]: Startup finished in 11ms. >Mar 20 14:01:01 spectre systemd[1]: Started User Manager for UID 0. >Mar 20 14:01:01 spectre CROND[7417]: (root) CMD (run-parts /etc/cron.hourly) >Mar 20 14:01:01 spectre run-parts[7420]: (/etc/cron.hourly) starting 0anacron >Mar 20 14:01:01 spectre run-parts[7426]: (/etc/cron.hourly) finished 0anacron >Mar 20 14:01:01 spectre run-parts[7428]: (/etc/cron.hourly) starting mcelog.cron >Mar 20 14:01:01 spectre run-parts[7432]: (/etc/cron.hourly) finished mcelog.cron >Mar 20 14:01:01 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 20 14:01:01 spectre systemd[7413]: Stopping Default. >Mar 20 14:01:01 spectre systemd[7413]: Stopped target Default. >Mar 20 14:01:01 spectre systemd[7413]: Stopping Basic System. >Mar 20 14:01:01 spectre systemd[7413]: Stopped target Basic System. >Mar 20 14:01:01 spectre systemd[7413]: Stopping Paths. >Mar 20 14:01:01 spectre systemd[7413]: Stopped target Paths. >Mar 20 14:01:01 spectre systemd[7413]: Stopping Timers. >Mar 20 14:01:01 spectre systemd[7413]: Stopped target Timers. >Mar 20 14:01:01 spectre systemd[7413]: Stopping Sockets. >Mar 20 14:01:01 spectre systemd[7413]: Stopped target Sockets. >Mar 20 14:01:01 spectre systemd[7413]: Starting Shutdown. >Mar 20 14:01:01 spectre systemd[7413]: Reached target Shutdown. >Mar 20 14:01:01 spectre systemd[7413]: Starting Exit the Session... >Mar 20 14:01:01 spectre systemd[7413]: Received SIGRTMIN+24 from PID 7434 (kill). >Mar 20 14:01:01 spectre systemd[7415]: pam_unix(systemd-user:session): session closed for user root >Mar 20 14:01:01 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 20 14:01:01 spectre systemd[1]: Stopping user-0.slice. >Mar 20 14:01:01 spectre systemd[1]: Removed slice user-0.slice. >Mar 20 14:01:01 spectre systemd-logind[17665]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 20 14:01:01 spectre systemd-logind[17665]: Failed to unmount user runtime directory /run/user/0: Permission denied >Mar 20 14:01:01 spectre systemd-logind[17665]: Failed to remove runtime directory /run/user/0: Permission denied >Mar 20 14:01:01 spectre dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 20 14:01:01 spectre dbus-daemon[637]: dbus[637]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) >Mar 20 14:01:02 spectre dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 20 14:01:02 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' >Mar 20 14:01:02 spectre setroubleshoot[7440]: RunFaultServer(10) >Mar 20 14:01:02 spectre setroubleshoot[7440]: created new database: name=setroubleshoot, friendly_name=Audit Listener, filepath=/var/lib/setroubleshoot/setroubleshoot_database.xml >Mar 20 14:01:02 spectre setroubleshoot[7440]: database version 3.0 compatible with current 3.0 version >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 20 14:01:02 spectre setroubleshoot[7440]: Number of Plugins = 46 >Mar 20 14:01:02 spectre setroubleshoot[7440]: parse_socket_address_list: input='{unix}/var/run/setroubleshoot/setroubleshoot_server' >Mar 20 14:01:02 spectre setroubleshoot[7440]: parse_socket_address_list: {unix}/var/run/setroubleshoot/setroubleshoot_server --> {unix}/var/run/setroubleshoot/setroubleshoot_server socket=None >Mar 20 14:01:02 spectre setroubleshoot[7440]: creating system dbus: bus_name=org.fedoraproject.Setroubleshootd object_path=/org/fedoraproject/Setroubleshootd interface=org.fedoraproject.SetroubleshootdIface >Mar 20 14:01:02 spectre setroubleshoot[7440]: dbus __init__ /org/fedoraproject/Setroubleshootd called >Mar 20 14:01:02 spectre setroubleshoot[7440]: dbus avc(node=spectre type=AVC msg=audit(1395338461.707:2141): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395338461.707:2141): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4e6280 a1=f0800 a2=0 a3=7f6aba682680 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395338461.707:2141): >) called: 1 Connections >Mar 20 14:01:02 spectre setroubleshoot[7440]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395338461.707:2141): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 20 14:01:02 spectre setroubleshoot[7440]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395338461.707:2141): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4e6280 a1=f0800 a2=0 a3=7f6aba682680 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 20 14:01:02 spectre setroubleshoot[7440]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395338461.707:2141): >Mar 20 14:01:02 spectre setroubleshoot[7440]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 20 14:01:02 spectre setroubleshoot[7440]: dbus avc(node=spectre type=AVC msg=audit(1395338461.708:2142): avc: denied { unmount } for pid=17665 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >node=spectre type=SYSCALL msg=audit(1395338461.708:2142): arch=c000003e syscall=166 success=no exit=-13 a0=7f6abc4e6280 a1=2 a2=0 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395338461.708:2142): >) called: 1 Connections >Mar 20 14:01:02 spectre setroubleshoot[7440]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395338461.708:2142): avc: denied { unmount } for pid=17665 comm="systemd-logind" scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem >Mar 20 14:01:02 spectre setroubleshoot[7440]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395338461.708:2142): arch=c000003e syscall=166 success=no exit=-13 a0=7f6abc4e6280 a1=2 a2=0 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 20 14:01:02 spectre setroubleshoot[7440]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395338461.708:2142): >Mar 20 14:01:02 spectre setroubleshoot[7440]: dbus avc(node=spectre type=AVC msg=audit(1395338461.708:2143): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >node=spectre type=SYSCALL msg=audit(1395338461.708:2143): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4e6280 a1=f0800 a2=1 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >node=spectre type=EOE msg=audit(1395338461.708:2143): >) called: 1 Connections >Mar 20 14:01:02 spectre setroubleshoot[7440]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=AVC msg=audit(1395338461.708:2143): avc: denied { read } for pid=17665 comm="systemd-logind" name="/" dev="tmpfs" ino=24407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir >Mar 20 14:01:02 spectre setroubleshoot[7440]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=SYSCALL msg=audit(1395338461.708:2143): arch=c000003e syscall=2 success=no exit=-13 a0=7f6abc4e6280 a1=f0800 a2=1 a3=7f6aba682440 items=0 ppid=1 pid=17665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-logind" exe="/usr/lib/systemd/systemd-logind" subj=system_u:system_r:systemd_logind_t:s0 key=(null) >Mar 20 14:01:02 spectre setroubleshoot[7440]: AuditRecordReceiver.add_record_to_cache(): node=spectre type=EOE msg=audit(1395338461.708:2143): >Mar 20 14:01:02 spectre setroubleshoot[7440]: Plugin Exception restorecon_source >Mar 20 14:01:02 spectre setroubleshoot[7440]: Plugin Exception restorecon >Mar 20 14:01:02 spectre setroubleshoot[7440]: lookup_signature: found 1 matches with scores 1.00 >Mar 20 14:01:02 spectre setroubleshoot[7440]: signature found in database >Mar 20 14:01:02 spectre setroubleshoot[7440]: sending alert to all clients >Mar 20 14:01:02 spectre setroubleshoot[7440]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.restorecon_source previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.rsync_data previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.kernel_modules previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.catchall_boolean previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.automount_exec_config previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.bind_ports previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.allow_execheap previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.cvs_data previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.mozplugger_remove previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.catchall previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.sandbox_connect previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.httpd_write_content previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.wine previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.catchall_labels previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.samba_share previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.sys_module previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.qemu_blk_image previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.allow_execmod previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.file previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.sys_resource previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.mmap_zero previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.openvpn previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.mozplugger previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.setenforce previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.disable_ipv6 previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.dac_override previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.public_content previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.allow_anon_write previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.selinuxpolicy previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.associate previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.xen_image previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.chrome previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.leaks previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.sshd_root previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.qemu_file_image previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.mounton previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.allow_execstack previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.filesystem_associate previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.restorecon previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.swapfile previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.connect_ports previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.vbetool previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.device previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['unmount'] tclass=filesystem tpath= >Mar 20 14:01:02 spectre python[7440]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 20 14:01:02 spectre setroubleshoot[7440]: lookup_signature: found 1 matches with scores 1.00 >Mar 20 14:01:02 spectre setroubleshoot[7440]: signature found in database >Mar 20 14:01:02 spectre setroubleshoot[7440]: sending alert to all clients >Mar 20 14:01:02 spectre setroubleshoot[7440]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . For complete SELinux messages. run sealert -l 02a46922-41cd-42fe-91eb-0e9eed67ea3d >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.restorecon_source previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.rsync_data previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.kernel_modules previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.catchall_boolean previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.automount_exec_config previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.bind_ports previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.allow_execheap previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.cvs_data previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.mozplugger_remove previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.catchall previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.sandbox_connect previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.httpd_write_content previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.wine previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.catchall_labels previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.samba_share previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.sys_module previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.qemu_blk_image previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.allow_execmod previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.file previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.sys_resource previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.mmap_zero previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.openvpn previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.mozplugger previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.setenforce previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.disable_ipv6 previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.dac_override previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.public_content previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.allow_anon_write previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.selinuxpolicy previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.associate previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.xen_image previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.chrome previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.leaks previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.sshd_root previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.qemu_file_image previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.mounton previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.allow_execstack previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.filesystem_associate previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.restorecon previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.swapfile previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.connect_ports previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.vbetool previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.device previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: analyze_avc() avc=scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 access=['read'] tclass=dir tpath= >Mar 20 14:01:02 spectre python[7440]: SELinux is preventing /usr/lib/systemd/systemd-logind from unmount access on the filesystem . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed unmount access on the filesystem by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 20 14:01:02 spectre setroubleshoot[7440]: lookup_signature: found 1 matches with scores 1.00 >Mar 20 14:01:02 spectre setroubleshoot[7440]: signature found in database >Mar 20 14:01:02 spectre setroubleshoot[7440]: sending alert to all clients >Mar 20 14:01:02 spectre setroubleshoot[7440]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . For complete SELinux messages. run sealert -l e761be14-bed7-4c52-80b8-f3c9d16609eb >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() names=['restorecon_source', 'rsync_data', 'kernel_modules', 'catchall_boolean', 'automount_exec_config', 'bind_ports', 'allow_execheap', 'cvs_data', 'mozplugger_remove', 'catchall', 'sandbox_connect', 'httpd_write_content', 'allow_ftpd_use_cifs', 'wine', 'catchall_labels', 'samba_share', 'sys_module', 'qemu_blk_image', 'allow_execmod', 'file', 'sys_resource', 'mmap_zero', 'httpd_can_sendmail', 'openvpn', 'mozplugger', 'setenforce', 'disable_ipv6', 'dac_override', 'public_content', 'allow_anon_write', 'selinuxpolicy', 'associate', 'xen_image', 'chrome', 'leaks', 'sshd_root', 'qemu_file_image', 'mounton', 'allow_execstack', 'filesystem_associate', 'restorecon', 'swapfile', 'connect_ports', 'allow_ftpd_use_nfs', 'vbetool', 'device'] >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.restorecon_source previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.rsync_data previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.kernel_modules previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.catchall_boolean previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.automount_exec_config previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.bind_ports previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.allow_execheap previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.cvs_data previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.mozplugger_remove previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.catchall previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.sandbox_connect previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.httpd_write_content previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.allow_ftpd_use_cifs previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.wine previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.catchall_labels previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.samba_share previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.sys_module previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.qemu_blk_image previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.allow_execmod previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.file previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.sys_resource previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.mmap_zero previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.httpd_can_sendmail previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.openvpn previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.mozplugger previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.setenforce previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.disable_ipv6 previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.dac_override previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.public_content previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.allow_anon_write previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.selinuxpolicy previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.associate previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.xen_image previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.chrome previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.leaks previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.sshd_root previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.qemu_file_image previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.mounton previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.allow_execstack previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.filesystem_associate previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.restorecon previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.swapfile previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.connect_ports previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.allow_ftpd_use_nfs previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.vbetool previously imported >Mar 20 14:01:02 spectre setroubleshoot[7440]: load_plugins() plugins.device previously imported >Mar 20 14:01:02 spectre python[7440]: SELinux is preventing /usr/lib/systemd/systemd-logind from read access on the directory . > >***** Plugin catchall (100. confidence) suggests ************************** > >If you believe that systemd-logind should be allowed read access on the directory by default. >Then you should report this as a bug. >You can generate a local policy module to allow this access. >Do >allow this access for now by executing: ># grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol ># semodule -i mypol.pp > >Mar 20 14:01:12 spectre setroubleshoot[7440]: received signal=14 >Mar 20 14:01:12 spectre setroubleshoot[7440]: KeyboardInterrupt in RunFaultServer >Mar 20 14:01:12 spectre setroubleshoot[7440]: writing database (/var/lib/setroubleshoot/setroubleshoot_database.xml) modified_count=3 >Mar 20 14:01:12 spectre dbus-daemon[637]: 'list' object has no attribute 'split' >Mar 20 14:01:12 spectre dbus-daemon[637]: string index out of range >Mar 20 14:01:36 spectre sshd[7275]: Received disconnect from 192.168.100.1: 11: disconnected by user >Mar 20 14:01:36 spectre sshd[7272]: pam_unix(sshd:session): session closed for user dshea >Mar 20 14:01:36 spectre systemd-logind[17665]: Removed session 91. >Mar 20 14:08:21 spectre sshd[7467]: Accepted publickey for dshea from 192.168.100.1 port 55478 ssh2: RSA 29:71:d3:be:dc:71:8e:0d:ef:a5:2f:ab:31:0c:82:d4 >Mar 20 14:08:21 spectre sshd[7467]: pam_unix(sshd:session): session opened for user dshea by (uid=0) >Mar 20 14:08:21 spectre systemd-logind[17665]: New session 93 of user dshea. >Mar 20 14:08:21 spectre systemd[1]: Starting Session 93 of user dshea. >Mar 20 14:08:21 spectre systemd[1]: Started Session 93 of user dshea. >Mar 20 14:08:26 spectre sshd[7470]: Received disconnect from 192.168.100.1: 11: disconnected by user >Mar 20 14:08:26 spectre sshd[7467]: pam_unix(sshd:session): session closed for user dshea >Mar 20 14:08:26 spectre systemd-logind[17665]: Removed session 93. >Mar 20 14:16:39 spectre systemd[1]: Starting Cleanup of Temporary Directories... >Mar 20 14:16:39 spectre systemd[1]: Started Cleanup of Temporary Directories. >Mar 20 14:16:46 spectre systemd[1]: Starting dnf makecache... >Mar 20 14:16:46 spectre dnf[7507]: Config time: 0.007 >Mar 20 14:16:46 spectre dnf[7507]: cachedir: /var/cache/dnf/x86_64/21 >Mar 20 14:16:46 spectre dnf[7507]: dnf version: 0.4.18 >Mar 20 14:16:46 spectre dnf[7507]: Making cache files for all metadata files. >Mar 20 14:16:46 spectre dnf[7507]: Metadata cache refreshed recently. >Mar 20 14:16:46 spectre systemd[1]: Started dnf makecache. >Mar 20 14:28:06 spectre sshd[7511]: Accepted publickey for dshea from 192.168.100.1 port 55568 ssh2: RSA 29:71:d3:be:dc:71:8e:0d:ef:a5:2f:ab:31:0c:82:d4 >Mar 20 14:28:06 spectre sshd[7511]: pam_unix(sshd:session): session opened for user dshea by (uid=0) >Mar 20 14:28:06 spectre systemd-logind[17665]: New session 94 of user dshea. >Mar 20 14:28:06 spectre systemd[1]: Starting Session 94 of user dshea. >Mar 20 14:28:06 spectre systemd[1]: Started Session 94 of user dshea. >Mar 20 14:28:32 spectre sshd[7640]: Accepted publickey for dshea from 192.168.100.1 port 55569 ssh2: RSA 29:71:d3:be:dc:71:8e:0d:ef:a5:2f:ab:31:0c:82:d4 >Mar 20 14:28:32 spectre systemd-logind[17665]: New session 95 of user dshea. >Mar 20 14:28:32 spectre systemd[1]: Starting Session 95 of user dshea. >Mar 20 14:28:32 spectre systemd[1]: Started Session 95 of user dshea. >Mar 20 14:28:32 spectre sshd[7640]: pam_unix(sshd:session): session opened for user dshea by (uid=0) >Mar 20 14:28:32 spectre sshd[7643]: Received disconnect from 192.168.100.1: 11: disconnected by user >Mar 20 14:28:32 spectre sshd[7640]: pam_unix(sshd:session): session closed for user dshea >Mar 20 14:28:32 spectre systemd-logind[17665]: Removed session 95. >Mar 20 14:29:34 spectre sshd[12326]: Accepted publickey for dshea from 192.168.100.1 port 55571 ssh2: RSA 29:71:d3:be:dc:71:8e:0d:ef:a5:2f:ab:31:0c:82:d4 >Mar 20 14:29:34 spectre systemd-logind[17665]: New session 96 of user dshea. >Mar 20 14:29:34 spectre systemd[1]: Starting Session 96 of user dshea. >Mar 20 14:29:34 spectre systemd[1]: Started Session 96 of user dshea. >Mar 20 14:29:34 spectre sshd[12326]: pam_unix(sshd:session): session opened for user dshea by (uid=0) >Mar 20 14:31:38 spectre sudo[21555]: dshea : TTY=pts/3 ; PWD=/home/dshea/src/anaconda ; USER=root ; COMMAND=/bin/yum install rpm-build >Mar 20 14:31:50 spectre yum[21556]: Installed: perl-srpm-macros-1-11.fc21.noarch >Mar 20 14:31:51 spectre yum[21556]: Installed: dwz-0.11-2.fc21.x86_64 >Mar 20 14:31:52 spectre yum[21556]: Installed: redhat-rpm-config-9.1.0-57.fc21.noarch >Mar 20 14:31:53 spectre yum[21556]: Installed: rpm-build-4.11.2-2.fc21.x86_64 >Mar 20 14:32:36 spectre sudo[21592]: dshea : TTY=pts/4 ; PWD=/home/dshea/src/pykickstart ; USER=root ; COMMAND=/bin/yum upgrade pykickstart >Mar 20 14:32:42 spectre yum[21593]: Updated: pykickstart-1.99.51-1.fc21.noarch >Mar 20 14:32:49 spectre sshd[21597]: Accepted publickey for dshea from 192.168.100.1 port 55578 ssh2: RSA 29:71:d3:be:dc:71:8e:0d:ef:a5:2f:ab:31:0c:82:d4 >Mar 20 14:32:49 spectre systemd[1]: Starting Session 97 of user dshea. >Mar 20 14:32:49 spectre systemd-logind[17665]: New session 97 of user dshea. >Mar 20 14:32:49 spectre systemd[1]: Started Session 97 of user dshea. >Mar 20 14:32:49 spectre sshd[21597]: pam_unix(sshd:session): session opened for user dshea by (uid=0) >Mar 20 14:32:55 spectre sudo[21630]: dshea : TTY=pts/5 ; PWD=/home/dshea ; USER=root ; COMMAND=/bin/yum upgrade >Mar 20 14:35:11 spectre yum[21631]: Updated: glib2-2.39.92-1.fc21.x86_64 >Mar 20 14:35:12 spectre yum[21631]: Updated: pango-1.36.3-1.fc21.x86_64 >Mar 20 14:35:14 spectre yum[21631]: Updated: atk-2.11.92-1.fc21.x86_64 >Mar 20 14:35:16 spectre yum[21631]: Updated: libsoup-2.45.92-1.fc21.x86_64 >Mar 20 14:35:19 spectre yum[21631]: Updated: librsvg2-2.40.2-1.fc21.x86_64 >Mar 20 14:35:20 spectre yum[21631]: Updated: gsettings-desktop-schemas-3.11.91-1.fc21.x86_64 >Mar 20 14:35:22 spectre yum[21631]: Updated: telepathy-glib-0.23.3-1.fc21.x86_64 >Mar 20 14:35:23 spectre yum[21631]: Updated: 1:openssl-libs-1.0.1e-42.fc21.x86_64 >Mar 20 14:35:24 spectre yum[21631]: Updated: 1:cups-libs-1.7.1-8.fc21.x86_64 >Mar 20 14:35:25 spectre yum[21631]: Updated: 2:libwbclient-4.1.6-2.fc21.x86_64 >Mar 20 14:35:28 spectre yum[21631]: Updated: 2:samba-libs-4.1.6-2.fc21.x86_64 >Mar 20 14:35:29 spectre yum[21631]: Updated: geocode-glib-3.11.92-1.fc21.x86_64 >Mar 20 14:35:32 spectre yum[21631]: Updated: glib2-devel-2.39.92-1.fc21.x86_64 >Mar 20 14:35:33 spectre yum[21631]: Updated: at-spi2-core-2.11.92-1.fc21.x86_64 >Mar 20 14:35:34 spectre yum[21631]: Updated: at-spi2-atk-2.11.92-1.fc21.x86_64 >Mar 20 14:35:38 spectre yum[21631]: Updated: gtk3-3.11.9-1.fc21.x86_64 >Mar 20 14:35:41 spectre yum[21631]: Updated: gnome-desktop3-3.11.91-1.fc21.x86_64 >Mar 20 14:35:45 spectre yum[21631]: Updated: webkitgtk3-2.3.92-1.fc21.x86_64 >Mar 20 14:35:48 spectre yum[21631]: Updated: gnome-online-accounts-3.11.92-1.fc21.x86_64 >Mar 20 14:35:51 spectre yum[21631]: Updated: 2:cheese-libs-3.11.92-1.fc21.x86_64 >Mar 20 14:35:54 spectre yum[21631]: Updated: evince-libs-3.11.92-1.fc21.x86_64 >Mar 20 14:35:59 spectre yum[21631]: Updated: libgweather-3.11.92-1.fc21.x86_64 >Mar 20 14:36:00 spectre yum[21631]: Installed: SDL2-2.0.3-1.fc21.x86_64 >Mar 20 14:36:01 spectre yum[21631]: Updated: librdmacm-1.0.18.1-1.fc21.x86_64 >Mar 20 14:36:02 spectre yum[21631]: Updated: lcms2-2.6-1.fc21.x86_64 >Mar 20 14:36:03 spectre yum[21631]: Updated: libcurl-7.35.0-5.fc21.x86_64 >Mar 20 14:36:07 spectre yum[21631]: Updated: libwebkit2gtk-2.3.92-1.fc21.x86_64 >Mar 20 14:36:10 spectre yum[21631]: Updated: gtksourceview3-3.11.91-1.fc21.x86_64 >Mar 20 14:36:12 spectre yum[21631]: Updated: 2:samba-common-4.1.6-2.fc21.x86_64 >Mar 20 14:36:12 spectre dbus-daemon[637]: dbus[637]: [system] Reloaded configuration >Mar 20 14:36:12 spectre dbus[637]: [system] Reloaded configuration >Mar 20 14:36:12 spectre dbus[637]: [system] Reloaded configuration >Mar 20 14:36:12 spectre dbus-daemon[637]: dbus[637]: [system] Reloaded configuration >Mar 20 14:36:12 spectre dbus[637]: [system] Reloaded configuration >Mar 20 14:36:12 spectre dbus-daemon[637]: dbus[637]: [system] Reloaded configuration >Mar 20 14:36:12 spectre dbus[637]: [system] Reloaded configuration >Mar 20 14:36:12 spectre dbus-daemon[637]: dbus[637]: [system] Reloaded configuration >Mar 20 14:36:13 spectre yum[21631]: Updated: upower-0.99.0-3.fc21.x86_64 >Mar 20 14:36:17 spectre yum[21631]: Updated: tracker-0.17.6-1.fc21.x86_64 >Mar 20 14:36:18 spectre yum[21631]: Updated: nautilus-extensions-3.11.92-1.fc21.x86_64 >Mar 20 14:36:57 spectre yum[21631]: Updated: nautilus-3.11.92-1.fc21.x86_64 >Mar 20 14:36:58 spectre yum[21631]: Updated: python3-gobject-3.11.92-1.fc21.x86_64 >Mar 20 14:37:00 spectre yum[21631]: Updated: glibmm24-2.39.92-1.fc21.x86_64 >Mar 20 14:37:00 spectre yum[21631]: Updated: 12:dhcp-libs-4.3.0-9.fc21.x86_64 >Mar 20 14:37:01 spectre yum[21631]: Updated: 12:dhcp-common-4.3.0-9.fc21.x86_64 >Mar 20 14:37:03 spectre yum[21631]: Updated: gtkmm30-3.11.9-1.fc21.x86_64 >Mar 20 14:37:04 spectre yum[21631]: Updated: 2:libsmbclient-4.1.6-2.fc21.x86_64 >Mar 20 14:37:05 spectre yum[21631]: Updated: 1:epiphany-runtime-3.11.92-1.fc21.x86_64 >Mar 20 14:37:07 spectre yum[21631]: Updated: 2:qemu-common-2.0.0-0.1.rc0.fc21.x86_64 >Mar 20 14:37:13 spectre yum[21631]: Updated: evince-3.11.92-1.fc21.x86_64 >Mar 20 14:37:15 spectre yum[21631]: Updated: 1:gnome-bluetooth-libs-3.11.91-1.fc21.x86_64 >Mar 20 14:37:18 spectre yum[21631]: Updated: file-roller-3.11.92-1.fc21.x86_64 >Mar 20 14:37:19 spectre yum[21631]: Updated: at-spi2-atk-devel-2.11.92-1.fc21.x86_64 >Mar 20 14:37:20 spectre yum[21631]: Updated: pango-devel-1.36.3-1.fc21.x86_64 >Mar 20 14:37:22 spectre yum[21631]: Updated: atk-devel-2.11.92-1.fc21.x86_64 >Mar 20 14:37:23 spectre yum[21631]: Updated: 1:openssl-1.0.1e-42.fc21.x86_64 >Mar 20 14:37:25 spectre yum[21631]: Updated: dconf-0.19.92-1.fc21.x86_64 >Mar 20 14:37:29 spectre yum[21631]: Updated: evolution-data-server-3.11.92-1.fc21.x86_64 >Mar 20 14:37:35 spectre yum[21631]: Updated: evolution-3.11.92-1.fc21.x86_64 >Mar 20 14:37:37 spectre yum[21631]: Updated: pygobject3-base-3.11.92-1.fc21.x86_64 >Mar 20 14:37:39 spectre yum[21631]: Updated: pygobject3-3.11.92-1.fc21.x86_64 >Mar 20 14:37:40 spectre yum[21631]: Updated: zeitgeist-libs-0.9.14-2.fc21.x86_64 >Mar 20 14:37:41 spectre yum[21631]: Updated: boost-system-1.54.0-14.fc21.x86_64 >Mar 20 14:37:43 spectre NetworkManager[746]: <info> kernel firmware directory '/lib/firmware' changed >Mar 20 14:37:48 spectre yum[21631]: Updated: linux-firmware-20140317-37.gitdec41bce.fc21.noarch >Mar 20 14:37:55 spectre yum[21631]: Installed: kernel-3.14.0-0.rc7.git0.1.fc21.x86_64 >Mar 20 14:37:56 spectre yum[21631]: Updated: libevdev-1.0.99.2-1.fc21.x86_64 >Mar 20 14:37:56 spectre yum[21631]: Updated: seavgabios-bin-1.7.4-3.fc21.noarch >Mar 20 14:38:07 spectre yum[21631]: Updated: selinux-policy-3.13.1-38.fc21.noarch >Mar 20 14:38:10 spectre yum[21631]: Updated: 1:grub2-tools-2.02-0.3.fc21.x86_64 >Mar 20 14:38:10 spectre yum[21631]: Updated: 1:control-center-filesystem-3.11.92-1.fc21.x86_64 >Mar 20 14:38:11 spectre yum[21631]: Updated: seabios-bin-1.7.4-3.fc21.noarch >Mar 20 14:38:15 spectre yum[21631]: Updated: 2:qemu-system-x86-2.0.0-0.1.rc0.fc21.x86_64 >Mar 20 14:38:15 spectre yum[21631]: Updated: 1:cups-filesystem-1.7.1-8.fc21.noarch >Mar 20 14:38:16 spectre dbus-daemon[637]: dbus[637]: [system] Reloaded configuration >Mar 20 14:38:16 spectre dbus[637]: [system] Reloaded configuration >Mar 20 14:38:16 spectre dbus[637]: [system] Reloaded configuration >Mar 20 14:38:16 spectre dbus-daemon[637]: dbus[637]: [system] Reloaded configuration >Mar 20 14:38:19 spectre yum[21631]: Updated: 1:cups-1.7.1-8.fc21.x86_64 >Mar 20 14:38:20 spectre yum[21631]: Updated: 2:qemu-kvm-2.0.0-0.1.rc0.fc21.x86_64 >Mar 20 14:38:25 spectre yum[21631]: Updated: gnome-settings-daemon-3.11.92-1.fc21.x86_64 >Mar 20 14:38:30 spectre yum[21631]: Updated: 1:grub2-2.02-0.3.fc21.x86_64 >Mar 20 14:38:43 spectre kernel: SELinux: 2048 avtab hash slots, 99324 rules. >Mar 20 14:38:43 spectre kernel: SELinux: 2048 avtab hash slots, 99324 rules. >Mar 20 14:38:43 spectre kernel: SELinux: 8 users, 101 roles, 4823 types, 277 bools, 1 sens, 1024 cats >Mar 20 14:38:43 spectre kernel: SELinux: 83 classes, 99324 rules >Mar 20 14:38:43 spectre dbus[637]: avc: received policyload notice (seqno=2) >Mar 20 14:38:43 spectre dbus-daemon[637]: dbus[637]: avc: received policyload notice (seqno=2) >Mar 20 14:38:43 spectre dbus[637]: [system] Reloaded configuration >Mar 20 14:38:43 spectre dbus-daemon[637]: dbus[637]: [system] Reloaded configuration >Mar 20 14:38:45 spectre yum[21631]: Updated: selinux-policy-targeted-3.13.1-38.fc21.noarch >Mar 20 14:38:46 spectre yum[21631]: Updated: xorg-x11-drv-synaptics-1.7.99.1-1.20140318gitfd7099004.fc21.x86_64 >Mar 20 14:38:48 spectre yum[21631]: Installed: kernel-modules-extra-3.14.0-0.rc7.git0.1.fc21.x86_64 >Mar 20 14:38:51 spectre yum[21631]: Updated: boost-thread-1.54.0-14.fc21.x86_64 >Mar 20 14:39:30 spectre yum[21631]: Updated: bijiben-3.11.92-1.fc21.x86_64 >Mar 20 14:39:31 spectre yum[21631]: Updated: pyatspi-2.11.92-1.fc21.noarch >Mar 20 14:39:33 spectre yum[21631]: Updated: evolution-ews-3.11.92-1.fc21.x86_64 >Mar 20 14:39:39 spectre yum[21631]: Updated: evolution-help-3.11.92-1.fc21.noarch >Mar 20 14:39:41 spectre yum[21631]: Updated: gnome-contacts-3.11.92-1.fc21.x86_64 >Mar 20 14:39:42 spectre yum[21631]: Updated: perl-IO-Socket-SSL-1.969-1.fc21.noarch >Mar 20 14:39:47 spectre yum[21631]: Updated: gtk3-devel-3.11.9-1.fc21.x86_64 >Mar 20 14:39:48 spectre yum[21631]: Updated: file-roller-nautilus-3.11.92-1.fc21.x86_64 >Mar 20 14:39:49 spectre yum[21631]: Updated: 1:gnome-bluetooth-3.11.91-1.fc21.x86_64 >Mar 20 14:39:50 spectre yum[21631]: Updated: evince-nautilus-3.11.92-1.fc21.x86_64 >Mar 20 14:39:54 spectre yum[21631]: Updated: gnome-software-3.11.91-2.fc21.x86_64 >Mar 20 14:39:56 spectre yum[21631]: Updated: 2:samba-client-4.1.6-2.fc21.x86_64 >Mar 20 14:40:00 spectre yum[21631]: Updated: gnome-system-monitor-3.11.92-1.fc21.x86_64 >Mar 20 14:40:01 spectre yum[21631]: Updated: 12:dhclient-4.3.0-9.fc21.x86_64 >Mar 20 14:40:08 spectre yum[21631]: Updated: 2:gedit-3.11.92-1.fc21.x86_64 >Mar 20 14:40:10 spectre yum[21631]: Updated: python3-pyatspi-2.11.92-1.fc21.noarch >Mar 20 14:40:13 spectre yum[21631]: Updated: gnome-documents-3.11.92-1.fc21.x86_64 >Mar 20 14:40:15 spectre yum[21631]: Updated: gnome-photos-3.11.92-1.fc21.x86_64 >Mar 20 14:40:19 spectre yum[21631]: Updated: gnome-calculator-3.11.92-1.fc21.x86_64 >Mar 20 14:40:21 spectre yum[21631]: Updated: 1:devhelp-3.11.92-1.fc21.x86_64 >Mar 20 14:40:22 spectre yum[21631]: Updated: curl-7.35.0-5.fc21.x86_64 >Mar 20 14:40:23 spectre yum[21631]: Updated: 2:qemu-img-2.0.0-0.1.rc0.fc21.x86_64 >Mar 20 14:40:28 spectre yum[21631]: Updated: eog-3.11.92-1.fc21.x86_64 >Mar 20 14:40:36 spectre yum[21631]: Updated: empathy-3.11.92-1.fc21.x86_64 >Mar 20 14:40:37 spectre yum[21631]: Updated: 2:cheese-3.11.92-1.fc21.x86_64 >Mar 20 14:40:39 spectre yum[21631]: Updated: gnome-maps-3.11.92-1.fc21.x86_64 >Mar 20 14:40:41 spectre yum[21631]: Updated: gnome-weather-3.11.92-1.fc21.x86_64 >Mar 20 14:41:20 spectre yum[21631]: Updated: vinagre-3.11.92-1.fc21.x86_64 >Mar 20 14:41:21 spectre yum[21631]: Updated: gtk3-immodule-xim-3.11.9-1.fc21.x86_64 >Mar 20 14:41:59 spectre yum[21631]: Updated: seahorse-3.11.92-1.fc21.x86_64 >Mar 20 14:42:01 spectre yum[21631]: Updated: rygel-0.21.6-1.fc21.x86_64 >Mar 20 14:42:03 spectre yum[21631]: Updated: gnome-logs-3.11.92-1.fc21.x86_64 >Mar 20 14:42:05 spectre yum[21631]: Updated: simple-scan-3.11.92-1.fc21.x86_64 >Mar 20 14:42:07 spectre yum[21631]: Updated: vino-3.11.92-1.fc21.x86_64 >Mar 20 14:42:10 spectre yum[21631]: Updated: gtk3-devel-docs-3.11.9-1.fc21.x86_64 >Mar 20 14:42:12 spectre yum[21631]: Updated: trousers-0.3.11.2-3.fc21.x86_64 >Mar 20 14:42:12 spectre yum[21631]: Updated: 2:libcacard-2.0.0-0.1.rc0.fc21.x86_64 >Mar 20 14:42:15 spectre yum[21631]: Updated: 2:qemu-guest-agent-2.0.0-0.1.rc0.fc21.x86_64 >Mar 20 14:42:17 spectre yum[21631]: Updated: libgnome-keyring-3.11.92-1.fc21.x86_64 >Mar 20 14:42:18 spectre yum[21631]: Updated: libgexiv2-0.10.0-1.fc21.x86_64 >Mar 20 14:42:20 spectre yum[21631]: Updated: glib2-doc-2.39.92-1.fc21.noarch >Mar 20 14:42:21 spectre yum[21631]: Updated: iwl2000-firmware-18.168.6.1-37.fc21.noarch >Mar 20 14:42:22 spectre yum[21631]: Updated: iwl3945-firmware-15.32.2.9-37.fc21.noarch >Mar 20 14:42:22 spectre NetworkManager[746]: <info> kernel firmware directory '/lib/firmware' changed >Mar 20 14:42:41 spectre yum[21631]: Updated: pcre-8.35-0.1.RC1.fc21.x86_64 >Mar 20 14:42:45 spectre yum[21631]: Updated: glib2-debuginfo-2.39.92-1.fc21.x86_64 >Mar 20 14:42:46 spectre yum[21631]: Updated: iwl5150-firmware-8.24.2.2-37.fc21.noarch >Mar 20 14:42:47 spectre yum[21631]: Updated: iwl100-firmware-39.31.5.1-37.fc21.noarch >Mar 20 14:42:47 spectre NetworkManager[746]: <info> kernel firmware directory '/lib/firmware' changed >Mar 20 14:42:48 spectre yum[21631]: Updated: pcre-debuginfo-8.35-0.1.RC1.fc21.x86_64 >Mar 20 14:42:50 spectre yum[21631]: Updated: boost-atomic-1.54.0-14.fc21.x86_64 >Mar 20 14:42:51 spectre yum[21631]: Updated: iwl6050-firmware-41.28.5.1-37.fc21.noarch >Mar 20 14:42:51 spectre NetworkManager[746]: <info> kernel firmware directory '/lib/firmware' changed >Mar 20 14:42:52 spectre yum[21631]: Updated: fftw-libs-double-3.3.4-1.fc21.x86_64 >Mar 20 14:42:53 spectre yum[21631]: Updated: boost-regex-1.54.0-14.fc21.x86_64 >Mar 20 14:42:54 spectre yum[21631]: Updated: gsm-1.0.13-10.fc21.x86_64 >Mar 20 14:42:55 spectre yum[21631]: Updated: iwl5000-firmware-8.83.5.1_1-37.fc21.noarch >Mar 20 14:42:57 spectre yum[21631]: Updated: kernel-headers-3.14.0-0.rc7.git0.1.fc21.x86_64 >Mar 20 14:42:58 spectre yum[21631]: Updated: mozjs17-17.0.0-10.fc21.x86_64 >Mar 20 14:42:59 spectre yum[21631]: Updated: stoken-libs-0.5-1.fc21.x86_64 >Mar 20 14:43:00 spectre yum[21631]: Updated: jbigkit-libs-2.0-9.fc21.x86_64 >Mar 20 14:43:01 spectre yum[21631]: Updated: iwl6000g2a-firmware-17.168.5.3-37.fc21.noarch >Mar 20 14:43:01 spectre NetworkManager[746]: <info> kernel firmware directory '/lib/firmware' changed >Mar 20 14:43:02 spectre yum[21631]: Updated: iwl6000g2b-firmware-17.168.5.2-37.fc21.noarch >Mar 20 14:43:02 spectre yum[21631]: Updated: iwl7260-firmware-22.24.8.0-37.fc21.noarch >Mar 20 14:43:03 spectre yum[21631]: Updated: 1:iwl1000-firmware-39.31.5.1-37.fc21.noarch >Mar 20 14:43:04 spectre yum[21631]: Updated: iwl105-firmware-18.168.6.1-37.fc21.noarch >Mar 20 14:43:05 spectre yum[21631]: Updated: avalon-logkit-2.1-14.fc21.noarch >Mar 20 14:43:06 spectre yum[21631]: Updated: 2:libertas-usb8388-firmware-20140317-37.gitdec41bce.fc21.noarch >Mar 20 14:43:22 spectre yum[21631]: Updated: gnome-user-docs-3.11.92-1.fc21.noarch >Mar 20 14:43:23 spectre yum[21631]: Updated: iwl4965-firmware-228.61.2.24-37.fc21.noarch >Mar 20 14:43:24 spectre NetworkManager[746]: <info> kernel firmware directory '/lib/firmware' changed >Mar 20 14:43:25 spectre yum[21631]: Updated: iwl6000-firmware-9.221.4.1-37.fc21.noarch >Mar 20 14:43:26 spectre yum[21631]: Updated: boost-date-time-1.54.0-14.fc21.x86_64 >Mar 20 14:43:27 spectre yum[21631]: Updated: hwdata-0.262-1.fc21.noarch >Mar 20 14:43:28 spectre yum[21631]: Updated: iwl2030-firmware-18.168.6.1-37.fc21.noarch >Mar 20 14:43:28 spectre NetworkManager[746]: <info> kernel firmware directory '/lib/firmware' changed >Mar 20 14:43:29 spectre yum[21631]: Updated: perl-PathTools-3.40-291.fc21.x86_64 >Mar 20 14:43:29 spectre yum[21631]: Updated: iwl3160-firmware-22.24.8.0-37.fc21.noarch >Mar 20 14:43:30 spectre yum[21631]: Updated: iwl135-firmware-18.168.6.1-37.fc21.noarch >Mar 20 14:43:31 spectre yum[21631]: Updated: 1:perl-Digest-SHA-5.88-1.fc21.x86_64 >Mar 20 14:45:24 spectre systemd[1]: Reloading. >Mar 20 14:45:25 spectre systemd[27915]: /usr/lib/systemd/system-generators/systemd-gpt-auto-generator failed with error code 1. >Mar 20 14:45:25 spectre systemd-gpt-auto-generator[27921]: Out of memory. >Mar 20 14:45:25 spectre systemd[1]: Configuration file /usr/lib/systemd/system/auditd.service is marked world-inaccessible. This has no effect as configuration data is accessible via APIs without restrictions. Proceeding anyway. >Mar 20 14:46:50 spectre systemd[1]: Reloading. >Mar 20 14:46:50 spectre systemd-gpt-auto-generator[28015]: Out of memory. >Mar 20 14:46:50 spectre systemd[28009]: /usr/lib/systemd/system-generators/systemd-gpt-auto-generator failed with error code 1. >Mar 20 14:46:50 spectre systemd[1]: Configuration file /usr/lib/systemd/system/auditd.service is marked world-inaccessible. This has no effect as configuration data is accessible via APIs without restrictions. Proceeding anyway. >Mar 20 14:46:53 spectre systemd[1]: Reloading. >Mar 20 14:46:53 spectre systemd-gpt-auto-generator[28032]: Out of memory. >Mar 20 14:46:53 spectre systemd[28026]: /usr/lib/systemd/system-generators/systemd-gpt-auto-generator failed with error code 1. >Mar 20 14:46:53 spectre systemd[1]: Configuration file /usr/lib/systemd/system/auditd.service is marked world-inaccessible. This has no effect as configuration data is accessible via APIs without restrictions. Proceeding anyway. >Mar 20 14:47:23 spectre dracut[28152]: dracut- >Mar 20 14:47:24 spectre dracut[28156]: Executing: /sbin/dracut -f /boot/initramfs-3.14.0-0.rc7.git0.1.fc21.x86_64.img 3.14.0-0.rc7.git0.1.fc21.x86_64 >Mar 20 14:47:24 spectre dracut[28156]: 05busybox: Could not find command 'busybox'! >Mar 20 14:47:25 spectre dracut[28156]: 95nbd: Could not find command 'nbd-client'! >Mar 20 14:47:25 spectre dracut[28156]: 05busybox: Could not find command 'busybox'! >Mar 20 14:47:26 spectre dracut[28156]: 95nbd: Could not find command 'nbd-client'! >Mar 20 14:47:26 spectre dracut[28156]: *** Including module: bash *** >Mar 20 14:47:26 spectre dracut[28156]: *** Including module: i18n *** >Mar 20 14:47:27 spectre dracut[28156]: *** Including module: network *** >Mar 20 14:47:28 spectre dracut[28156]: *** Including module: ifcfg *** >Mar 20 14:47:28 spectre dracut[28156]: *** Including module: drm *** >Mar 20 14:47:29 spectre dracut[28156]: *** Including module: plymouth *** >Mar 20 14:47:30 spectre dracut[28156]: *** Including module: dm *** >Mar 20 14:47:31 spectre dracut[28156]: Skipping udev rule: 64-device-mapper.rules >Mar 20 14:47:31 spectre dracut[28156]: Skipping udev rule: 60-persistent-storage-dm.rules >Mar 20 14:47:31 spectre dracut[28156]: Skipping udev rule: 55-dm.rules >Mar 20 14:47:31 spectre dracut[28156]: *** Including module: kernel-modules *** >Mar 20 14:47:35 spectre dracut[28156]: *** Including module: lvm *** >Mar 20 14:47:36 spectre dracut[28156]: Skipping udev rule: 64-device-mapper.rules >Mar 20 14:47:36 spectre dracut[28156]: Skipping udev rule: 56-lvm.rules >Mar 20 14:47:36 spectre dracut[28156]: Skipping udev rule: 60-persistent-storage-lvm.rules >Mar 20 14:47:36 spectre dracut[28156]: *** Including module: qemu *** >Mar 20 14:47:36 spectre dracut[28156]: *** Including module: qemu-net *** >Mar 20 14:47:36 spectre dracut[28156]: *** Including module: fcoe *** >Mar 20 14:47:36 spectre dracut[28156]: *** Including module: fcoe-uefi *** >Mar 20 14:47:36 spectre dracut[28156]: *** Including module: resume *** >Mar 20 14:47:36 spectre dracut[28156]: *** Including module: rootfs-block *** >Mar 20 14:47:36 spectre dracut[28156]: *** Including module: terminfo *** >Mar 20 14:47:36 spectre dracut[28156]: *** Including module: udev-rules *** >Mar 20 14:47:36 spectre dracut[28156]: Skipping udev rule: 91-permissions.rules >Mar 20 14:47:36 spectre dracut[28156]: Skipping udev rule: 80-drivers-modprobe.rules >Mar 20 14:47:37 spectre dracut[28156]: *** Including module: biosdevname *** >Mar 20 14:47:37 spectre dracut[28156]: *** Including module: systemd *** >Mar 20 14:47:37 spectre dracut[28156]: *** Including module: usrmount *** >Mar 20 14:47:37 spectre dracut[28156]: *** Including module: base *** >Mar 20 14:47:37 spectre dracut[28156]: *** Including module: fs-lib *** >Mar 20 14:47:37 spectre dracut[28156]: *** Including module: shutdown *** >Mar 20 14:47:37 spectre dracut[28156]: *** Including module: uefi-lib *** >Mar 20 14:47:37 spectre dracut[28156]: *** Including modules done *** >Mar 20 14:47:37 spectre dracut[28156]: *** Installing kernel module dependencies and firmware *** >Mar 20 14:47:38 spectre dracut[28156]: *** Installing kernel module dependencies and firmware done *** >Mar 20 14:47:38 spectre dracut[28156]: *** Resolving executable dependencies *** >Mar 20 14:47:40 spectre dracut[28156]: *** Resolving executable dependencies done*** >Mar 20 14:47:40 spectre dracut[28156]: *** Pre-linking files *** >Mar 20 14:47:40 spectre dracut[28156]: *** Pre-linking files done *** >Mar 20 14:47:40 spectre dracut[28156]: *** Hardlinking files *** >Mar 20 14:47:40 spectre dracut[28156]: *** Hardlinking files done *** >Mar 20 14:47:40 spectre dracut[28156]: *** Stripping files *** >Mar 20 14:47:40 spectre dracut[28156]: *** Stripping files done *** >Mar 20 14:47:40 spectre dracut[28156]: *** Store current command line parameters *** >Mar 20 14:47:40 spectre dracut[28156]: *** Creating image file *** >Mar 20 14:47:43 spectre dracut[28156]: *** Creating image file done *** >Mar 20 14:47:43 spectre dracut[28156]: Image: /boot/initramfs-3.14.0-0.rc7.git0.1.fc21.x86_64.img: 18M >Mar 20 14:47:43 spectre dracut[28156]: ======================================================================== >Mar 20 14:47:43 spectre dracut[28156]: Version: dracut-036-16.git20140206.fc21 >Mar 20 14:47:43 spectre dracut[28156]: >Mar 20 14:47:43 spectre dracut[28156]: Arguments: -f >Mar 20 14:47:43 spectre dracut[28156]: >Mar 20 14:47:43 spectre dracut[28156]: dracut modules: >Mar 20 14:47:43 spectre dracut[28156]: bash >Mar 20 14:47:43 spectre dracut[28156]: i18n >Mar 20 14:47:43 spectre dracut[28156]: network >Mar 20 14:47:43 spectre dracut[28156]: ifcfg >Mar 20 14:47:43 spectre dracut[28156]: drm >Mar 20 14:47:43 spectre dracut[28156]: plymouth >Mar 20 14:47:43 spectre dracut[28156]: dm >Mar 20 14:47:43 spectre dracut[28156]: kernel-modules >Mar 20 14:47:43 spectre dracut[28156]: lvm >Mar 20 14:47:43 spectre dracut[28156]: qemu >Mar 20 14:47:43 spectre dracut[28156]: qemu-net >Mar 20 14:47:43 spectre dracut[28156]: fcoe >Mar 20 14:47:43 spectre dracut[28156]: fcoe-uefi >Mar 20 14:47:43 spectre dracut[28156]: resume >Mar 20 14:47:43 spectre dracut[28156]: rootfs-block >Mar 20 14:47:43 spectre dracut[28156]: terminfo >Mar 20 14:47:43 spectre dracut[28156]: udev-rules >Mar 20 14:47:43 spectre dracut[28156]: biosdevname >Mar 20 14:47:43 spectre dracut[28156]: systemd >Mar 20 14:47:43 spectre dracut[28156]: usrmount >Mar 20 14:47:43 spectre dracut[28156]: base >Mar 20 14:47:44 spectre dracut[28156]: fs-lib >Mar 20 14:47:44 spectre dracut[28156]: shutdown >Mar 20 14:47:44 spectre dracut[28156]: uefi-lib >Mar 20 14:47:44 spectre dracut[28156]: ======================================================================== >Mar 20 14:47:44 spectre dracut[28156]: drwxr-xr-x 12 root root 0 Mar 20 14:47 . >Mar 20 14:47:44 spectre dracut[28156]: crw-r--r-- 1 root root 5, 1 Mar 20 14:47 dev/console >Mar 20 14:47:44 spectre dracut[28156]: crw-r--r-- 1 root root 1, 11 Mar 20 14:47 dev/kmsg >Mar 20 14:47:44 spectre dracut[28156]: crw-r--r-- 1 root root 1, 3 Mar 20 14:47 dev/null >Mar 20 14:47:44 spectre dracut[28156]: lrwxrwxrwx 1 root root 7 Mar 20 14:47 bin -> usr/bin >Mar 20 14:47:44 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 dev >Mar 20 14:47:44 spectre dracut[28156]: drwxr-xr-x 13 root root 0 Mar 20 14:47 etc >Mar 20 14:47:44 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 etc/cmdline.d >Mar 20 14:47:44 spectre dracut[28156]: -rw-r--r-- 1 root root 49 Mar 20 14:47 etc/cmdline.d/90lvm.conf >Mar 20 14:47:44 spectre dracut[28156]: -rw-r--r-- 1 root root 32 Mar 20 14:47 etc/cmdline.d/95resume.conf >Mar 20 14:47:44 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 etc/conf.d >Mar 20 14:47:44 spectre dracut[28156]: -rw-r--r-- 1 root root 124 Mar 20 14:47 etc/conf.d/systemd.conf >Mar 20 14:47:44 spectre dracut[28156]: -rw-r--r-- 1 root root 164 Jan 29 02:35 etc/dhclient.conf >Mar 20 14:47:44 spectre dracut[28156]: -rw-r--r-- 1 root root 112 Jan 20 15:40 etc/e2fsck.conf >Mar 20 14:47:44 spectre dracut[28156]: -rw-r--r-- 1 root root 28 Feb 19 08:44 etc/fedora-release >Mar 20 14:47:44 spectre dracut[28156]: -rw-r--r-- 1 root root 0 Mar 20 14:47 etc/fstab.empty >Mar 20 14:47:44 spectre dracut[28156]: -rw-r--r-- 1 root root 134 Mar 20 14:47 etc/group >Mar 20 14:47:44 spectre dracut[28156]: -rw-r--r-- 1 root root 8 Dec 16 13:44 etc/hostname >Mar 20 14:47:44 spectre dracut[28156]: -rw-r--r-- 1 root root 208 Mar 20 14:47 etc/initrd-release >Mar 20 14:47:44 spectre dracut[28156]: -rw-r--r-- 1 root root 8181 Mar 20 14:47 etc/ld.so.cache >Mar 20 14:47:44 spectre dracut[28156]: -rw-r--r-- 1 root root 28 Mar 12 18:16 etc/ld.so.conf >Mar 20 14:47:44 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 etc/ld.so.conf.d >Mar 20 14:47:44 spectre dracut[28156]: -rw-r--r-- 1 root root 17 Feb 24 04:36 etc/ld.so.conf.d/atlas-x86_64.conf >Mar 20 14:47:44 spectre dracut[28156]: -r--r--r-- 1 root root 63 Mar 1 07:28 etc/ld.so.conf.d/kernel-3.14.0-0.rc4.git3.1.fc21.x86_64.conf >Mar 20 14:47:44 spectre dracut[28156]: -r--r--r-- 1 root root 63 Mar 14 16:15 etc/ld.so.conf.d/kernel-3.14.0-0.rc6.git4.1.fc21.x86_64.conf >Mar 20 14:47:44 spectre dracut[28156]: -r--r--r-- 1 root root 63 Mar 17 09:55 etc/ld.so.conf.d/kernel-3.14.0-0.rc7.git0.1.fc21.x86_64.conf >Mar 20 14:47:44 spectre dracut[28156]: -rw-r--r-- 1 root root 17 Aug 26 2013 etc/ld.so.conf.d/libiscsi-x86_64.conf >Mar 20 14:47:44 spectre dracut[28156]: -rw-r--r-- 1 root root 16 Jan 31 20:23 etc/ld.so.conf.d/llvm-x86_64.conf >Mar 20 14:47:44 spectre dracut[28156]: -rw-r--r-- 1 root root 23 Mar 18 17:26 etc/ld.so.conf.d/tracker-x86_64.conf >Mar 20 14:47:44 spectre dracut[28156]: -rw-r--r-- 1 root root 21 Feb 3 07:51 etc/ld.so.conf.d/xulrunner-64.conf >Mar 20 14:47:44 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 etc/libnl >Mar 20 14:47:44 spectre dracut[28156]: -rw-r--r-- 1 root root 1130 Jan 23 10:48 etc/libnl/classid >Mar 20 14:47:44 spectre dracut[28156]: -rw-r--r-- 1 root root 19 Oct 17 10:36 etc/locale.conf >Mar 20 14:47:44 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 etc/lvm >Mar 20 14:47:44 spectre dracut[28156]: -rw-r--r-- 1 root root 48159 Mar 20 14:47 etc/lvm/lvm.conf >Mar 20 14:47:44 spectre dracut[28156]: -r--r--r-- 1 root root 33 Oct 17 10:27 etc/machine-id >Mar 20 14:47:44 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 etc/modprobe.d >Mar 20 14:47:44 spectre dracut[28156]: -rw-r--r-- 1 root root 30 Aug 2 2013 etc/modprobe.d/openfwwf.conf >Mar 20 14:47:44 spectre dracut[28156]: lrwxrwxrwx 1 root root 17 Mar 20 14:47 etc/mtab -> /proc/self/mounts >Mar 20 14:47:44 spectre dracut[28156]: lrwxrwxrwx 1 root root 14 Mar 20 14:47 etc/os-release -> initrd-release >Mar 20 14:47:44 spectre dracut[28156]: -rw-r--r-- 1 root root 64 Mar 20 14:47 etc/passwd >Mar 20 14:47:44 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 etc/pcmcia >Mar 20 14:47:44 spectre dracut[28156]: -rw-r--r-- 1 root root 1117 Aug 3 2013 etc/pcmcia/config.opts >Mar 20 14:47:44 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 etc/plymouth >Mar 20 14:47:44 spectre dracut[28156]: -rw-r--r-- 1 root root 94 Jan 7 09:48 etc/plymouth/plymouthd.conf >Mar 20 14:47:44 spectre dracut[28156]: -rw-r--r-- 1 root root 225 Jan 14 08:08 etc/sysctl.conf >Mar 20 14:47:44 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 etc/sysctl.d >Mar 20 14:47:44 spectre dracut[28156]: lrwxrwxrwx 1 root root 14 Mar 20 14:47 etc/sysctl.d/99-sysctl.conf -> ../sysctl.conf >Mar 20 14:47:44 spectre dracut[28156]: lrwxrwxrwx 1 root root 14 Mar 20 14:47 etc/system-release -> fedora-release >Mar 20 14:47:44 spectre dracut[28156]: drwxr-xr-x 3 root root 0 Mar 20 14:47 etc/systemd >Mar 20 14:47:44 spectre dracut[28156]: -rw-r--r-- 1 root root 817 Mar 20 14:47 etc/systemd/journald.conf >Mar 20 14:47:44 spectre dracut[28156]: drwxr-xr-x 6 root root 0 Mar 20 14:47 etc/systemd/system >Mar 20 14:47:44 spectre dracut[28156]: -rw-r--r-- 1 root root 1278 Mar 17 12:38 etc/systemd/system.conf >Mar 20 14:47:44 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 etc/systemd/system/dev-disk-by\x2duuid-1e685958\x2dfb94\x2d40dc\x2da650\x2de06b77358e64.device.d >Mar 20 14:47:44 spectre dracut[28156]: -rw-r--r-- 3 root root 0 Mar 20 14:47 etc/systemd/system/dev-disk-by\x2duuid-1e685958\x2dfb94\x2d40dc\x2da650\x2de06b77358e64.device.d/timeout.conf >Mar 20 14:47:44 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 etc/systemd/system/dev-mapper-fedora\x2droot.device.d >Mar 20 14:47:44 spectre dracut[28156]: -rw-r--r-- 3 root root 0 Mar 20 14:47 etc/systemd/system/dev-mapper-fedora\x2droot.device.d/timeout.conf >Mar 20 14:47:44 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 etc/systemd/system/dev-mapper-fedora\x2dswap.device.d >Mar 20 14:47:44 spectre dracut[28156]: -rw-r--r-- 3 root root 26 Mar 20 14:47 etc/systemd/system/dev-mapper-fedora\x2dswap.device.d/timeout.conf >Mar 20 14:47:44 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 etc/systemd/system/initrd.target.wants >Mar 20 14:47:44 spectre dracut[28156]: lrwxrwxrwx 1 root root 78 Mar 20 14:47 etc/systemd/system/initrd.target.wants/dev-disk-by\x2duuid-1e685958\x2dfb94\x2d40dc\x2da650\x2de06b77358e64.device -> ../dev-disk-by\x2duuid-1e685958\x2dfb94\x2d40dc\x2da650\x2de06b77358e64.device >Mar 20 14:47:44 spectre dracut[28156]: lrwxrwxrwx 1 root root 35 Mar 20 14:47 etc/systemd/system/initrd.target.wants/dev-mapper-fedora\x2droot.device -> ../dev-mapper-fedora\x2droot.device >Mar 20 14:47:44 spectre dracut[28156]: lrwxrwxrwx 1 root root 35 Mar 20 14:47 etc/systemd/system/initrd.target.wants/dev-mapper-fedora\x2dswap.device -> ../dev-mapper-fedora\x2dswap.device >Mar 20 14:47:44 spectre dracut[28156]: drwxr-xr-x 3 root root 0 Mar 20 14:47 etc/udev >Mar 20 14:47:44 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 etc/udev/rules.d >Mar 20 14:47:44 spectre dracut[28156]: -rw-r--r-- 1 root root 142 Jan 29 02:35 etc/udev/rules.d/11-dm.rules >Mar 20 14:47:44 spectre dracut[28156]: -rw-r--r-- 1 root root 681 Mar 20 14:47 etc/udev/rules.d/59-persistent-storage-dm.rules >Mar 20 14:47:44 spectre dracut[28156]: -rw-r--r-- 1 root root 298 Mar 20 14:47 etc/udev/rules.d/59-persistent-storage.rules >Mar 20 14:47:44 spectre dracut[28156]: -rw-r--r-- 1 root root 1031 Mar 20 14:47 etc/udev/rules.d/61-persistent-storage.rules >Mar 20 14:47:44 spectre dracut[28156]: -rw-r--r-- 1 root root 776 Jan 29 02:35 etc/udev/rules.d/64-lvm.rules >Mar 20 14:47:44 spectre dracut[28156]: -rw-r--r-- 1 root root 44 Mar 17 12:38 etc/udev/udev.conf >Mar 20 14:47:44 spectre dracut[28156]: -rw-r--r-- 1 root root 37 Oct 17 10:36 etc/vconsole.conf >Mar 20 14:47:44 spectre dracut[28156]: -rw-r--r-- 1 root root 1982 Mar 12 15:36 etc/virc >Mar 20 14:47:44 spectre dracut[28156]: lrwxrwxrwx 1 root root 23 Mar 20 14:47 init -> usr/lib/systemd/systemd >Mar 20 14:47:44 spectre dracut[28156]: lrwxrwxrwx 1 root root 7 Mar 20 14:47 lib -> usr/lib >Mar 20 14:47:44 spectre dracut[28156]: lrwxrwxrwx 1 root root 9 Mar 20 14:47 lib64 -> usr/lib64 >Mar 20 14:47:44 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 proc >Mar 20 14:47:44 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 root >Mar 20 14:47:44 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 run >Mar 20 14:47:44 spectre dracut[28156]: lrwxrwxrwx 1 root root 8 Mar 20 14:47 sbin -> usr/sbin >Mar 20 14:47:44 spectre dracut[28156]: -rwxr-xr-x 1 root root 3017 Jan 29 02:35 shutdown >Mar 20 14:47:44 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 sys >Mar 20 14:47:44 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 sysroot >Mar 20 14:47:44 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 tmp >Mar 20 14:47:44 spectre dracut[28156]: drwxr-xr-x 7 root root 0 Mar 20 14:47 usr >Mar 20 14:47:44 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 usr/bin >Mar 20 14:47:44 spectre dracut[28156]: -rwxr-xr-x 1 root root 1038288 Mar 20 14:47 usr/bin/bash >Mar 20 14:47:44 spectre dracut[28156]: -rwxr-xr-x 1 root root 56752 Mar 20 14:47 usr/bin/cat >Mar 20 14:47:44 spectre dracut[28156]: -rwxr-xr-x 1 root root 158184 Mar 20 14:47 usr/bin/cp >Mar 20 14:47:45 spectre dracut[28156]: -rwxr-xr-x 1 root root 52472 Mar 20 14:47 usr/bin/dmesg >Mar 20 14:47:45 spectre dracut[28156]: -rwxr-xr-x 1 root root 2069 Jan 29 02:35 usr/bin/dracut-cmdline >Mar 20 14:47:45 spectre dracut[28156]: -rwxr-xr-x 1 root root 1102 Jan 29 02:35 usr/bin/dracut-emergency >Mar 20 14:47:45 spectre dracut[28156]: -rwxr-xr-x 1 root root 2156 Jan 29 02:35 usr/bin/dracut-initqueue >Mar 20 14:47:45 spectre dracut[28156]: -rwxr-xr-x 1 root root 1170 Jan 29 02:35 usr/bin/dracut-mount >Mar 20 14:47:45 spectre dracut[28156]: -rwxr-xr-x 1 root root 611 Jan 29 02:35 usr/bin/dracut-pre-mount >Mar 20 14:47:45 spectre dracut[28156]: -rwxr-xr-x 1 root root 967 Feb 6 11:13 usr/bin/dracut-pre-pivot >Mar 20 14:47:45 spectre dracut[28156]: -rwxr-xr-x 1 root root 577 Jan 29 02:35 usr/bin/dracut-pre-trigger >Mar 20 14:47:45 spectre dracut[28156]: -rwxr-xr-x 1 root root 1523 Jan 29 02:35 usr/bin/dracut-pre-udev >Mar 20 14:47:45 spectre dracut[28156]: -rwxr-xr-x 1 root root 35752 Mar 20 14:47 usr/bin/echo >Mar 20 14:47:45 spectre dracut[28156]: -rwxr-xr-x 1 root root 65128 Mar 20 14:47 usr/bin/findmnt >Mar 20 14:47:45 spectre dracut[28156]: -rwxr-xr-x 1 root root 27048 Mar 20 14:47 usr/bin/flock >Mar 20 14:47:45 spectre dracut[28156]: -rwxr-xr-x 1 root root 159008 Mar 20 14:47 usr/bin/grep >Mar 20 14:47:45 spectre dracut[28156]: -rwxr-xr-x 1 root root 103584 Mar 20 14:47 usr/bin/gzip >Mar 20 14:47:45 spectre dracut[28156]: -rwxr-xr-x 1 root root 266000 Mar 20 14:47 usr/bin/journalctl >Mar 20 14:47:45 spectre dracut[28156]: -rwxr-xr-x 1 root root 14152 Mar 20 14:47 usr/bin/kbd_mode >Mar 20 14:47:45 spectre dracut[28156]: -rwxr-xr-x 1 root root 155048 Mar 20 14:47 usr/bin/kmod >Mar 20 14:47:45 spectre dracut[28156]: -rwxr-xr-x 1 root root 162880 Mar 20 14:47 usr/bin/less >Mar 20 14:47:45 spectre dracut[28156]: -rwxr-xr-x 1 root root 61256 Mar 20 14:47 usr/bin/ln >Mar 20 14:47:45 spectre dracut[28156]: -rwxr-xr-x 1 root root 136608 Mar 20 14:47 usr/bin/loadkeys >Mar 20 14:47:45 spectre dracut[28156]: lrwxrwxrwx 1 root root 4 Mar 20 14:47 usr/bin/loginctl -> true >Mar 20 14:47:45 spectre dracut[28156]: -rwxr-xr-x 1 root root 122864 Mar 20 14:47 usr/bin/ls >Mar 20 14:47:45 spectre dracut[28156]: -rwxr-xr-x 1 root root 86200 Mar 20 14:47 usr/bin/mkdir >Mar 20 14:47:45 spectre dracut[28156]: -rwxr-xr-x 1 root root 68104 Mar 20 14:47 usr/bin/mkfifo >Mar 20 14:47:45 spectre dracut[28156]: -rwxr-xr-x 1 root root 69792 Mar 20 14:47 usr/bin/mknod >Mar 20 14:47:45 spectre dracut[28156]: -rwsr-xr-x 1 root root 44248 Mar 20 14:47 usr/bin/mount >Mar 20 14:47:45 spectre dracut[28156]: -rwxr-xr-x 1 root root 138864 Mar 20 14:47 usr/bin/mv >Mar 20 14:47:45 spectre dracut[28156]: -rwxr-xr-x 1 root root 44920 Mar 20 14:47 usr/bin/ping >Mar 20 14:47:45 spectre dracut[28156]: -rwxr-xr-x 1 root root 49600 Mar 20 14:47 usr/bin/ping6 >Mar 20 14:47:45 spectre dracut[28156]: -rwxr-xr-x 1 root root 44000 Mar 20 14:47 usr/bin/plymouth >Mar 20 14:47:45 spectre dracut[28156]: -rwxr-xr-x 1 root root 106880 Mar 20 14:47 usr/bin/ps >Mar 20 14:47:45 spectre dracut[28156]: -rwxr-xr-x 1 root root 44464 Mar 20 14:47 usr/bin/readlink >Mar 20 14:47:45 spectre dracut[28156]: -rwxr-xr-x 1 root root 65472 Mar 20 14:47 usr/bin/rm >Mar 20 14:47:45 spectre dracut[28156]: -rwxr-xr-x 1 root root 85624 Mar 20 14:47 usr/bin/sed >Mar 20 14:47:45 spectre dracut[28156]: -rwxr-xr-x 1 root root 43712 Mar 20 14:47 usr/bin/setfont >Mar 20 14:47:45 spectre dracut[28156]: -rwxr-xr-x 1 root root 14264 Mar 20 14:47 usr/bin/setsid >Mar 20 14:47:45 spectre dracut[28156]: lrwxrwxrwx 1 root root 4 Mar 20 14:47 usr/bin/sh -> bash >Mar 20 14:47:45 spectre dracut[28156]: -rwxr-xr-x 1 root root 35800 Mar 20 14:47 usr/bin/sleep >Mar 20 14:47:45 spectre dracut[28156]: -rwxr-xr-x 1 root root 72936 Mar 20 14:47 usr/bin/stty >Mar 20 14:47:45 spectre dracut[28156]: -rwxr-xr-x 1 root root 611568 Mar 20 14:47 usr/bin/systemctl >Mar 20 14:47:45 spectre dracut[28156]: -rwxr-xr-x 1 root root 49768 Mar 20 14:47 usr/bin/systemd-cgls >Mar 20 14:47:45 spectre dracut[28156]: -rwxr-xr-x 1 root root 78816 Mar 20 14:47 usr/bin/systemd-tmpfiles >Mar 20 14:47:45 spectre dracut[28156]: -rwxr-xr-x 1 root root 148232 Mar 20 14:47 usr/bin/teamd >Mar 20 14:47:45 spectre dracut[28156]: -rwxr-xr-x 1 root root 32216 Mar 20 14:47 usr/bin/teamdctl >Mar 20 14:47:45 spectre dracut[28156]: -rwxr-xr-x 1 root root 22680 Mar 20 14:47 usr/bin/teamnl >Mar 20 14:47:45 spectre dracut[28156]: -rwxr-xr-x 1 root root 48344 Mar 20 14:47 usr/bin/tr >Mar 20 14:47:45 spectre dracut[28156]: -rwxr-xr-x 1 root root 31600 Mar 20 14:47 usr/bin/true >Mar 20 14:47:45 spectre dracut[28156]: -rwxr-xr-x 1 root root 311128 Mar 20 14:47 usr/bin/udevadm >Mar 20 14:47:45 spectre dracut[28156]: -rwsr-xr-x 1 root root 31968 Mar 20 14:47 usr/bin/umount >Mar 20 14:47:45 spectre dracut[28156]: -rwxr-xr-x 1 root root 35752 Mar 20 14:47 usr/bin/uname >Mar 20 14:47:45 spectre dracut[28156]: -rwxr-xr-x 1 root root 917696 Mar 20 14:47 usr/bin/vi >Mar 20 14:47:45 spectre dracut[28156]: drwxr-xr-x 10 root root 0 Mar 20 14:47 usr/lib >Mar 20 14:47:45 spectre dracut[28156]: drwxr-xr-x 3 root root 0 Mar 20 14:47 usr/lib/dracut >Mar 20 14:47:45 spectre dracut[28156]: -rwxr-xr-x 1 root root 31086 Jan 29 02:35 usr/lib/dracut-lib.sh >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 3 Mar 20 14:47 usr/lib/dracut/build-parameter.txt >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 31 Mar 20 14:47 usr/lib/dracut/dracut-036-16.git20140206.fc21 >Mar 20 14:47:45 spectre dracut[28156]: drwxr-xr-x 15 root root 0 Mar 20 14:47 usr/lib/dracut/hooks >Mar 20 14:47:45 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 usr/lib/dracut/hooks/cleanup >Mar 20 14:47:45 spectre dracut[28156]: -rwxr-xr-x 1 root root 362 Jan 29 02:35 usr/lib/dracut/hooks/cleanup/10-kill-dhclient.sh >Mar 20 14:47:45 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 usr/lib/dracut/hooks/cmdline >Mar 20 14:47:45 spectre dracut[28156]: -rwxr-xr-x 1 root root 1000 Jan 29 02:35 usr/lib/dracut/hooks/cmdline/20-parse-uefifcoe.sh >Mar 20 14:47:45 spectre dracut[28156]: -rwxr-xr-x 1 root root 596 Feb 6 11:13 usr/lib/dracut/hooks/cmdline/30-parse-lvm.sh >Mar 20 14:47:45 spectre dracut[28156]: -rwxr-xr-x 1 root root 926 Jan 29 02:35 usr/lib/dracut/hooks/cmdline/91-dhcp-root.sh >Mar 20 14:47:45 spectre dracut[28156]: -rwxr-xr-x 1 root root 361 Jan 29 02:35 usr/lib/dracut/hooks/cmdline/92-parse-ibft.sh >Mar 20 14:47:45 spectre dracut[28156]: -rwxr-xr-x 1 root root 790 Jan 29 02:35 usr/lib/dracut/hooks/cmdline/95-parse-vlan.sh >Mar 20 14:47:45 spectre dracut[28156]: -rwxr-xr-x 1 root root 1975 Jan 29 02:35 usr/lib/dracut/hooks/cmdline/96-parse-bond.sh >Mar 20 14:47:45 spectre dracut[28156]: -rwxr-xr-x 1 root root 917 Jan 29 02:35 usr/lib/dracut/hooks/cmdline/96-parse-team.sh >Mar 20 14:47:45 spectre dracut[28156]: -rwxr-xr-x 1 root root 1394 Jan 29 02:35 usr/lib/dracut/hooks/cmdline/97-parse-bridge.sh >Mar 20 14:47:45 spectre dracut[28156]: -rwxr-xr-x 1 root root 4269 Jan 29 02:35 usr/lib/dracut/hooks/cmdline/98-parse-ip-opts.sh >Mar 20 14:47:45 spectre dracut[28156]: -rwxr-xr-x 1 root root 1932 Jan 29 02:35 usr/lib/dracut/hooks/cmdline/99-parse-fcoe.sh >Mar 20 14:47:45 spectre dracut[28156]: -rwxr-xr-x 1 root root 662 Jan 29 02:35 usr/lib/dracut/hooks/cmdline/99-parse-ifname.sh >Mar 20 14:47:45 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 usr/lib/dracut/hooks/emergency >Mar 20 14:47:45 spectre dracut[28156]: -rwxr-xr-x 1 root root 160 Jan 29 02:35 usr/lib/dracut/hooks/emergency/50-plymouth-emergency.sh >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 146 Mar 20 14:47 usr/lib/dracut/hooks/emergency/80-\x2fdev\x2fdisk\x2fby-uuid\x2f1e685958-fb94-40dc-a650-e06b77358e64.sh >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 84 Mar 20 14:47 usr/lib/dracut/hooks/emergency/80-\x2fdev\x2fmapper\x2ffedora-root.sh >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 84 Mar 20 14:47 usr/lib/dracut/hooks/emergency/80-\x2fdev\x2fmapper\x2ffedora-swap.sh >Mar 20 14:47:45 spectre dracut[28156]: drwxr-xr-x 6 root root 0 Mar 20 14:47 usr/lib/dracut/hooks/initqueue >Mar 20 14:47:45 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 usr/lib/dracut/hooks/initqueue/finished >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 64 Mar 20 14:47 usr/lib/dracut/hooks/initqueue/finished/devexists-\x2fdev\x2fdisk\x2fby-uuid\x2f1e685958-fb94-40dc-a650-e06b77358e64.sh >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 33 Mar 20 14:47 usr/lib/dracut/hooks/initqueue/finished/devexists-\x2fdev\x2fmapper\x2ffedora-root.sh >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 33 Mar 20 14:47 usr/lib/dracut/hooks/initqueue/finished/devexists-\x2fdev\x2fmapper\x2ffedora-swap.sh >Mar 20 14:47:45 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 usr/lib/dracut/hooks/initqueue/online >Mar 20 14:47:45 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 usr/lib/dracut/hooks/initqueue/settled >Mar 20 14:47:45 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 usr/lib/dracut/hooks/initqueue/timeout >Mar 20 14:47:45 spectre dracut[28156]: -rwxr-xr-x 1 root root 1352 Jan 29 02:35 usr/lib/dracut/hooks/initqueue/timeout/99-rootfallback.sh >Mar 20 14:47:45 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 usr/lib/dracut/hooks/mount >Mar 20 14:47:45 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 usr/lib/dracut/hooks/netroot >Mar 20 14:47:45 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 usr/lib/dracut/hooks/pre-mount >Mar 20 14:47:45 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 usr/lib/dracut/hooks/pre-pivot >Mar 20 14:47:45 spectre dracut[28156]: -rwxr-xr-x 1 root root 8240 Jan 29 02:35 usr/lib/dracut/hooks/pre-pivot/85-write-ifcfg.sh >Mar 20 14:47:45 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 usr/lib/dracut/hooks/pre-shutdown >Mar 20 14:47:45 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 usr/lib/dracut/hooks/pre-trigger >Mar 20 14:47:45 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 usr/lib/dracut/hooks/pre-udev >Mar 20 14:47:45 spectre dracut[28156]: -rwxr-xr-x 1 root root 1229 Jan 29 02:35 usr/lib/dracut/hooks/pre-udev/50-ifname-genrules.sh >Mar 20 14:47:45 spectre dracut[28156]: -rwxr-xr-x 1 root root 3533 Jan 29 02:35 usr/lib/dracut/hooks/pre-udev/60-net-genrules.sh >Mar 20 14:47:45 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 usr/lib/dracut/hooks/shutdown >Mar 20 14:47:45 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 usr/lib/dracut/hooks/shutdown-emergency >Mar 20 14:47:45 spectre dracut[28156]: -rwxr-xr-x 1 root root 465 Jan 29 02:35 usr/lib/dracut/hooks/shutdown/30-dm-shutdown.sh >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 187 Mar 20 14:47 usr/lib/dracut/modules.txt >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 0 Mar 20 14:47 usr/lib/dracut/need-initqueue >Mar 20 14:47:45 spectre dracut[28156]: -rwxr-xr-x 1 root root 3671 Jan 29 02:35 usr/lib/dracut/parse-resume.sh >Mar 20 14:47:45 spectre dracut[28156]: -rwxr-xr-x 1 root root 670 Jan 29 02:35 usr/lib/dracut/resume.sh >Mar 20 14:47:45 spectre dracut[28156]: drwxr-xr-x 3 root root 0 Mar 20 14:47 usr/lib/firmware >Mar 20 14:47:45 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 usr/lib/firmware/e100 >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 539 Mar 17 14:22 usr/lib/firmware/e100/d101m_ucode.bin >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 539 Mar 17 14:22 usr/lib/firmware/e100/d101s_ucode.bin >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 539 Mar 17 14:22 usr/lib/firmware/e100/d102e_ucode.bin >Mar 20 14:47:45 spectre dracut[28156]: -rwxr-xr-x 1 root root 6347 Jan 29 02:35 usr/lib/fs-lib.sh >Mar 20 14:47:45 spectre dracut[28156]: drwxr-xr-x 6 root root 0 Mar 20 14:47 usr/lib/kbd >Mar 20 14:47:45 spectre dracut[28156]: drwxr-xr-x 3 root root 0 Mar 20 14:47 usr/lib/kbd/consolefonts >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 3019 Feb 17 10:10 usr/lib/kbd/consolefonts/161.cp.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 3086 Feb 17 10:10 usr/lib/kbd/consolefonts/162.cp.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 3069 Feb 17 10:10 usr/lib/kbd/consolefonts/163.cp.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 3136 Feb 17 10:10 usr/lib/kbd/consolefonts/164.cp.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 3247 Feb 17 10:10 usr/lib/kbd/consolefonts/165.cp.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 2948 Feb 17 10:10 usr/lib/kbd/consolefonts/737.cp.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 2914 Feb 17 10:10 usr/lib/kbd/consolefonts/880.cp.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 2759 Feb 17 10:10 usr/lib/kbd/consolefonts/928.cp.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 2159 Feb 17 10:10 usr/lib/kbd/consolefonts/972.cp.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 3791 Feb 17 10:10 usr/lib/kbd/consolefonts/Agafari-12.psfu.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 3839 Feb 17 10:10 usr/lib/kbd/consolefonts/Agafari-14.psfu.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 3904 Feb 17 10:10 usr/lib/kbd/consolefonts/Agafari-16.psfu.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 1985 Feb 17 10:10 usr/lib/kbd/consolefonts/Cyr_a8x14.psfu.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 2020 Feb 17 10:10 usr/lib/kbd/consolefonts/Cyr_a8x16.psfu.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 1751 Feb 17 10:10 usr/lib/kbd/consolefonts/Cyr_a8x8.psfu.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 191 Feb 17 10:10 usr/lib/kbd/consolefonts/ERRORS >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 3702 Feb 17 10:10 usr/lib/kbd/consolefonts/Goha-12.psfu.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 3715 Feb 17 10:10 usr/lib/kbd/consolefonts/Goha-14.psfu.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 3779 Feb 17 10:10 usr/lib/kbd/consolefonts/Goha-16.psfu.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 3698 Feb 17 10:10 usr/lib/kbd/consolefonts/GohaClassic-12.psfu.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 3724 Feb 17 10:10 usr/lib/kbd/consolefonts/GohaClassic-14.psfu.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 3789 Feb 17 10:10 usr/lib/kbd/consolefonts/GohaClassic-16.psfu.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 2022 Feb 17 10:10 usr/lib/kbd/consolefonts/Lat2-Terminus16.psfu.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 3584 Feb 17 10:10 usr/lib/kbd/consolefonts/LatArCyrHeb-08.psfu.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 4089 Feb 17 10:10 usr/lib/kbd/consolefonts/LatArCyrHeb-14.psfu.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 4184 Feb 17 10:10 usr/lib/kbd/consolefonts/LatArCyrHeb-16+.psfu.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 4096 Feb 17 10:10 usr/lib/kbd/consolefonts/LatArCyrHeb-16.psfu.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 4260 Feb 17 10:10 usr/lib/kbd/consolefonts/LatArCyrHeb-19.psfu.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 6004 Feb 17 10:10 usr/lib/kbd/consolefonts/LatGrkCyr-12x22.psfu.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 3813 Feb 17 10:10 usr/lib/kbd/consolefonts/LatGrkCyr-8x16.psfu.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 4113 Feb 17 10:10 usr/lib/kbd/consolefonts/LatKaCyrHeb-14.psfu.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 1387 Feb 17 10:10 usr/lib/kbd/consolefonts/Mik_8x16.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 2709 Feb 17 10:10 usr/lib/kbd/consolefonts/UniCyrExt_8x16.psf.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 1929 Feb 17 10:10 usr/lib/kbd/consolefonts/UniCyr_8x14.psf.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 1996 Feb 17 10:10 usr/lib/kbd/consolefonts/UniCyr_8x16.psf.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 1728 Feb 17 10:10 usr/lib/kbd/consolefonts/UniCyr_8x8.psf.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 1290 Feb 17 10:10 usr/lib/kbd/consolefonts/alt-8x14.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 1488 Feb 17 10:10 usr/lib/kbd/consolefonts/alt-8x16.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 1084 Feb 17 10:10 usr/lib/kbd/consolefonts/alt-8x8.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 1415 Feb 17 10:10 usr/lib/kbd/consolefonts/altc-8x16.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 1114 Feb 17 10:10 usr/lib/kbd/consolefonts/aply16.psf.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 1593 Feb 17 10:10 usr/lib/kbd/consolefonts/arm8.fnt.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 1877 Feb 17 10:10 usr/lib/kbd/consolefonts/cp1250.psfu.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 1963 Feb 17 10:10 usr/lib/kbd/consolefonts/cp850-8x14.psfu.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 2025 Feb 17 10:10 usr/lib/kbd/consolefonts/cp850-8x16.psfu.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 1760 Feb 17 10:10 usr/lib/kbd/consolefonts/cp850-8x8.psfu.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 1106 Feb 17 10:10 usr/lib/kbd/consolefonts/cp857.08.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 1282 Feb 17 10:10 usr/lib/kbd/consolefonts/cp857.14.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 1342 Feb 17 10:10 usr/lib/kbd/consolefonts/cp857.16.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 1989 Feb 17 10:10 usr/lib/kbd/consolefonts/cp865-8x14.psfu.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 2050 Feb 17 10:10 usr/lib/kbd/consolefonts/cp865-8x16.psfu.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 1768 Feb 17 10:10 usr/lib/kbd/consolefonts/cp865-8x8.psfu.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 1329 Feb 17 10:10 usr/lib/kbd/consolefonts/cp866-8x14.psf.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 1351 Feb 17 10:10 usr/lib/kbd/consolefonts/cp866-8x16.psf.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 1112 Feb 17 10:10 usr/lib/kbd/consolefonts/cp866-8x8.psf.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 1212 Feb 17 10:10 usr/lib/kbd/consolefonts/cybercafe.fnt.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 2070 Feb 17 10:10 usr/lib/kbd/consolefonts/cyr-sun16.psfu.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 2076 Feb 17 10:10 usr/lib/kbd/consolefonts/default8x16.psfu.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 1879 Feb 17 10:10 usr/lib/kbd/consolefonts/default8x9.psfu.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 3412 Feb 17 10:10 usr/lib/kbd/consolefonts/drdos8x14.psfu.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 3486 Feb 17 10:10 usr/lib/kbd/consolefonts/drdos8x16.psfu.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 2558 Feb 17 10:10 usr/lib/kbd/consolefonts/drdos8x6.psfu.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 3065 Feb 17 10:10 usr/lib/kbd/consolefonts/drdos8x8.psfu.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 1707 Feb 17 10:10 usr/lib/kbd/consolefonts/gr737a-8x8.psfu.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 1915 Feb 17 10:10 usr/lib/kbd/consolefonts/gr737a-9x14.psfu.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 1975 Feb 17 10:10 usr/lib/kbd/consolefonts/gr737a-9x16.psfu.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 1819 Feb 17 10:10 usr/lib/kbd/consolefonts/gr737b-8x11.psfu.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 2137 Feb 17 10:10 usr/lib/kbd/consolefonts/gr737b-9x16-medieval.psfu.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 1932 Feb 17 10:10 usr/lib/kbd/consolefonts/gr737c-8x14.psfu.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 2 root root 1970 Feb 17 10:10 usr/lib/kbd/consolefonts/gr737c-8x16.psfu.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 1516 Feb 17 10:10 usr/lib/kbd/consolefonts/gr737c-8x6.psfu.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 1563 Feb 17 10:10 usr/lib/kbd/consolefonts/gr737c-8x7.psfu.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 1743 Feb 17 10:10 usr/lib/kbd/consolefonts/gr737c-8x8.psfu.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 2 root root 0 Feb 17 10:10 usr/lib/kbd/consolefonts/gr737d-8x16.psfu.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 1737 Feb 17 10:10 usr/lib/kbd/consolefonts/gr928-8x16-thin.psfu.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 1774 Feb 17 10:10 usr/lib/kbd/consolefonts/gr928-9x14.psfu.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 1809 Feb 17 10:10 usr/lib/kbd/consolefonts/gr928-9x16.psfu.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 1784 Feb 17 10:10 usr/lib/kbd/consolefonts/gr928a-8x14.psfu.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 1824 Feb 17 10:10 usr/lib/kbd/consolefonts/gr928a-8x16.psfu.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 2057 Feb 17 10:10 usr/lib/kbd/consolefonts/gr928b-8x14.psfu.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 2100 Feb 17 10:10 usr/lib/kbd/consolefonts/gr928b-8x16.psfu.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 3162 Feb 17 10:10 usr/lib/kbd/consolefonts/greek-polytonic.psfu.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 2 root root 3211 Feb 17 10:10 usr/lib/kbd/consolefonts/iso01-12x22.psfu.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 85 Feb 17 10:10 usr/lib/kbd/consolefonts/iso01.08.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 85 Feb 17 10:10 usr/lib/kbd/consolefonts/iso01.14.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 85 Feb 17 10:10 usr/lib/kbd/consolefonts/iso01.16.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 2 root root 0 Feb 17 10:10 usr/lib/kbd/consolefonts/iso02-12x22.psfu.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 85 Feb 17 10:10 usr/lib/kbd/consolefonts/iso02.08.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 85 Feb 17 10:10 usr/lib/kbd/consolefonts/iso02.14.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 85 Feb 17 10:10 usr/lib/kbd/consolefonts/iso02.16.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 85 Feb 17 10:10 usr/lib/kbd/consolefonts/iso03.08.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 85 Feb 17 10:10 usr/lib/kbd/consolefonts/iso03.14.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 85 Feb 17 10:10 usr/lib/kbd/consolefonts/iso03.16.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 85 Feb 17 10:10 usr/lib/kbd/consolefonts/iso04.08.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 85 Feb 17 10:10 usr/lib/kbd/consolefonts/iso04.14.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 85 Feb 17 10:10 usr/lib/kbd/consolefonts/iso04.16.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 85 Feb 17 10:10 usr/lib/kbd/consolefonts/iso05.08.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 85 Feb 17 10:10 usr/lib/kbd/consolefonts/iso05.14.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 85 Feb 17 10:10 usr/lib/kbd/consolefonts/iso05.16.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 85 Feb 17 10:10 usr/lib/kbd/consolefonts/iso06.08.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 85 Feb 17 10:10 usr/lib/kbd/consolefonts/iso06.14.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 85 Feb 17 10:10 usr/lib/kbd/consolefonts/iso06.16.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 85 Feb 17 10:10 usr/lib/kbd/consolefonts/iso07.14.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 85 Feb 17 10:10 usr/lib/kbd/consolefonts/iso07.16.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 2082 Feb 17 10:10 usr/lib/kbd/consolefonts/iso07u-16.psfu.gz >Mar 20 14:47:45 spectre dracut[28156]: -rw-r--r-- 1 root root 85 Feb 17 10:10 usr/lib/kbd/consolefonts/iso08.08.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 85 Feb 17 10:10 usr/lib/kbd/consolefonts/iso08.14.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 85 Feb 17 10:10 usr/lib/kbd/consolefonts/iso08.16.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 85 Feb 17 10:10 usr/lib/kbd/consolefonts/iso09.08.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 85 Feb 17 10:10 usr/lib/kbd/consolefonts/iso09.14.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 85 Feb 17 10:10 usr/lib/kbd/consolefonts/iso09.16.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 86 Feb 17 10:10 usr/lib/kbd/consolefonts/iso10.08.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 86 Feb 17 10:10 usr/lib/kbd/consolefonts/iso10.14.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 86 Feb 17 10:10 usr/lib/kbd/consolefonts/iso10.16.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1261 Feb 17 10:10 usr/lib/kbd/consolefonts/koi8-14.psf.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1412 Feb 17 10:10 usr/lib/kbd/consolefonts/koi8c-8x16.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1299 Feb 17 10:10 usr/lib/kbd/consolefonts/koi8r-8x14.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1493 Feb 17 10:10 usr/lib/kbd/consolefonts/koi8r-8x16.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1090 Feb 17 10:10 usr/lib/kbd/consolefonts/koi8r-8x8.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1768 Feb 17 10:10 usr/lib/kbd/consolefonts/koi8r.8x8.psfu.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 2090 Feb 17 10:10 usr/lib/kbd/consolefonts/koi8u_8x14.psfu.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 2111 Feb 17 10:10 usr/lib/kbd/consolefonts/koi8u_8x16.psfu.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1835 Feb 17 10:10 usr/lib/kbd/consolefonts/koi8u_8x8.psfu.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1790 Feb 17 10:10 usr/lib/kbd/consolefonts/lat0-08.psfu.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1868 Feb 17 10:10 usr/lib/kbd/consolefonts/lat0-10.psfu.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1978 Feb 17 10:10 usr/lib/kbd/consolefonts/lat0-12.psfu.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 2011 Feb 17 10:10 usr/lib/kbd/consolefonts/lat0-14.psfu.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 2063 Feb 17 10:10 usr/lib/kbd/consolefonts/lat0-16.psfu.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1989 Feb 17 10:10 usr/lib/kbd/consolefonts/lat0-sun16.psfu.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1779 Feb 17 10:10 usr/lib/kbd/consolefonts/lat1-08.psfu.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1861 Feb 17 10:10 usr/lib/kbd/consolefonts/lat1-10.psfu.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1964 Feb 17 10:10 usr/lib/kbd/consolefonts/lat1-12.psfu.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1998 Feb 17 10:10 usr/lib/kbd/consolefonts/lat1-14.psfu.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 2076 Feb 17 10:10 usr/lib/kbd/consolefonts/lat1-16.psfu.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1748 Feb 17 10:10 usr/lib/kbd/consolefonts/lat2-08.psfu.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1868 Feb 17 10:10 usr/lib/kbd/consolefonts/lat2-10.psfu.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1910 Feb 17 10:10 usr/lib/kbd/consolefonts/lat2-12.psfu.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1982 Feb 17 10:10 usr/lib/kbd/consolefonts/lat2-14.psfu.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1991 Feb 17 10:10 usr/lib/kbd/consolefonts/lat2-16.psfu.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1984 Feb 17 10:10 usr/lib/kbd/consolefonts/lat2-sun16.psfu.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 2018 Feb 17 10:10 usr/lib/kbd/consolefonts/lat2a-16.psfu.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1821 Feb 17 10:10 usr/lib/kbd/consolefonts/lat4-08.psfu.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1925 Feb 17 10:10 usr/lib/kbd/consolefonts/lat4-10.psfu.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1995 Feb 17 10:10 usr/lib/kbd/consolefonts/lat4-12.psfu.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 2046 Feb 17 10:10 usr/lib/kbd/consolefonts/lat4-14.psfu.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 2151 Feb 17 10:10 usr/lib/kbd/consolefonts/lat4-16+.psfu.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 2057 Feb 17 10:10 usr/lib/kbd/consolefonts/lat4-16.psfu.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 2197 Feb 17 10:10 usr/lib/kbd/consolefonts/lat4-19.psfu.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1820 Feb 17 10:10 usr/lib/kbd/consolefonts/lat4a-08.psfu.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1927 Feb 17 10:10 usr/lib/kbd/consolefonts/lat4a-10.psfu.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1995 Feb 17 10:10 usr/lib/kbd/consolefonts/lat4a-12.psfu.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 2048 Feb 17 10:10 usr/lib/kbd/consolefonts/lat4a-14.psfu.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 2152 Feb 17 10:10 usr/lib/kbd/consolefonts/lat4a-16+.psfu.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 2054 Feb 17 10:10 usr/lib/kbd/consolefonts/lat4a-16.psfu.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 2193 Feb 17 10:10 usr/lib/kbd/consolefonts/lat4a-19.psfu.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1965 Feb 17 10:10 usr/lib/kbd/consolefonts/lat5-12.psfu.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1995 Feb 17 10:10 usr/lib/kbd/consolefonts/lat5-14.psfu.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 2061 Feb 17 10:10 usr/lib/kbd/consolefonts/lat5-16.psfu.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1838 Feb 17 10:10 usr/lib/kbd/consolefonts/lat7-14.psfu.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 2083 Feb 17 10:10 usr/lib/kbd/consolefonts/lat7a-14.psfu.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1372 Feb 17 10:10 usr/lib/kbd/consolefonts/lat7a-16.psf.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1099 Feb 17 10:10 usr/lib/kbd/consolefonts/lat9-08.psf.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1175 Feb 17 10:10 usr/lib/kbd/consolefonts/lat9-10.psf.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1290 Feb 17 10:10 usr/lib/kbd/consolefonts/lat9-12.psf.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1308 Feb 17 10:10 usr/lib/kbd/consolefonts/lat9-14.psf.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1364 Feb 17 10:10 usr/lib/kbd/consolefonts/lat9-16.psf.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1783 Feb 17 10:10 usr/lib/kbd/consolefonts/lat9u-08.psfu.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1865 Feb 17 10:10 usr/lib/kbd/consolefonts/lat9u-10.psfu.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1976 Feb 17 10:10 usr/lib/kbd/consolefonts/lat9u-12.psfu.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 2009 Feb 17 10:10 usr/lib/kbd/consolefonts/lat9u-14.psfu.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 2061 Feb 17 10:10 usr/lib/kbd/consolefonts/lat9u-16.psfu.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1771 Feb 17 10:10 usr/lib/kbd/consolefonts/lat9v-08.psfu.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1853 Feb 17 10:10 usr/lib/kbd/consolefonts/lat9v-10.psfu.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1973 Feb 17 10:10 usr/lib/kbd/consolefonts/lat9v-12.psfu.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1999 Feb 17 10:10 usr/lib/kbd/consolefonts/lat9v-14.psfu.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 2054 Feb 17 10:10 usr/lib/kbd/consolefonts/lat9v-16.psfu.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1787 Feb 17 10:10 usr/lib/kbd/consolefonts/lat9w-08.psfu.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1870 Feb 17 10:10 usr/lib/kbd/consolefonts/lat9w-10.psfu.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1989 Feb 17 10:10 usr/lib/kbd/consolefonts/lat9w-12.psfu.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 2015 Feb 17 10:10 usr/lib/kbd/consolefonts/lat9w-14.psfu.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 2069 Feb 17 10:10 usr/lib/kbd/consolefonts/lat9w-16.psfu.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 3803 Feb 17 10:10 usr/lib/kbd/consolefonts/latarcyrheb-sun16.psfu.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 5171 Feb 17 10:10 usr/lib/kbd/consolefonts/latarcyrheb-sun32.psfu.gz >Mar 20 14:47:46 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Feb 27 17:55 usr/lib/kbd/consolefonts/partialfonts >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 693 Feb 17 10:10 usr/lib/kbd/consolefonts/partialfonts/8859-1.a0-ff.08.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 805 Feb 17 10:10 usr/lib/kbd/consolefonts/partialfonts/8859-1.a0-ff.14.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 812 Feb 17 10:10 usr/lib/kbd/consolefonts/partialfonts/8859-1.a0-ff.16.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 710 Feb 17 10:10 usr/lib/kbd/consolefonts/partialfonts/8859-10.a0-ff.08.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 818 Feb 17 10:10 usr/lib/kbd/consolefonts/partialfonts/8859-10.a0-ff.14.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 825 Feb 17 10:10 usr/lib/kbd/consolefonts/partialfonts/8859-10.a0-ff.16.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 713 Feb 17 10:10 usr/lib/kbd/consolefonts/partialfonts/8859-2.a0-ff.08.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 803 Feb 17 10:10 usr/lib/kbd/consolefonts/partialfonts/8859-2.a0-ff.14.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 800 Feb 17 10:10 usr/lib/kbd/consolefonts/partialfonts/8859-2.a0-ff.16.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 659 Feb 17 10:10 usr/lib/kbd/consolefonts/partialfonts/8859-3.a0-ff.08.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 744 Feb 17 10:10 usr/lib/kbd/consolefonts/partialfonts/8859-3.a0-ff.14.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 752 Feb 17 10:10 usr/lib/kbd/consolefonts/partialfonts/8859-3.a0-ff.16.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 707 Feb 17 10:10 usr/lib/kbd/consolefonts/partialfonts/8859-4.a0-ff.08.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 819 Feb 17 10:10 usr/lib/kbd/consolefonts/partialfonts/8859-4.a0-ff.14.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 822 Feb 17 10:10 usr/lib/kbd/consolefonts/partialfonts/8859-4.a0-ff.16.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 709 Feb 17 10:10 usr/lib/kbd/consolefonts/partialfonts/8859-5.a0-ff.08.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 800 Feb 17 10:10 usr/lib/kbd/consolefonts/partialfonts/8859-5.a0-ff.14.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 825 Feb 17 10:10 usr/lib/kbd/consolefonts/partialfonts/8859-5.a0-ff.16.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 436 Feb 17 10:10 usr/lib/kbd/consolefonts/partialfonts/8859-6.a0-ff.08.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 498 Feb 17 10:10 usr/lib/kbd/consolefonts/partialfonts/8859-6.a0-ff.14.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 499 Feb 17 10:10 usr/lib/kbd/consolefonts/partialfonts/8859-6.a0-ff.16.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 648 Feb 17 10:10 usr/lib/kbd/consolefonts/partialfonts/8859-7.a0-ff.08.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 803 Feb 17 10:10 usr/lib/kbd/consolefonts/partialfonts/8859-7.a0-ff.14.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 818 Feb 17 10:10 usr/lib/kbd/consolefonts/partialfonts/8859-7.a0-ff.16.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 501 Feb 17 10:10 usr/lib/kbd/consolefonts/partialfonts/8859-8.a0-ff.08.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 565 Feb 17 10:10 usr/lib/kbd/consolefonts/partialfonts/8859-8.a0-ff.14.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 576 Feb 17 10:10 usr/lib/kbd/consolefonts/partialfonts/8859-8.a0-ff.16.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 699 Feb 17 10:10 usr/lib/kbd/consolefonts/partialfonts/8859-9.a0-ff.08.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 791 Feb 17 10:10 usr/lib/kbd/consolefonts/partialfonts/8859-9.a0-ff.14.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 814 Feb 17 10:10 usr/lib/kbd/consolefonts/partialfonts/8859-9.a0-ff.16.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 650 Feb 17 10:10 usr/lib/kbd/consolefonts/partialfonts/ascii.20-7f.08.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 749 Feb 17 10:10 usr/lib/kbd/consolefonts/partialfonts/ascii.20-7f.14.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 778 Feb 17 10:10 usr/lib/kbd/consolefonts/partialfonts/ascii.20-7f.16.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 330 Feb 17 10:10 usr/lib/kbd/consolefonts/partialfonts/cp437.00-1f.08.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 371 Feb 17 10:10 usr/lib/kbd/consolefonts/partialfonts/cp437.00-1f.14.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 380 Feb 17 10:10 usr/lib/kbd/consolefonts/partialfonts/cp437.00-1f.16.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 36 Feb 17 10:10 usr/lib/kbd/consolefonts/partialfonts/none.00-17.08.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 40 Feb 17 10:10 usr/lib/kbd/consolefonts/partialfonts/none.00-17.14.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 40 Feb 17 10:10 usr/lib/kbd/consolefonts/partialfonts/none.00-17.16.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 2084 Feb 17 10:10 usr/lib/kbd/consolefonts/ruscii_8x16.psfu.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 2059 Feb 17 10:10 usr/lib/kbd/consolefonts/ruscii_8x8.psfu.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 2708 Feb 17 10:10 usr/lib/kbd/consolefonts/sun12x22.psfu.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1467 Feb 17 10:10 usr/lib/kbd/consolefonts/t.fnt.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1515 Feb 17 10:10 usr/lib/kbd/consolefonts/t850b.fnt.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1363 Feb 17 10:10 usr/lib/kbd/consolefonts/tcvn8x16.psf.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1891 Feb 17 10:10 usr/lib/kbd/consolefonts/viscii10-8x16.psfu.gz >Mar 20 14:47:46 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 usr/lib/kbd/consoletrans >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 9216 Feb 17 10:10 usr/lib/kbd/consoletrans/8859-10_to_uni.trans >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 8994 Feb 17 10:10 usr/lib/kbd/consoletrans/8859-13_to_uni.trans >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 9279 Feb 17 10:10 usr/lib/kbd/consoletrans/8859-14_to_uni.trans >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 8839 Feb 17 10:10 usr/lib/kbd/consoletrans/8859-15_to_uni.trans >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 8806 Feb 17 10:10 usr/lib/kbd/consoletrans/8859-1_to_uni.trans >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 9034 Feb 17 10:10 usr/lib/kbd/consoletrans/8859-2_to_uni.trans >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 8712 Feb 17 10:10 usr/lib/kbd/consoletrans/8859-3_to_uni.trans >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 9006 Feb 17 10:10 usr/lib/kbd/consoletrans/8859-4_to_uni.trans >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 8645 Feb 17 10:10 usr/lib/kbd/consoletrans/8859-5_to_uni.trans >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 6418 Feb 17 10:10 usr/lib/kbd/consoletrans/8859-6_to_uni.trans >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 8471 Feb 17 10:10 usr/lib/kbd/consoletrans/8859-7_to_uni.trans >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 6566 Feb 17 10:10 usr/lib/kbd/consoletrans/8859-8_to_uni.trans >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 8786 Feb 17 10:10 usr/lib/kbd/consoletrans/8859-9_to_uni.trans >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1698 Feb 17 10:10 usr/lib/kbd/consoletrans/baltic.trans >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 9307 Feb 17 10:10 usr/lib/kbd/consoletrans/cp1250_to_uni.trans >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 9769 Feb 17 10:10 usr/lib/kbd/consoletrans/cp1251_to_uni.trans >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1834 Feb 17 10:10 usr/lib/kbd/consoletrans/cp437_to_iso01.trans >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 9529 Feb 17 10:10 usr/lib/kbd/consoletrans/cp437_to_uni.trans >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 9568 Feb 17 10:10 usr/lib/kbd/consoletrans/cp737_to_uni.trans >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 9500 Feb 17 10:10 usr/lib/kbd/consoletrans/cp775_to_uni.trans >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1172 Feb 17 10:10 usr/lib/kbd/consoletrans/cp850_to_iso01.trans >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 9378 Feb 17 10:10 usr/lib/kbd/consoletrans/cp850_to_uni.trans >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 9677 Feb 17 10:10 usr/lib/kbd/consoletrans/cp852_to_uni.trans >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 9562 Feb 17 10:10 usr/lib/kbd/consoletrans/cp853_to_uni.trans >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 9293 Feb 17 10:10 usr/lib/kbd/consoletrans/cp855_to_uni.trans >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 9369 Feb 17 10:10 usr/lib/kbd/consoletrans/cp857_to_uni.trans >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 9570 Feb 17 10:10 usr/lib/kbd/consoletrans/cp860_to_uni.trans >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 9554 Feb 17 10:10 usr/lib/kbd/consoletrans/cp861_to_uni.trans >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 9133 Feb 17 10:10 usr/lib/kbd/consoletrans/cp862_to_uni.trans >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 9427 Feb 17 10:10 usr/lib/kbd/consoletrans/cp863_to_uni.trans >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 9333 Feb 17 10:10 usr/lib/kbd/consoletrans/cp864_to_uni.trans >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 9549 Feb 17 10:10 usr/lib/kbd/consoletrans/cp865_to_uni.trans >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 9475 Feb 17 10:10 usr/lib/kbd/consoletrans/cp866_to_uni.trans >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 9109 Feb 17 10:10 usr/lib/kbd/consoletrans/cp869_to_uni.trans >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 8219 Feb 17 10:10 usr/lib/kbd/consoletrans/cp874_to_uni.trans >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 5914 Feb 17 10:10 usr/lib/kbd/consoletrans/iso02_to_cp1250.trans >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 2455 Feb 17 10:10 usr/lib/kbd/consoletrans/koi2alt >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 10105 Feb 17 10:10 usr/lib/kbd/consoletrans/koi8-r_to_uni.trans >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 10067 Feb 17 10:10 usr/lib/kbd/consoletrans/koi8-u_to_uni.trans >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1468 Feb 17 10:10 usr/lib/kbd/consoletrans/koi8u2ruscii >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 256 Feb 17 10:10 usr/lib/kbd/consoletrans/latin2u.trans >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 923 Feb 17 10:10 usr/lib/kbd/consoletrans/null >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 2122 Feb 17 10:10 usr/lib/kbd/consoletrans/space >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1891 Feb 17 10:10 usr/lib/kbd/consoletrans/trivial >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1698 Feb 17 10:10 usr/lib/kbd/consoletrans/vga2iso >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1418 Feb 17 10:10 usr/lib/kbd/consoletrans/viscii1.0_to_tcvn.trans >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1847 Feb 17 10:10 usr/lib/kbd/consoletrans/viscii1.0_to_viscii1.1.trans >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1747 Feb 17 10:10 usr/lib/kbd/consoletrans/zero >Mar 20 14:47:46 spectre dracut[28156]: drwxr-xr-x 4 root root 0 Mar 20 14:47 usr/lib/kbd/keymaps >Mar 20 14:47:46 spectre dracut[28156]: drwxr-xr-x 9 root root 0 Feb 27 17:53 usr/lib/kbd/keymaps/legacy >Mar 20 14:47:46 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Feb 27 17:53 usr/lib/kbd/keymaps/legacy/amiga >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 2970 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/amiga/amiga-de.map.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1889 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/amiga/amiga-us.map.gz >Mar 20 14:47:46 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Feb 27 17:53 usr/lib/kbd/keymaps/legacy/atari >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 2741 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/atari/atari-de.map.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 2925 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/atari/atari-se.map.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 2767 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/atari/atari-uk-falcon.map.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 2985 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/atari/atari-us.map.gz >Mar 20 14:47:46 spectre dracut[28156]: drwxr-xr-x 11 root root 0 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386 >Mar 20 14:47:46 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 usr/lib/kbd/keymaps/legacy/i386/azerty >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 886 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/azerty/azerty.map.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 901 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/azerty/be-latin1.map.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 3 root root 0 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/azerty/fr-latin0.map.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 873 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/azerty/fr-latin1.map.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 3 root root 0 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/azerty/fr-latin9.map.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 842 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/azerty/fr-old.map.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 957 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/azerty/fr-pc.map.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 3 root root 5683 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/azerty/fr.map.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 343 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/azerty/wangbe.map.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1786 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/azerty/wangbe2.map.gz >Mar 20 14:47:46 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Feb 27 17:53 usr/lib/kbd/keymaps/legacy/i386/bepo >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 5617 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/bepo/fr-bepo-latin9.map.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1832 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/bepo/fr-bepo.map.gz >Mar 20 14:47:46 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Feb 27 17:53 usr/lib/kbd/keymaps/legacy/i386/colemak >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1449 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/colemak/en-latin9.map.gz >Mar 20 14:47:46 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Feb 27 17:53 usr/lib/kbd/keymaps/legacy/i386/dvorak >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 145 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/dvorak/ANSI-dvorak.map.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1314 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/dvorak/dvorak-ca-fr.map.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1309 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/dvorak/dvorak-es.map.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1227 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/dvorak/dvorak-fr.map.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1205 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/dvorak/dvorak-l.map.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1202 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/dvorak/dvorak-r.map.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 2598 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/dvorak/dvorak-ru.map.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1242 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/dvorak/dvorak-sv-a1.map.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1023 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/dvorak/dvorak-sv-a5.map.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 841 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/dvorak/dvorak-uk.map.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 782 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/dvorak/dvorak.map.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1045 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/dvorak/no-dvorak.map.gz >Mar 20 14:47:46 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Feb 27 17:53 usr/lib/kbd/keymaps/legacy/i386/fgGIod >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 2258 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/fgGIod/tr_f-latin5.map.gz >Mar 20 14:47:46 spectre dracut[28156]: -rw-r--r-- 1 root root 1035 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/fgGIod/trf-fgGIod.map.gz >Mar 20 14:47:47 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Feb 27 17:53 usr/lib/kbd/keymaps/legacy/i386/include >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 230 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/include/applkey.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 438 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/include/azerty-layout.inc >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 65 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/include/backspace.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 278 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/include/compose.inc >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 126 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/include/ctrl.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 182 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/include/euro.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 253 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/include/euro1.inc >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 193 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/include/euro1.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 194 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/include/euro2.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 453 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/include/keypad.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 4353 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/include/linux-keys-bare.inc >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 1148 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/include/linux-keys-extd.inc >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 746 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/include/linux-with-alt-and-altgr.inc >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 3029 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/include/linux-with-modeshift-altgr.inc >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 146 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/include/linux-with-two-alt-keys.inc >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 456 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/include/qwerty-layout.inc >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 456 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/include/qwertz-layout.inc >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 426 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/include/unicode.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 116 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/include/windowkeys.map.gz >Mar 20 14:47:47 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Feb 27 17:53 usr/lib/kbd/keymaps/legacy/i386/olpc >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 876 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/olpc/es-olpc.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 852 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/olpc/pt-olpc.map.gz >Mar 20 14:47:47 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 usr/lib/kbd/keymaps/legacy/i386/qwerty >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 2499 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/bashkir.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 2981 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/bg-cp1251.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 2328 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/bg-cp855.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 4627 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/bg_bds-cp1251.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 4622 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/bg_bds-utf8.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 4540 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/bg_pho-cp1251.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 4528 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/bg_pho-utf8.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 2026 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/br-abnt.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 1104 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/br-abnt2.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 1106 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/br-latin1-abnt2.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 984 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/br-latin1-us.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 2332 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/by-cp1251.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 2854 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/by.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 2330 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/bywin-cp1251.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 1174 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/cf.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 2568 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/cz-cp1250.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 2726 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/cz-lat2-prog.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 2655 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/cz-lat2.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 8760 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/cz-qwerty.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 2408 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/defkeymap.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 2181 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/defkeymap_V1.0.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 962 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/dk-latin1.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 941 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/dk.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 987 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/emacs.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 775 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/emacs2.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 1511 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/es-cp850.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 1133 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/es.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 153 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/et-nodeadkeys.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 1141 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/et.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 1268 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/fi-latin1.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 2 root root 0 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/fi-latin9.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 857 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/fi-old.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 2 root root 1260 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/fi.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 2377 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/gr-pc.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 3660 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/gr.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 1313 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/hu101.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 12055 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/hypermap.m4 >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 1445 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/il-heb.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 1360 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/il-phonetic.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 2410 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/il.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 1762 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/is-latin1-us.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 1216 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/is-latin1.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 1054 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/it-ibm.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 1230 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/it.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 2046 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/it2.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 779 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/jp106.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 2495 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/kazakh.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 2 root root 0 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/ko.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 3387 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/ky_alt_sh-UTF-8.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 2420 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/kyrgyz.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 1058 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/la-latin1.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 2313 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/lt.baltic.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 6095 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/lt.l4.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 6172 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/lt.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 3147 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/mk-cp1251.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 3201 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/mk-utf.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 3164 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/mk.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 1745 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/mk0.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 1075 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/nl.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 1220 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/nl2.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 1714 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/no-latin1.doc >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 1533 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/no-latin1.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 805 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/no.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 387 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/pc110.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 1306 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/pl.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 1234 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/pl1.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 2247 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/pl2.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 2327 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/pl3.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 1165 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/pl4.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 989 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/pt-latin1.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 2 root root 0 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/pt-latin9.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 2 root root 930 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/pt.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 1618 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/ro.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 1435 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/ro_std.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 2316 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/ru-cp1251.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 3055 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/ru-ms.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 3046 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/ru-yawerty.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 3779 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/ru.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 3499 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/ru1.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 2591 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/ru2.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 3383 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/ru3.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 3378 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/ru4.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 2571 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/ru_win.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 3487 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/ruwin_alt-CP1251.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 3350 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/ruwin_alt-KOI8-R.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 3476 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/ruwin_alt-UTF-8.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 3456 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/ruwin_alt_sh-UTF-8.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 3373 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/ruwin_cplk-CP1251.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 3236 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/ruwin_cplk-KOI8-R.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 3363 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/ruwin_cplk-UTF-8.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 3398 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/ruwin_ct_sh-CP1251.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 3262 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/ruwin_ct_sh-KOI8-R.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 3389 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/ruwin_ct_sh-UTF-8.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 3344 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/ruwin_ctrl-CP1251.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 3207 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/ruwin_ctrl-KOI8-R.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 3334 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/ruwin_ctrl-UTF-8.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 177 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/se-fi-ir209.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 189 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/se-fi-lat6.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 2432 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/se-ir209.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 2540 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/se-lat6.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 2 root root 0 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/se-latin1.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 2614 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/sk-prog-qwerty.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 1868 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/sk-qwerty.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 2 root root 3307 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/sr-cy.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 2 root root 0 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/sr-latin.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 2 root root 1121 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/sv-latin1.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 3490 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/tj_alt-UTF8.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 1166 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/tr_q-latin5.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 1132 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/tralt.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 1578 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/trf.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 1124 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/trq.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 3374 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/ttwin_alt-UTF-8.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 3384 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/ttwin_cplk-UTF-8.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 3367 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/ttwin_ct_sh-UTF-8.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 3348 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/ttwin_ctrl-UTF-8.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 4232 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/ua-cp1251.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 6958 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/ua-utf-ws.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 6866 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/ua-utf.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 6932 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/ua-ws.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 6853 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/ua.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 765 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/uk.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 2549 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/us-acentos.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 2 root root 666 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwerty/us.map.gz >Mar 20 14:47:47 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Feb 27 17:53 usr/lib/kbd/keymaps/legacy/i386/qwertz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 1286 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwertz/croat.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 2539 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwertz/cz-us-qwertz.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 8706 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwertz/cz.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 270 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwertz/de-latin1-nodeadkeys.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 898 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwertz/de-latin1.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 347 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwertz/de-mobii.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 847 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwertz/de.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 294 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwertz/de_CH-latin1.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 2377 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwertz/de_alt_UTF-8.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 973 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwertz/fr_CH-latin1.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 873 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwertz/fr_CH.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 1252 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwertz/hu.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 942 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwertz/sg-latin1-lk450.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 992 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwertz/sg-latin1.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 924 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwertz/sg.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 3161 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwertz/sg.map.sg-decimal-separator >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 2611 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwertz/sk-prog-qwertz.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 2690 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwertz/sk-qwertz.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 1191 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/i386/qwertz/slovene.map.gz >Mar 20 14:47:47 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Feb 27 17:53 usr/lib/kbd/keymaps/legacy/include >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 517 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/include/compose.8859_7 >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 23 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/include/compose.8859_8 >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 6030 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/include/compose.latin >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 3889 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/include/compose.latin1 >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 3465 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/include/compose.latin2 >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 2037 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/include/compose.latin3 >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 2897 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/include/compose.latin4 >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 1 root root 8402 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/include/vim-compose.latin1 >Mar 20 14:47:47 spectre dracut[28156]: drwxr-xr-x 4 root root 0 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/mac >Mar 20 14:47:47 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Feb 27 17:53 usr/lib/kbd/keymaps/legacy/mac/all >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 2 root root 501 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/mac/all/mac-be.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 2 root root 288 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/mac/all/mac-de-latin1-nodeadkeys.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 2 root root 904 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/mac/all/mac-de-latin1.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 2 root root 767 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/mac/all/mac-de_CH.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 2 root root 639 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/mac/all/mac-dk-latin1.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 2 root root 799 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/mac/all/mac-dvorak.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 2 root root 490 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/mac/all/mac-es.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 2 root root 893 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/mac/all/mac-fi-latin1.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 2 root root 1108 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/mac/all/mac-fr.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 2 root root 786 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/mac/all/mac-fr_CH-latin1.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 2 root root 658 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/mac/all/mac-it.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 2 root root 1160 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/mac/all/mac-pl.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 2 root root 431 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/mac/all/mac-pt-latin1.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 2 root root 508 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/mac/all/mac-se.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 2 root root 264 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/mac/all/mac-template.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 2 root root 760 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/mac/all/mac-uk.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 2 root root 900 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/mac/all/mac-us.map.gz >Mar 20 14:47:47 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Feb 27 17:53 usr/lib/kbd/keymaps/legacy/mac/include >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 2 root root 439 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/mac/include/mac-azerty-layout.inc >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 2 root root 182 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/mac/include/mac-euro.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 2 root root 196 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/mac/include/mac-euro2.map.gz >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 2 root root 4956 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/mac/include/mac-linux-keys-bare.inc >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 2 root root 438 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/mac/include/mac-qwerty-layout.inc >Mar 20 14:47:47 spectre dracut[28156]: -rw-r--r-- 2 root root 438 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/mac/include/mac-qwertz-layout.inc >Mar 20 14:47:47 spectre dracut[28156]: drwxr-xr-x 4 root root 0 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/ppc >Mar 20 14:47:47 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 usr/lib/kbd/keymaps/legacy/ppc/all >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 2 root root 0 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/ppc/all/mac-be.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 2 root root 0 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/ppc/all/mac-de-latin1-nodeadkeys.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 2 root root 0 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/ppc/all/mac-de-latin1.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 2 root root 0 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/ppc/all/mac-de_CH.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 2 root root 0 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/ppc/all/mac-dk-latin1.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 2 root root 0 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/ppc/all/mac-dvorak.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 2 root root 0 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/ppc/all/mac-es.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 2 root root 0 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/ppc/all/mac-fi-latin1.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 2 root root 0 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/ppc/all/mac-fr.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 2 root root 0 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/ppc/all/mac-fr_CH-latin1.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 2 root root 0 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/ppc/all/mac-it.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 2 root root 0 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/ppc/all/mac-pl.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 2 root root 0 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/ppc/all/mac-pt-latin1.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 2 root root 0 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/ppc/all/mac-se.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 2 root root 0 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/ppc/all/mac-template.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 2 root root 0 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/ppc/all/mac-uk.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 2 root root 0 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/ppc/all/mac-us.map.gz >Mar 20 14:47:48 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 usr/lib/kbd/keymaps/legacy/ppc/include >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 2 root root 0 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/ppc/include/mac-azerty-layout.inc >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 2 root root 0 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/ppc/include/mac-euro.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 2 root root 0 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/ppc/include/mac-euro2.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 2 root root 0 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/ppc/include/mac-linux-keys-bare.inc >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 2 root root 0 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/ppc/include/mac-qwerty-layout.inc >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 2 root root 0 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/ppc/include/mac-qwertz-layout.inc >Mar 20 14:47:48 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Feb 27 17:53 usr/lib/kbd/keymaps/legacy/sun >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3022 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/sun/sun-pl-altgraph.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3186 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/sun/sun-pl.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 2434 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/sun/sundvorak.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 2433 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/sun/sunkeymap.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 2086 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/sun/sunt4-es.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 2167 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/sun/sunt4-fi-latin1.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 2091 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/sun/sunt4-no-latin1.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 4931 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/sun/sunt5-cz-us.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 2047 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/sun/sunt5-de-latin1.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 2145 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/sun/sunt5-es.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 2063 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/sun/sunt5-fi-latin1.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 2488 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/sun/sunt5-fr-latin1.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 2518 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/sun/sunt5-ru.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 2274 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/sun/sunt5-uk.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 4926 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/sun/sunt5-us-cz.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 1706 Feb 17 10:10 usr/lib/kbd/keymaps/legacy/sun/sunt6-uk.map.gz >Mar 20 14:47:48 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Feb 27 17:55 usr/lib/kbd/keymaps/xkb >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3941 Feb 17 10:11 usr/lib/kbd/keymaps/xkb/at-mac.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3860 Feb 17 10:11 usr/lib/kbd/keymaps/xkb/at-nodeadkeys.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3902 Feb 17 10:11 usr/lib/kbd/keymaps/xkb/at-sundeadkeys.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3902 Feb 17 10:16 usr/lib/kbd/keymaps/xkb/at.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3648 Feb 17 10:16 usr/lib/kbd/keymaps/xkb/az.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 4113 Feb 17 10:11 usr/lib/kbd/keymaps/xkb/ba-alternatequotes.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 4057 Feb 17 10:11 usr/lib/kbd/keymaps/xkb/ba-unicode.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 4061 Feb 17 10:11 usr/lib/kbd/keymaps/xkb/ba-unicodeus.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 4115 Feb 17 10:12 usr/lib/kbd/keymaps/xkb/ba-us.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 4116 Feb 17 10:16 usr/lib/kbd/keymaps/xkb/ba.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3975 Feb 17 10:11 usr/lib/kbd/keymaps/xkb/be-iso-alternate.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3938 Feb 17 10:11 usr/lib/kbd/keymaps/xkb/be-nodeadkeys.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 4021 Feb 17 10:11 usr/lib/kbd/keymaps/xkb/be-oss.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 4025 Feb 17 10:11 usr/lib/kbd/keymaps/xkb/be-oss_latin9.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 4021 Feb 17 10:11 usr/lib/kbd/keymaps/xkb/be-oss_sundeadkeys.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3946 Feb 17 10:11 usr/lib/kbd/keymaps/xkb/be-sundeadkeys.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 4161 Feb 17 10:11 usr/lib/kbd/keymaps/xkb/be-wang.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3971 Feb 17 10:16 usr/lib/kbd/keymaps/xkb/be.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3925 Feb 17 10:12 usr/lib/kbd/keymaps/xkb/br-dvorak.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3919 Feb 17 10:12 usr/lib/kbd/keymaps/xkb/br-nativo-epo.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3939 Feb 17 10:12 usr/lib/kbd/keymaps/xkb/br-nativo-us.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3927 Feb 17 10:12 usr/lib/kbd/keymaps/xkb/br-nativo.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3949 Feb 17 10:12 usr/lib/kbd/keymaps/xkb/br-nodeadkeys.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 4000 Feb 17 10:16 usr/lib/kbd/keymaps/xkb/br.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 4026 Feb 17 10:11 usr/lib/kbd/keymaps/xkb/by-latin.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3619 Feb 17 10:12 usr/lib/kbd/keymaps/xkb/ca-eng.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3694 Feb 17 10:12 usr/lib/kbd/keymaps/xkb/ca-fr-dvorak.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3702 Feb 17 10:12 usr/lib/kbd/keymaps/xkb/ca-fr-legacy.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3696 Feb 17 10:12 usr/lib/kbd/keymaps/xkb/ca-multi.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 13196 Feb 17 10:12 usr/lib/kbd/keymaps/xkb/ca-multix.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3686 Feb 17 10:16 usr/lib/kbd/keymaps/xkb/ca.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 5150 Feb 17 10:15 usr/lib/kbd/keymaps/xkb/ch-de_mac.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3972 Feb 17 10:15 usr/lib/kbd/keymaps/xkb/ch-de_nodeadkeys.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3959 Feb 17 10:15 usr/lib/kbd/keymaps/xkb/ch-de_sundeadkeys.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3960 Feb 17 10:15 usr/lib/kbd/keymaps/xkb/ch-fr.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 5178 Feb 17 10:15 usr/lib/kbd/keymaps/xkb/ch-fr_mac.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3972 Feb 17 10:15 usr/lib/kbd/keymaps/xkb/ch-fr_nodeadkeys.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3960 Feb 17 10:15 usr/lib/kbd/keymaps/xkb/ch-fr_sundeadkeys.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3953 Feb 17 10:15 usr/lib/kbd/keymaps/xkb/ch-legacy.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3959 Feb 17 10:16 usr/lib/kbd/keymaps/xkb/ch.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 4078 Feb 17 10:12 usr/lib/kbd/keymaps/xkb/cm-azerty.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 4801 Feb 17 10:12 usr/lib/kbd/keymaps/xkb/cm-dvorak.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3995 Feb 17 10:12 usr/lib/kbd/keymaps/xkb/cm-french.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 4544 Feb 17 10:12 usr/lib/kbd/keymaps/xkb/cm-qwerty.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3619 Feb 17 10:16 usr/lib/kbd/keymaps/xkb/cm.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3619 Feb 17 10:16 usr/lib/kbd/keymaps/xkb/cn.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 4190 Feb 17 10:12 usr/lib/kbd/keymaps/xkb/cz-bksl.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3781 Feb 17 10:12 usr/lib/kbd/keymaps/xkb/cz-dvorak-ucw.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 4180 Feb 17 10:12 usr/lib/kbd/keymaps/xkb/cz-qwerty.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 4165 Feb 17 10:12 usr/lib/kbd/keymaps/xkb/cz-qwerty_bksl.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 4204 Feb 17 10:16 usr/lib/kbd/keymaps/xkb/cz.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 13999 Feb 17 10:13 usr/lib/kbd/keymaps/xkb/de-T3.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3936 Feb 17 10:13 usr/lib/kbd/keymaps/xkb/de-deadacute.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3927 Feb 17 10:13 usr/lib/kbd/keymaps/xkb/de-deadgraveacute.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 4033 Feb 17 10:13 usr/lib/kbd/keymaps/xkb/de-dsb.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 4045 Feb 17 10:13 usr/lib/kbd/keymaps/xkb/de-dsb_qwertz.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3846 Feb 17 10:13 usr/lib/kbd/keymaps/xkb/de-dvorak.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3899 Feb 17 10:13 usr/lib/kbd/keymaps/xkb/de-legacy.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3941 Feb 17 10:13 usr/lib/kbd/keymaps/xkb/de-mac.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3979 Feb 17 10:13 usr/lib/kbd/keymaps/xkb/de-mac_nodeadkeys.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 5132 Feb 17 10:13 usr/lib/kbd/keymaps/xkb/de-neo.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3860 Feb 17 10:13 usr/lib/kbd/keymaps/xkb/de-nodeadkeys.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3915 Feb 17 10:13 usr/lib/kbd/keymaps/xkb/de-qwerty.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3896 Feb 17 10:13 usr/lib/kbd/keymaps/xkb/de-ro.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3858 Feb 17 10:13 usr/lib/kbd/keymaps/xkb/de-ro_nodeadkeys.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3902 Feb 17 10:13 usr/lib/kbd/keymaps/xkb/de-sundeadkeys.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3902 Feb 17 10:16 usr/lib/kbd/keymaps/xkb/de.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3796 Feb 17 10:12 usr/lib/kbd/keymaps/xkb/dk-dvorak.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3867 Feb 17 10:12 usr/lib/kbd/keymaps/xkb/dk-mac.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3917 Feb 17 10:12 usr/lib/kbd/keymaps/xkb/dk-mac_nodeadkeys.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3858 Feb 17 10:12 usr/lib/kbd/keymaps/xkb/dk-nodeadkeys.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3872 Feb 17 10:16 usr/lib/kbd/keymaps/xkb/dk.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3872 Feb 17 10:12 usr/lib/kbd/keymaps/xkb/ee-dvorak.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3846 Feb 17 10:12 usr/lib/kbd/keymaps/xkb/ee-nodeadkeys.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 4080 Feb 17 10:12 usr/lib/kbd/keymaps/xkb/ee-us.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3929 Feb 17 10:16 usr/lib/kbd/keymaps/xkb/ee.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 11019 Feb 17 10:16 usr/lib/kbd/keymaps/xkb/epo-legacy.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 4724 Feb 17 10:16 usr/lib/kbd/keymaps/xkb/epo.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 4042 Feb 17 10:15 usr/lib/kbd/keymaps/xkb/es-ast.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 4043 Feb 17 10:15 usr/lib/kbd/keymaps/xkb/es-cat.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 4026 Feb 17 10:15 usr/lib/kbd/keymaps/xkb/es-deadtilde.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3911 Feb 17 10:15 usr/lib/kbd/keymaps/xkb/es-dvorak.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 4041 Feb 17 10:15 usr/lib/kbd/keymaps/xkb/es-mac.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 4015 Feb 17 10:15 usr/lib/kbd/keymaps/xkb/es-nodeadkeys.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 4041 Feb 17 10:15 usr/lib/kbd/keymaps/xkb/es-sundeadkeys.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 4041 Feb 17 10:16 usr/lib/kbd/keymaps/xkb/es.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 5336 Feb 17 10:12 usr/lib/kbd/keymaps/xkb/fi-classic.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3901 Feb 17 10:12 usr/lib/kbd/keymaps/xkb/fi-mac.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 5063 Feb 17 10:12 usr/lib/kbd/keymaps/xkb/fi-nodeadkeys.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3840 Feb 17 10:12 usr/lib/kbd/keymaps/xkb/fi-smi.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 5418 Feb 17 10:16 usr/lib/kbd/keymaps/xkb/fi.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3851 Feb 17 10:12 usr/lib/kbd/keymaps/xkb/fo-nodeadkeys.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3865 Feb 17 10:16 usr/lib/kbd/keymaps/xkb/fo.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 4130 Feb 17 10:13 usr/lib/kbd/keymaps/xkb/fr-bepo.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 4088 Feb 17 10:13 usr/lib/kbd/keymaps/xkb/fr-bepo_latin9.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 4012 Feb 17 10:13 usr/lib/kbd/keymaps/xkb/fr-bre.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3748 Feb 17 10:13 usr/lib/kbd/keymaps/xkb/fr-dvorak.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3864 Feb 17 10:12 usr/lib/kbd/keymaps/xkb/fr-latin9.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3853 Feb 17 10:12 usr/lib/kbd/keymaps/xkb/fr-latin9_nodeadkeys.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3864 Feb 17 10:13 usr/lib/kbd/keymaps/xkb/fr-latin9_sundeadkeys.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3757 Feb 17 10:13 usr/lib/kbd/keymaps/xkb/fr-mac.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3973 Feb 17 10:12 usr/lib/kbd/keymaps/xkb/fr-nodeadkeys.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3968 Feb 17 10:13 usr/lib/kbd/keymaps/xkb/fr-oci.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3977 Feb 17 10:12 usr/lib/kbd/keymaps/xkb/fr-oss.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3983 Feb 17 10:12 usr/lib/kbd/keymaps/xkb/fr-oss_latin9.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3938 Feb 17 10:12 usr/lib/kbd/keymaps/xkb/fr-oss_nodeadkeys.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3977 Feb 17 10:12 usr/lib/kbd/keymaps/xkb/fr-oss_sundeadkeys.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3998 Feb 17 10:12 usr/lib/kbd/keymaps/xkb/fr-sundeadkeys.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3998 Feb 17 10:16 usr/lib/kbd/keymaps/xkb/fr.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 4030 Feb 17 10:16 usr/lib/kbd/keymaps/xkb/gb-colemak.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 4011 Feb 17 10:16 usr/lib/kbd/keymaps/xkb/gb-dvorak.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 4024 Feb 17 10:16 usr/lib/kbd/keymaps/xkb/gb-dvorakukp.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3967 Feb 17 10:16 usr/lib/kbd/keymaps/xkb/gb-extd.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3960 Feb 17 10:16 usr/lib/kbd/keymaps/xkb/gb-intl.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3976 Feb 17 10:16 usr/lib/kbd/keymaps/xkb/gb-mac.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3944 Feb 17 10:16 usr/lib/kbd/keymaps/xkb/gb-mac_intl.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3994 Feb 17 10:16 usr/lib/kbd/keymaps/xkb/gb.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 4022 Feb 17 10:13 usr/lib/kbd/keymaps/xkb/ge-ergonomic.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3668 Feb 17 10:13 usr/lib/kbd/keymaps/xkb/ge-mess.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3488 Feb 17 10:13 usr/lib/kbd/keymaps/xkb/ge-ru.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3536 Feb 17 10:16 usr/lib/kbd/keymaps/xkb/ge.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3652 Feb 17 10:13 usr/lib/kbd/keymaps/xkb/gh-akan.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3653 Feb 17 10:13 usr/lib/kbd/keymaps/xkb/gh-avn.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3687 Feb 17 10:13 usr/lib/kbd/keymaps/xkb/gh-ewe.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3722 Feb 17 10:13 usr/lib/kbd/keymaps/xkb/gh-fula.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3661 Feb 17 10:13 usr/lib/kbd/keymaps/xkb/gh-ga.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3700 Feb 17 10:13 usr/lib/kbd/keymaps/xkb/gh-generic.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3752 Feb 17 10:13 usr/lib/kbd/keymaps/xkb/gh-gillbt.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3722 Feb 17 10:13 usr/lib/kbd/keymaps/xkb/gh-hausa.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3629 Feb 17 10:17 usr/lib/kbd/keymaps/xkb/gh.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 4113 Feb 17 10:12 usr/lib/kbd/keymaps/xkb/hr-alternatequotes.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 4057 Feb 17 10:12 usr/lib/kbd/keymaps/xkb/hr-unicode.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 4061 Feb 17 10:12 usr/lib/kbd/keymaps/xkb/hr-unicodeus.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3888 Feb 17 10:12 usr/lib/kbd/keymaps/xkb/hr-us.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 4106 Feb 17 10:17 usr/lib/kbd/keymaps/xkb/hr.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 4013 Feb 17 10:13 usr/lib/kbd/keymaps/xkb/hu-101_qwerty_comma_dead.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3949 Feb 17 10:13 usr/lib/kbd/keymaps/xkb/hu-101_qwerty_comma_nodead.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 4010 Feb 17 10:13 usr/lib/kbd/keymaps/xkb/hu-101_qwerty_dot_dead.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3947 Feb 17 10:13 usr/lib/kbd/keymaps/xkb/hu-101_qwerty_dot_nodead.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 4014 Feb 17 10:13 usr/lib/kbd/keymaps/xkb/hu-101_qwertz_comma_dead.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3951 Feb 17 10:13 usr/lib/kbd/keymaps/xkb/hu-101_qwertz_comma_nodead.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 4011 Feb 17 10:13 usr/lib/kbd/keymaps/xkb/hu-101_qwertz_dot_dead.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3949 Feb 17 10:13 usr/lib/kbd/keymaps/xkb/hu-101_qwertz_dot_nodead.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 4007 Feb 17 10:13 usr/lib/kbd/keymaps/xkb/hu-102_qwerty_comma_dead.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3943 Feb 17 10:13 usr/lib/kbd/keymaps/xkb/hu-102_qwerty_comma_nodead.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 4004 Feb 17 10:13 usr/lib/kbd/keymaps/xkb/hu-102_qwerty_dot_dead.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3940 Feb 17 10:13 usr/lib/kbd/keymaps/xkb/hu-102_qwerty_dot_nodead.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 4009 Feb 17 10:13 usr/lib/kbd/keymaps/xkb/hu-102_qwertz_comma_dead.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3945 Feb 17 10:13 usr/lib/kbd/keymaps/xkb/hu-102_qwertz_comma_nodead.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 4006 Feb 17 10:13 usr/lib/kbd/keymaps/xkb/hu-102_qwertz_dot_dead.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3942 Feb 17 10:13 usr/lib/kbd/keymaps/xkb/hu-102_qwertz_dot_nodead.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3945 Feb 17 10:13 usr/lib/kbd/keymaps/xkb/hu-nodeadkeys.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 4013 Feb 17 10:13 usr/lib/kbd/keymaps/xkb/hu-qwerty.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 4009 Feb 17 10:13 usr/lib/kbd/keymaps/xkb/hu-standard.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 4009 Feb 17 10:17 usr/lib/kbd/keymaps/xkb/hu.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 4611 Feb 17 10:16 usr/lib/kbd/keymaps/xkb/ie-CloGaelach.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 7611 Feb 17 10:16 usr/lib/kbd/keymaps/xkb/ie-UnicodeExpert.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3469 Feb 17 10:16 usr/lib/kbd/keymaps/xkb/ie-ogam_is434.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 6258 Feb 17 10:17 usr/lib/kbd/keymaps/xkb/ie.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3921 Feb 17 10:17 usr/lib/kbd/keymaps/xkb/il.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3628 Feb 17 10:11 usr/lib/kbd/keymaps/xkb/in-eng.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3841 Feb 17 10:12 usr/lib/kbd/keymaps/xkb/iq-ku.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3941 Feb 17 10:12 usr/lib/kbd/keymaps/xkb/iq-ku_alt.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3832 Feb 17 10:12 usr/lib/kbd/keymaps/xkb/iq-ku_ara.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3834 Feb 17 10:12 usr/lib/kbd/keymaps/xkb/iq-ku_f.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3841 Feb 17 10:12 usr/lib/kbd/keymaps/xkb/ir-ku.map.gz >Mar 20 14:47:48 spectre dracut[28156]: -rw-r--r-- 1 root root 3941 Feb 17 10:12 usr/lib/kbd/keymaps/xkb/ir-ku_alt.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3832 Feb 17 10:12 usr/lib/kbd/keymaps/xkb/ir-ku_ara.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3834 Feb 17 10:12 usr/lib/kbd/keymaps/xkb/ir-ku_f.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3827 Feb 17 10:13 usr/lib/kbd/keymaps/xkb/is-Sundeadkeys.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3858 Feb 17 10:13 usr/lib/kbd/keymaps/xkb/is-dvorak.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3863 Feb 17 10:13 usr/lib/kbd/keymaps/xkb/is-mac.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3822 Feb 17 10:13 usr/lib/kbd/keymaps/xkb/is-nodeadkeys.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3899 Feb 17 10:17 usr/lib/kbd/keymaps/xkb/is.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3751 Feb 17 10:14 usr/lib/kbd/keymaps/xkb/it-geo.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3629 Feb 17 10:14 usr/lib/kbd/keymaps/xkb/it-ibm.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3691 Feb 17 10:14 usr/lib/kbd/keymaps/xkb/it-mac.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3884 Feb 17 10:13 usr/lib/kbd/keymaps/xkb/it-nodeadkeys.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3853 Feb 17 10:14 usr/lib/kbd/keymaps/xkb/it-us.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3937 Feb 17 10:17 usr/lib/kbd/keymaps/xkb/it.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3619 Feb 17 10:14 usr/lib/kbd/keymaps/xkb/jp-OADG109A.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3618 Feb 17 10:14 usr/lib/kbd/keymaps/xkb/jp-dvorak.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3626 Feb 17 10:14 usr/lib/kbd/keymaps/xkb/jp-kana86.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3634 Feb 17 10:17 usr/lib/kbd/keymaps/xkb/jp.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3655 Feb 17 10:16 usr/lib/kbd/keymaps/xkb/ke-kik.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3655 Feb 17 10:17 usr/lib/kbd/keymaps/xkb/ke.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3614 Feb 17 10:16 usr/lib/kbd/keymaps/xkb/kr-kr104.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3619 Feb 17 10:17 usr/lib/kbd/keymaps/xkb/kr.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 4032 Feb 17 10:14 usr/lib/kbd/keymaps/xkb/latam-deadtilde.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3994 Feb 17 10:14 usr/lib/kbd/keymaps/xkb/latam-nodeadkeys.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 4033 Feb 17 10:14 usr/lib/kbd/keymaps/xkb/latam-sundeadkeys.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 4029 Feb 17 10:17 usr/lib/kbd/keymaps/xkb/latam.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3991 Feb 17 10:14 usr/lib/kbd/keymaps/xkb/lt-ibm.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3790 Feb 17 10:14 usr/lib/kbd/keymaps/xkb/lt-lekp.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3828 Feb 17 10:14 usr/lib/kbd/keymaps/xkb/lt-lekpa.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3965 Feb 17 10:14 usr/lib/kbd/keymaps/xkb/lt-std.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3989 Feb 17 10:14 usr/lib/kbd/keymaps/xkb/lt-us.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3995 Feb 17 10:17 usr/lib/kbd/keymaps/xkb/lt.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3852 Feb 17 10:14 usr/lib/kbd/keymaps/xkb/lv-adapted.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3869 Feb 17 10:14 usr/lib/kbd/keymaps/xkb/lv-apostrophe.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3778 Feb 17 10:14 usr/lib/kbd/keymaps/xkb/lv-ergonomic.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3857 Feb 17 10:14 usr/lib/kbd/keymaps/xkb/lv-fkey.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3971 Feb 17 10:14 usr/lib/kbd/keymaps/xkb/lv-modern.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3877 Feb 17 10:14 usr/lib/kbd/keymaps/xkb/lv-tilde.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3866 Feb 17 10:17 usr/lib/kbd/keymaps/xkb/lv.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3998 Feb 17 10:12 usr/lib/kbd/keymaps/xkb/ma-french.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3681 Feb 17 10:16 usr/lib/kbd/keymaps/xkb/md-gag.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3792 Feb 17 10:17 usr/lib/kbd/keymaps/xkb/md.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 4103 Feb 17 10:14 usr/lib/kbd/keymaps/xkb/me-latinalternatequotes.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 4064 Feb 17 10:14 usr/lib/kbd/keymaps/xkb/me-latinunicode.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 4073 Feb 17 10:14 usr/lib/kbd/keymaps/xkb/me-latinunicodeyz.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 4128 Feb 17 10:14 usr/lib/kbd/keymaps/xkb/me-latinyz.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 4123 Feb 17 10:17 usr/lib/kbd/keymaps/xkb/me.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 4015 Feb 17 10:16 usr/lib/kbd/keymaps/xkb/ml-fr-oss.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3903 Feb 17 10:16 usr/lib/kbd/keymaps/xkb/ml-us-intl.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3994 Feb 17 10:16 usr/lib/kbd/keymaps/xkb/ml-us-mac.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 4015 Feb 17 10:17 usr/lib/kbd/keymaps/xkb/ml.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 4000 Feb 17 10:14 usr/lib/kbd/keymaps/xkb/mt-us.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3970 Feb 17 10:17 usr/lib/kbd/keymaps/xkb/mt.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3723 Feb 17 10:16 usr/lib/kbd/keymaps/xkb/ng-hausa.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3663 Feb 17 10:16 usr/lib/kbd/keymaps/xkb/ng-igbo.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3658 Feb 17 10:16 usr/lib/kbd/keymaps/xkb/ng-yoruba.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3630 Feb 17 10:17 usr/lib/kbd/keymaps/xkb/ng.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 4001 Feb 17 10:12 usr/lib/kbd/keymaps/xkb/nl-mac.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3670 Feb 17 10:12 usr/lib/kbd/keymaps/xkb/nl-std.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3925 Feb 17 10:12 usr/lib/kbd/keymaps/xkb/nl-sundeadkeys.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3925 Feb 17 10:17 usr/lib/kbd/keymaps/xkb/nl.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3918 Feb 17 10:14 usr/lib/kbd/keymaps/xkb/no-colemak.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3774 Feb 17 10:14 usr/lib/kbd/keymaps/xkb/no-dvorak.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3942 Feb 17 10:14 usr/lib/kbd/keymaps/xkb/no-mac.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3914 Feb 17 10:14 usr/lib/kbd/keymaps/xkb/no-mac_nodeadkeys.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3956 Feb 17 10:14 usr/lib/kbd/keymaps/xkb/no-nodeadkeys.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3840 Feb 17 10:14 usr/lib/kbd/keymaps/xkb/no-smi.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3826 Feb 17 10:14 usr/lib/kbd/keymaps/xkb/no-smi_nodeadkeys.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3922 Feb 17 10:17 usr/lib/kbd/keymaps/xkb/no.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3792 Feb 17 10:16 usr/lib/kbd/keymaps/xkb/ph-capewell-dvorak.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3791 Feb 17 10:16 usr/lib/kbd/keymaps/xkb/ph-capewell-qwerf2k6.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3788 Feb 17 10:16 usr/lib/kbd/keymaps/xkb/ph-colemak.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3788 Feb 17 10:16 usr/lib/kbd/keymaps/xkb/ph-dvorak.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3794 Feb 17 10:17 usr/lib/kbd/keymaps/xkb/ph.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 4008 Feb 17 10:14 usr/lib/kbd/keymaps/xkb/pl-csb.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3763 Feb 17 10:14 usr/lib/kbd/keymaps/xkb/pl-dvorak.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3768 Feb 17 10:14 usr/lib/kbd/keymaps/xkb/pl-dvorak_altquotes.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3768 Feb 17 10:14 usr/lib/kbd/keymaps/xkb/pl-dvorak_quotes.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3830 Feb 17 10:14 usr/lib/kbd/keymaps/xkb/pl-dvp.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 4033 Feb 17 10:14 usr/lib/kbd/keymaps/xkb/pl-legacy.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 4074 Feb 17 10:14 usr/lib/kbd/keymaps/xkb/pl-qwertz.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 4019 Feb 17 10:14 usr/lib/kbd/keymaps/xkb/pl-szl.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3961 Feb 17 10:17 usr/lib/kbd/keymaps/xkb/pl.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3937 Feb 17 10:14 usr/lib/kbd/keymaps/xkb/pt-mac.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3954 Feb 17 10:14 usr/lib/kbd/keymaps/xkb/pt-mac_nodeadkeys.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3929 Feb 17 10:14 usr/lib/kbd/keymaps/xkb/pt-mac_sundeadkeys.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3865 Feb 17 10:14 usr/lib/kbd/keymaps/xkb/pt-nativo-epo.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3849 Feb 17 10:14 usr/lib/kbd/keymaps/xkb/pt-nativo-us.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3843 Feb 17 10:14 usr/lib/kbd/keymaps/xkb/pt-nativo.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3917 Feb 17 10:14 usr/lib/kbd/keymaps/xkb/pt-nodeadkeys.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3905 Feb 17 10:14 usr/lib/kbd/keymaps/xkb/pt-sundeadkeys.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3912 Feb 17 10:17 usr/lib/kbd/keymaps/xkb/pt.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3793 Feb 17 10:14 usr/lib/kbd/keymaps/xkb/ro-cedilla.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3810 Feb 17 10:14 usr/lib/kbd/keymaps/xkb/ro-std.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3813 Feb 17 10:14 usr/lib/kbd/keymaps/xkb/ro-std_cedilla.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3957 Feb 17 10:14 usr/lib/kbd/keymaps/xkb/ro-winkeys.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3792 Feb 17 10:17 usr/lib/kbd/keymaps/xkb/ro.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 4116 Feb 17 10:15 usr/lib/kbd/keymaps/xkb/rs-latin.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 4113 Feb 17 10:15 usr/lib/kbd/keymaps/xkb/rs-latinalternatequotes.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 4057 Feb 17 10:15 usr/lib/kbd/keymaps/xkb/rs-latinunicode.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 4061 Feb 17 10:15 usr/lib/kbd/keymaps/xkb/rs-latinunicodeyz.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 4115 Feb 17 10:15 usr/lib/kbd/keymaps/xkb/rs-latinyz.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3799 Feb 17 10:15 usr/lib/kbd/keymaps/xkb/ru-cv_latin.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3941 Feb 17 10:15 usr/lib/kbd/keymaps/xkb/se-dvorak.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3901 Feb 17 10:15 usr/lib/kbd/keymaps/xkb/se-mac.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3824 Feb 17 10:15 usr/lib/kbd/keymaps/xkb/se-nodeadkeys.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3840 Feb 17 10:15 usr/lib/kbd/keymaps/xkb/se-smi.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3934 Feb 17 10:15 usr/lib/kbd/keymaps/xkb/se-svdvorak.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3831 Feb 17 10:17 usr/lib/kbd/keymaps/xkb/se.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 4072 Feb 17 10:15 usr/lib/kbd/keymaps/xkb/si-alternatequotes.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 4075 Feb 17 10:15 usr/lib/kbd/keymaps/xkb/si-us.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 4076 Feb 17 10:17 usr/lib/kbd/keymaps/xkb/si.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 4183 Feb 17 10:15 usr/lib/kbd/keymaps/xkb/sk-bksl.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 4192 Feb 17 10:15 usr/lib/kbd/keymaps/xkb/sk-qwerty.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 4181 Feb 17 10:15 usr/lib/kbd/keymaps/xkb/sk-qwerty_bksl.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 4194 Feb 17 10:17 usr/lib/kbd/keymaps/xkb/sk.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3841 Feb 17 10:15 usr/lib/kbd/keymaps/xkb/sy-ku.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3941 Feb 17 10:15 usr/lib/kbd/keymaps/xkb/sy-ku_alt.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3834 Feb 17 10:15 usr/lib/kbd/keymaps/xkb/sy-ku_f.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3671 Feb 17 10:16 usr/lib/kbd/keymaps/xkb/tm-alt.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3684 Feb 17 10:17 usr/lib/kbd/keymaps/xkb/tm.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3949 Feb 17 10:15 usr/lib/kbd/keymaps/xkb/tr-alt.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3888 Feb 17 10:15 usr/lib/kbd/keymaps/xkb/tr-crh.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3948 Feb 17 10:15 usr/lib/kbd/keymaps/xkb/tr-crh_alt.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3844 Feb 17 10:15 usr/lib/kbd/keymaps/xkb/tr-crh_f.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3819 Feb 17 10:15 usr/lib/kbd/keymaps/xkb/tr-f.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3815 Feb 17 10:15 usr/lib/kbd/keymaps/xkb/tr-intl.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3841 Feb 17 10:15 usr/lib/kbd/keymaps/xkb/tr-ku.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3941 Feb 17 10:15 usr/lib/kbd/keymaps/xkb/tr-ku_alt.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3834 Feb 17 10:15 usr/lib/kbd/keymaps/xkb/tr-ku_f.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3870 Feb 17 10:15 usr/lib/kbd/keymaps/xkb/tr-sundeadkeys.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3870 Feb 17 10:17 usr/lib/kbd/keymaps/xkb/tr.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 4394 Feb 17 10:15 usr/lib/kbd/keymaps/xkb/tw-indigenous.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 4393 Feb 17 10:15 usr/lib/kbd/keymaps/xkb/tw-saisiyat.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 4394 Feb 17 10:17 usr/lib/kbd/keymaps/xkb/tw.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3742 Feb 17 10:10 usr/lib/kbd/keymaps/xkb/us-alt-intl.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3866 Feb 17 10:10 usr/lib/kbd/keymaps/xkb/us-altgr-intl.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 4048 Feb 17 10:10 usr/lib/kbd/keymaps/xkb/us-colemak.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3753 Feb 17 10:10 usr/lib/kbd/keymaps/xkb/us-dvorak-alt-intl.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3679 Feb 17 10:10 usr/lib/kbd/keymaps/xkb/us-dvorak-classic.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3857 Feb 17 10:10 usr/lib/kbd/keymaps/xkb/us-dvorak-intl.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3719 Feb 17 10:10 usr/lib/kbd/keymaps/xkb/us-dvorak-l.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3713 Feb 17 10:10 usr/lib/kbd/keymaps/xkb/us-dvorak-r.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3684 Feb 17 10:10 usr/lib/kbd/keymaps/xkb/us-dvorak.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3762 Feb 17 10:10 usr/lib/kbd/keymaps/xkb/us-dvp.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3763 Feb 17 10:10 usr/lib/kbd/keymaps/xkb/us-euro.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3714 Feb 17 10:10 usr/lib/kbd/keymaps/xkb/us-hbs.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3865 Feb 17 10:10 usr/lib/kbd/keymaps/xkb/us-intl.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3986 Feb 17 10:10 usr/lib/kbd/keymaps/xkb/us-mac.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3758 Feb 17 10:10 usr/lib/kbd/keymaps/xkb/us-olpc2.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3883 Feb 17 10:10 usr/lib/kbd/keymaps/xkb/us-workman-intl.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3643 Feb 17 10:10 usr/lib/kbd/keymaps/xkb/us-workman.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3619 Feb 17 10:17 usr/lib/kbd/keymaps/xkb/us.map.gz >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3612 Feb 17 10:16 usr/lib/kbd/keymaps/xkb/uz-latin.map.gz >Mar 20 14:47:49 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 usr/lib/kbd/unimaps >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 4244 Feb 17 10:10 usr/lib/kbd/unimaps/8859-1.a0-ff.uni >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 4706 Feb 17 10:10 usr/lib/kbd/unimaps/8859-10.a0-ff.uni >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 4426 Feb 17 10:10 usr/lib/kbd/unimaps/8859-13.a0-ff.uni >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 4816 Feb 17 10:10 usr/lib/kbd/unimaps/8859-14.a0-ff.uni >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 4376 Feb 17 10:10 usr/lib/kbd/unimaps/8859-15.a0-ff.uni >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 4479 Feb 17 10:10 usr/lib/kbd/unimaps/8859-2.a0-ff.uni >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 4240 Feb 17 10:10 usr/lib/kbd/unimaps/8859-3.a0-ff.uni >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 4548 Feb 17 10:10 usr/lib/kbd/unimaps/8859-4.a0-ff.uni >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 4188 Feb 17 10:10 usr/lib/kbd/unimaps/8859-5.a0-ff.uni >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 1869 Feb 17 10:10 usr/lib/kbd/unimaps/8859-6.a0-ff.uni >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3928 Feb 17 10:10 usr/lib/kbd/unimaps/8859-7.a0-ff.uni >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 2035 Feb 17 10:10 usr/lib/kbd/unimaps/8859-8.a0-ff.uni >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 4332 Feb 17 10:10 usr/lib/kbd/unimaps/8859-9.a0-ff.uni >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 1494 Feb 17 10:10 usr/lib/kbd/unimaps/ECMA144.uni >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 1378 Feb 17 10:10 usr/lib/kbd/unimaps/armscii8.uni >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 1707 Feb 17 10:10 usr/lib/kbd/unimaps/ascii.20-7f.uni >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 5478 Feb 17 10:10 usr/lib/kbd/unimaps/cp1250.uni >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 446 Feb 17 10:10 usr/lib/kbd/unimaps/cp437.00-1f.uni >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 4475 Feb 17 10:10 usr/lib/kbd/unimaps/cp437.uni >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 5674 Feb 17 10:10 usr/lib/kbd/unimaps/cp737.uni >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 6199 Feb 17 10:10 usr/lib/kbd/unimaps/cp737a.uni >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 6215 Feb 17 10:10 usr/lib/kbd/unimaps/cp737b.uni >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 6266 Feb 17 10:10 usr/lib/kbd/unimaps/cp737c.uni >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 5456 Feb 17 10:10 usr/lib/kbd/unimaps/cp850.uni >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 5985 Feb 17 10:10 usr/lib/kbd/unimaps/cp850a.uni >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 4011 Feb 17 10:10 usr/lib/kbd/unimaps/cp850b.uni >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3880 Feb 17 10:10 usr/lib/kbd/unimaps/cp850z.uni >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 5627 Feb 17 10:10 usr/lib/kbd/unimaps/cp865.uni >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 6155 Feb 17 10:10 usr/lib/kbd/unimaps/cp865a.uni >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 5553 Feb 17 10:10 usr/lib/kbd/unimaps/cp866.uni >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 6174 Feb 17 10:10 usr/lib/kbd/unimaps/cp866a.uni >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 2558 Feb 17 10:10 usr/lib/kbd/unimaps/cybercafe.uni >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 4152 Feb 17 10:10 usr/lib/kbd/unimaps/cyralt.uni >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 2206 Feb 17 10:10 usr/lib/kbd/unimaps/def.uni >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 22 Feb 17 10:10 usr/lib/kbd/unimaps/empty.uni >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 5981 Feb 17 10:10 usr/lib/kbd/unimaps/ethiopic.uni >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 674 Feb 17 10:10 usr/lib/kbd/unimaps/iso01.uni >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 1815 Feb 17 10:10 usr/lib/kbd/unimaps/iso02.uni >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 1829 Feb 17 10:10 usr/lib/kbd/unimaps/iso03.uni >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 1815 Feb 17 10:10 usr/lib/kbd/unimaps/iso04.uni >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 1815 Feb 17 10:10 usr/lib/kbd/unimaps/iso05.uni >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 1275 Feb 17 10:10 usr/lib/kbd/unimaps/iso06.uni >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 1744 Feb 17 10:10 usr/lib/kbd/unimaps/iso07.uni >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 2507 Feb 17 10:10 usr/lib/kbd/unimaps/iso07u.uni >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 1119 Feb 17 10:10 usr/lib/kbd/unimaps/iso08.uni >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 805 Feb 17 10:10 usr/lib/kbd/unimaps/iso09.uni >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 1489 Feb 17 10:10 usr/lib/kbd/unimaps/iso10.uni >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 876 Feb 17 10:10 usr/lib/kbd/unimaps/iso15.uni >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3998 Feb 17 10:10 usr/lib/kbd/unimaps/koi8r.uni >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 5224 Feb 17 10:10 usr/lib/kbd/unimaps/koi8u.uni >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 1030 Feb 17 10:10 usr/lib/kbd/unimaps/lat1.uni >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 2177 Feb 17 10:10 usr/lib/kbd/unimaps/lat1u.uni >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 5302 Feb 17 10:10 usr/lib/kbd/unimaps/lat2.uni >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3632 Feb 17 10:10 usr/lib/kbd/unimaps/lat2u.uni >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3251 Feb 17 10:10 usr/lib/kbd/unimaps/lat4.uni >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 5046 Feb 17 10:10 usr/lib/kbd/unimaps/lat4u.uni >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 7282 Feb 17 10:10 usr/lib/kbd/unimaps/lat7.uni >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3579 Feb 17 10:10 usr/lib/kbd/unimaps/lat9u.uni >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3771 Feb 17 10:10 usr/lib/kbd/unimaps/lat9v.uni >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 3635 Feb 17 10:10 usr/lib/kbd/unimaps/lat9w.uni >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 4030 Feb 17 10:10 usr/lib/kbd/unimaps/ruscii.uni >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 1009 Feb 17 10:10 usr/lib/kbd/unimaps/tcvn.uni >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 1811 Feb 17 10:10 usr/lib/kbd/unimaps/viscii.uni >Mar 20 14:47:49 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 usr/lib/modprobe.d >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 382 Feb 27 05:07 usr/lib/modprobe.d/dist-alsa.conf >Mar 20 14:47:49 spectre dracut[28156]: -rw-r--r-- 1 root root 884 Mar 18 08:24 usr/lib/modprobe.d/dist-blacklist.conf >Mar 20 14:47:49 spectre dracut[28156]: drwxr-xr-x 3 root root 0 Mar 20 14:47 usr/lib/modules >Mar 20 14:47:50 spectre dracut[28156]: drwxr-xr-x 3 root root 0 Mar 20 14:47 usr/lib/modules/3.14.0-0.rc7.git0.1.fc21.x86_64 >Mar 20 14:47:50 spectre dracut[28156]: drwxr-xr-x 4 root root 0 Mar 20 14:47 usr/lib/modules/3.14.0-0.rc7.git0.1.fc21.x86_64/kernel >Mar 20 14:47:50 spectre dracut[28156]: drwxr-xr-x 10 root root 0 Mar 20 14:47 usr/lib/modules/3.14.0-0.rc7.git0.1.fc21.x86_64/kernel/drivers >Mar 20 14:47:50 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 usr/lib/modules/3.14.0-0.rc7.git0.1.fc21.x86_64/kernel/drivers/ata >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 11431 Mar 17 10:07 usr/lib/modules/3.14.0-0.rc7.git0.1.fc21.x86_64/kernel/drivers/ata/ata_generic.ko >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 10103 Mar 17 10:07 usr/lib/modules/3.14.0-0.rc7.git0.1.fc21.x86_64/kernel/drivers/ata/pata_acpi.ko >Mar 20 14:47:50 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 usr/lib/modules/3.14.0-0.rc7.git0.1.fc21.x86_64/kernel/drivers/block >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 20879 Mar 17 10:08 usr/lib/modules/3.14.0-0.rc7.git0.1.fc21.x86_64/kernel/drivers/block/virtio_blk.ko >Mar 20 14:47:50 spectre dracut[28156]: drwxr-xr-x 3 root root 0 Mar 20 14:47 usr/lib/modules/3.14.0-0.rc7.git0.1.fc21.x86_64/kernel/drivers/gpu >Mar 20 14:47:50 spectre dracut[28156]: drwxr-xr-x 4 root root 0 Mar 20 14:47 usr/lib/modules/3.14.0-0.rc7.git0.1.fc21.x86_64/kernel/drivers/gpu/drm >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 442247 Mar 17 10:08 usr/lib/modules/3.14.0-0.rc7.git0.1.fc21.x86_64/kernel/drivers/gpu/drm/drm.ko >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 62631 Mar 17 10:08 usr/lib/modules/3.14.0-0.rc7.git0.1.fc21.x86_64/kernel/drivers/gpu/drm/drm_kms_helper.ko >Mar 20 14:47:50 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 usr/lib/modules/3.14.0-0.rc7.git0.1.fc21.x86_64/kernel/drivers/gpu/drm/qxl >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 121727 Mar 17 10:08 usr/lib/modules/3.14.0-0.rc7.git0.1.fc21.x86_64/kernel/drivers/gpu/drm/qxl/qxl.ko >Mar 20 14:47:50 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 usr/lib/modules/3.14.0-0.rc7.git0.1.fc21.x86_64/kernel/drivers/gpu/drm/ttm >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 126343 Mar 17 10:08 usr/lib/modules/3.14.0-0.rc7.git0.1.fc21.x86_64/kernel/drivers/gpu/drm/ttm/ttm.ko >Mar 20 14:47:50 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 usr/lib/modules/3.14.0-0.rc7.git0.1.fc21.x86_64/kernel/drivers/i2c >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 58567 Mar 17 10:07 usr/lib/modules/3.14.0-0.rc7.git0.1.fc21.x86_64/kernel/drivers/i2c/i2c-core.ko >Mar 20 14:47:50 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 usr/lib/modules/3.14.0-0.rc7.git0.1.fc21.x86_64/kernel/drivers/md >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 36983 Mar 17 10:07 usr/lib/modules/3.14.0-0.rc7.git0.1.fc21.x86_64/kernel/drivers/md/dm-multipath.ko >Mar 20 14:47:50 spectre dracut[28156]: drwxr-xr-x 3 root root 0 Mar 20 14:47 usr/lib/modules/3.14.0-0.rc7.git0.1.fc21.x86_64/kernel/drivers/net >Mar 20 14:47:50 spectre dracut[28156]: drwxr-xr-x 6 root root 0 Mar 20 14:47 usr/lib/modules/3.14.0-0.rc7.git0.1.fc21.x86_64/kernel/drivers/net/ethernet >Mar 20 14:47:50 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 usr/lib/modules/3.14.0-0.rc7.git0.1.fc21.x86_64/kernel/drivers/net/ethernet/8390 >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 22071 Mar 17 10:08 usr/lib/modules/3.14.0-0.rc7.git0.1.fc21.x86_64/kernel/drivers/net/ethernet/8390/8390.ko >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 19391 Mar 17 10:08 usr/lib/modules/3.14.0-0.rc7.git0.1.fc21.x86_64/kernel/drivers/net/ethernet/8390/ne2k-pci.ko >Mar 20 14:47:50 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 usr/lib/modules/3.14.0-0.rc7.git0.1.fc21.x86_64/kernel/drivers/net/ethernet/amd >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 61679 Mar 17 10:08 usr/lib/modules/3.14.0-0.rc7.git0.1.fc21.x86_64/kernel/drivers/net/ethernet/amd/pcnet32.ko >Mar 20 14:47:50 spectre dracut[28156]: drwxr-xr-x 3 root root 0 Mar 20 14:47 usr/lib/modules/3.14.0-0.rc7.git0.1.fc21.x86_64/kernel/drivers/net/ethernet/intel >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 60071 Mar 17 10:08 usr/lib/modules/3.14.0-0.rc7.git0.1.fc21.x86_64/kernel/drivers/net/ethernet/intel/e100.ko >Mar 20 14:47:50 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 usr/lib/modules/3.14.0-0.rc7.git0.1.fc21.x86_64/kernel/drivers/net/ethernet/intel/e1000 >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 242479 Mar 17 10:08 usr/lib/modules/3.14.0-0.rc7.git0.1.fc21.x86_64/kernel/drivers/net/ethernet/intel/e1000/e1000.ko >Mar 20 14:47:50 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 usr/lib/modules/3.14.0-0.rc7.git0.1.fc21.x86_64/kernel/drivers/net/ethernet/realtek >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 44343 Mar 17 10:08 usr/lib/modules/3.14.0-0.rc7.git0.1.fc21.x86_64/kernel/drivers/net/ethernet/realtek/8139cp.ko >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 8983 Mar 17 10:08 usr/lib/modules/3.14.0-0.rc7.git0.1.fc21.x86_64/kernel/drivers/net/mii.ko >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 46223 Mar 17 10:08 usr/lib/modules/3.14.0-0.rc7.git0.1.fc21.x86_64/kernel/drivers/net/virtio_net.ko >Mar 20 14:47:50 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 usr/lib/modules/3.14.0-0.rc7.git0.1.fc21.x86_64/kernel/drivers/scsi >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 24479 Mar 17 10:07 usr/lib/modules/3.14.0-0.rc7.git0.1.fc21.x86_64/kernel/drivers/scsi/virtio_scsi.ko >Mar 20 14:47:50 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 usr/lib/modules/3.14.0-0.rc7.git0.1.fc21.x86_64/kernel/drivers/virtio >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 11799 Mar 17 10:07 usr/lib/modules/3.14.0-0.rc7.git0.1.fc21.x86_64/kernel/drivers/virtio/virtio.ko >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 17999 Mar 17 10:07 usr/lib/modules/3.14.0-0.rc7.git0.1.fc21.x86_64/kernel/drivers/virtio/virtio_pci.ko >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 19039 Mar 17 10:07 usr/lib/modules/3.14.0-0.rc7.git0.1.fc21.x86_64/kernel/drivers/virtio/virtio_ring.ko >Mar 20 14:47:50 spectre dracut[28156]: drwxr-xr-x 5 root root 0 Mar 20 14:47 usr/lib/modules/3.14.0-0.rc7.git0.1.fc21.x86_64/kernel/net >Mar 20 14:47:50 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 usr/lib/modules/3.14.0-0.rc7.git0.1.fc21.x86_64/kernel/net/802 >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 6207 Mar 17 10:06 usr/lib/modules/3.14.0-0.rc7.git0.1.fc21.x86_64/kernel/net/802/stp.ko >Mar 20 14:47:50 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 usr/lib/modules/3.14.0-0.rc7.git0.1.fc21.x86_64/kernel/net/bridge >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 180703 Mar 17 10:06 usr/lib/modules/3.14.0-0.rc7.git0.1.fc21.x86_64/kernel/net/bridge/bridge.ko >Mar 20 14:47:50 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 usr/lib/modules/3.14.0-0.rc7.git0.1.fc21.x86_64/kernel/net/llc >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 11903 Mar 17 10:06 usr/lib/modules/3.14.0-0.rc7.git0.1.fc21.x86_64/kernel/net/llc/llc.ko >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 5698 Mar 20 14:47 usr/lib/modules/3.14.0-0.rc7.git0.1.fc21.x86_64/modules.alias >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 5165 Mar 20 14:47 usr/lib/modules/3.14.0-0.rc7.git0.1.fc21.x86_64/modules.alias.bin >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 6680 Mar 17 09:53 usr/lib/modules/3.14.0-0.rc7.git0.1.fc21.x86_64/modules.builtin >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 9317 Mar 20 14:47 usr/lib/modules/3.14.0-0.rc7.git0.1.fc21.x86_64/modules.builtin.bin >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 1616 Mar 20 14:47 usr/lib/modules/3.14.0-0.rc7.git0.1.fc21.x86_64/modules.dep >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 2341 Mar 20 14:47 usr/lib/modules/3.14.0-0.rc7.git0.1.fc21.x86_64/modules.dep.bin >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 52 Mar 20 14:47 usr/lib/modules/3.14.0-0.rc7.git0.1.fc21.x86_64/modules.devname >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 101570 Mar 17 09:53 usr/lib/modules/3.14.0-0.rc7.git0.1.fc21.x86_64/modules.order >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 131 Mar 20 14:47 usr/lib/modules/3.14.0-0.rc7.git0.1.fc21.x86_64/modules.softdep >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 19106 Mar 20 14:47 usr/lib/modules/3.14.0-0.rc7.git0.1.fc21.x86_64/modules.symbols >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 22631 Mar 20 14:47 usr/lib/modules/3.14.0-0.rc7.git0.1.fc21.x86_64/modules.symbols.bin >Mar 20 14:47:50 spectre dracut[28156]: -rwxr-xr-x 1 root root 14302 Feb 6 11:13 usr/lib/net-lib.sh >Mar 20 14:47:50 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 usr/lib/sysctl.d >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 293 Jan 14 08:08 usr/lib/sysctl.d/00-system.conf >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 710 Mar 17 12:38 usr/lib/sysctl.d/50-default.conf >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 499 Mar 3 06:31 usr/lib/sysctl.d/libvirtd.conf >Mar 20 14:47:50 spectre dracut[28156]: drwxr-xr-x 4 root root 0 Mar 20 14:47 usr/lib/systemd >Mar 20 14:47:50 spectre dracut[28156]: drwxr-xr-x 16 root root 0 Mar 20 14:47 usr/lib/systemd/system >Mar 20 14:47:50 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 usr/lib/systemd/system-generators >Mar 20 14:47:50 spectre dracut[28156]: -rwxr-xr-x 1 root root 1000 Jan 29 02:35 usr/lib/systemd/system-generators/dracut-rootfs-generator >Mar 20 14:47:50 spectre dracut[28156]: -rwxr-xr-x 1 root root 49672 Mar 20 14:47 usr/lib/systemd/system-generators/systemd-fstab-generator >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 546 Mar 17 12:38 usr/lib/systemd/system/basic.target >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 366 Mar 17 12:38 usr/lib/systemd/system/cryptsetup.target >Mar 20 14:47:50 spectre dracut[28156]: lrwxrwxrwx 1 root root 13 Mar 20 14:47 usr/lib/systemd/system/ctrl-alt-del.target -> reboot.target >Mar 20 14:47:50 spectre dracut[28156]: lrwxrwxrwx 1 root root 13 Mar 20 14:47 usr/lib/systemd/system/default.target -> initrd.target >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 1117 Jan 29 02:35 usr/lib/systemd/system/dracut-cmdline.service >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 976 Jan 29 02:35 usr/lib/systemd/system/dracut-emergency.service >Mar 20 14:47:50 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 usr/lib/systemd/system/dracut-emergency.service.wants >Mar 20 14:47:50 spectre dracut[28156]: lrwxrwxrwx 1 root root 33 Mar 20 14:47 usr/lib/systemd/system/dracut-emergency.service.wants/systemd-vconsole-setup.service -> ../systemd-vconsole-setup.service >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 1301 Jan 29 02:35 usr/lib/systemd/system/dracut-initqueue.service >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 983 Jan 29 02:35 usr/lib/systemd/system/dracut-mount.service >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 1015 Jan 29 02:35 usr/lib/systemd/system/dracut-pre-mount.service >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 1269 Feb 6 11:13 usr/lib/systemd/system/dracut-pre-pivot.service >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 1127 Jan 29 02:35 usr/lib/systemd/system/dracut-pre-trigger.service >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 1159 Jan 29 02:35 usr/lib/systemd/system/dracut-pre-udev.service >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 2 root root 0 Jan 29 02:35 usr/lib/systemd/system/emergency.service >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 431 Mar 17 12:38 usr/lib/systemd/system/emergency.target >Mar 20 14:47:50 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 usr/lib/systemd/system/emergency.target.wants >Mar 20 14:47:50 spectre dracut[28156]: lrwxrwxrwx 1 root root 33 Mar 20 14:47 usr/lib/systemd/system/emergency.target.wants/systemd-vconsole-setup.service -> ../systemd-vconsole-setup.service >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 440 Mar 17 12:38 usr/lib/systemd/system/final.target >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 487 Mar 17 12:38 usr/lib/systemd/system/halt.target >Mar 20 14:47:50 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 usr/lib/systemd/system/halt.target.wants >Mar 20 14:47:50 spectre dracut[28156]: lrwxrwxrwx 1 root root 24 Mar 20 14:47 usr/lib/systemd/system/halt.target.wants/plymouth-halt.service -> ../plymouth-halt.service >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 634 Mar 17 12:38 usr/lib/systemd/system/initrd-cleanup.service >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 553 Mar 17 12:38 usr/lib/systemd/system/initrd-fs.target >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 801 Mar 17 12:38 usr/lib/systemd/system/initrd-parse-etc.service >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 526 Mar 17 12:38 usr/lib/systemd/system/initrd-root-fs.target >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 644 Mar 17 12:38 usr/lib/systemd/system/initrd-switch-root.service >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 691 Mar 17 12:38 usr/lib/systemd/system/initrd-switch-root.target >Mar 20 14:47:50 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 usr/lib/systemd/system/initrd-switch-root.target.wants >Mar 20 14:47:50 spectre dracut[28156]: lrwxrwxrwx 1 root root 25 Mar 20 14:47 usr/lib/systemd/system/initrd-switch-root.target.wants/plymouth-start.service -> ../plymouth-start.service >Mar 20 14:47:50 spectre dracut[28156]: lrwxrwxrwx 1 root root 31 Mar 20 14:47 usr/lib/systemd/system/initrd-switch-root.target.wants/plymouth-switch-root.service -> ../plymouth-switch-root.service >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 668 Mar 17 12:38 usr/lib/systemd/system/initrd-udevadm-cleanup-db.service >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 671 Mar 17 12:38 usr/lib/systemd/system/initrd.target >Mar 20 14:47:50 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 usr/lib/systemd/system/initrd.target.wants >Mar 20 14:47:50 spectre dracut[28156]: lrwxrwxrwx 1 root root 25 Mar 20 14:47 usr/lib/systemd/system/initrd.target.wants/dracut-cmdline.service -> ../dracut-cmdline.service >Mar 20 14:47:50 spectre dracut[28156]: lrwxrwxrwx 1 root root 27 Mar 20 14:47 usr/lib/systemd/system/initrd.target.wants/dracut-initqueue.service -> ../dracut-initqueue.service >Mar 20 14:47:50 spectre dracut[28156]: lrwxrwxrwx 1 root root 23 Mar 20 14:47 usr/lib/systemd/system/initrd.target.wants/dracut-mount.service -> ../dracut-mount.service >Mar 20 14:47:50 spectre dracut[28156]: lrwxrwxrwx 1 root root 27 Mar 20 14:47 usr/lib/systemd/system/initrd.target.wants/dracut-pre-mount.service -> ../dracut-pre-mount.service >Mar 20 14:47:50 spectre dracut[28156]: lrwxrwxrwx 1 root root 27 Mar 20 14:47 usr/lib/systemd/system/initrd.target.wants/dracut-pre-pivot.service -> ../dracut-pre-pivot.service >Mar 20 14:47:50 spectre dracut[28156]: lrwxrwxrwx 1 root root 29 Mar 20 14:47 usr/lib/systemd/system/initrd.target.wants/dracut-pre-trigger.service -> ../dracut-pre-trigger.service >Mar 20 14:47:50 spectre dracut[28156]: lrwxrwxrwx 1 root root 26 Mar 20 14:47 usr/lib/systemd/system/initrd.target.wants/dracut-pre-udev.service -> ../dracut-pre-udev.service >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 501 Mar 17 12:38 usr/lib/systemd/system/kexec.target >Mar 20 14:47:50 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 usr/lib/systemd/system/kexec.target.wants >Mar 20 14:47:50 spectre dracut[28156]: lrwxrwxrwx 1 root root 25 Mar 20 14:47 usr/lib/systemd/system/kexec.target.wants/plymouth-kexec.service -> ../plymouth-kexec.service >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 674 Mar 17 12:38 usr/lib/systemd/system/kmod-static-nodes.service >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 395 Mar 17 12:38 usr/lib/systemd/system/local-fs-pre.target >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 507 Mar 17 12:38 usr/lib/systemd/system/local-fs.target >Mar 20 14:47:50 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 usr/lib/systemd/system/multi-user.target.wants >Mar 20 14:47:50 spectre dracut[28156]: lrwxrwxrwx 1 root root 29 Mar 20 14:47 usr/lib/systemd/system/multi-user.target.wants/plymouth-quit-wait.service -> ../plymouth-quit-wait.service >Mar 20 14:47:50 spectre dracut[28156]: lrwxrwxrwx 1 root root 24 Mar 20 14:47 usr/lib/systemd/system/multi-user.target.wants/plymouth-quit.service -> ../plymouth-quit.service >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 433 Mar 17 12:38 usr/lib/systemd/system/network.target >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 514 Mar 17 12:38 usr/lib/systemd/system/nss-lookup.target >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 473 Mar 17 12:38 usr/lib/systemd/system/nss-user-lookup.target >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 354 Mar 17 12:38 usr/lib/systemd/system/paths.target >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 381 Feb 20 14:34 usr/lib/systemd/system/plymouth-halt.service >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 396 Feb 20 14:34 usr/lib/systemd/system/plymouth-kexec.service >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 393 Feb 20 14:34 usr/lib/systemd/system/plymouth-poweroff.service >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 243 Feb 20 14:34 usr/lib/systemd/system/plymouth-quit-wait.service >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 235 Feb 20 14:34 usr/lib/systemd/system/plymouth-quit.service >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 386 Feb 20 14:34 usr/lib/systemd/system/plymouth-reboot.service >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 691 Feb 20 14:34 usr/lib/systemd/system/plymouth-start.service >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 295 Feb 20 14:34 usr/lib/systemd/system/plymouth-switch-root.service >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 500 Mar 17 12:38 usr/lib/systemd/system/poweroff.target >Mar 20 14:47:50 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 usr/lib/systemd/system/poweroff.target.wants >Mar 20 14:47:50 spectre dracut[28156]: lrwxrwxrwx 1 root root 28 Mar 20 14:47 usr/lib/systemd/system/poweroff.target.wants/plymouth-poweroff.service -> ../plymouth-poweroff.service >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 493 Mar 17 12:38 usr/lib/systemd/system/reboot.target >Mar 20 14:47:50 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 usr/lib/systemd/system/reboot.target.wants >Mar 20 14:47:50 spectre dracut[28156]: lrwxrwxrwx 1 root root 26 Mar 20 14:47 usr/lib/systemd/system/reboot.target.wants/plymouth-reboot.service -> ../plymouth-reboot.service >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 396 Mar 17 12:38 usr/lib/systemd/system/remote-fs-pre.target >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 482 Mar 17 12:38 usr/lib/systemd/system/remote-fs.target >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 2 root root 940 Jan 29 02:35 usr/lib/systemd/system/rescue.service >Mar 20 14:47:50 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 usr/lib/systemd/system/rescue.service.wants >Mar 20 14:47:50 spectre dracut[28156]: lrwxrwxrwx 1 root root 33 Mar 20 14:47 usr/lib/systemd/system/rescue.service.wants/systemd-vconsole-setup.service -> ../systemd-vconsole-setup.service >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 486 Mar 17 12:38 usr/lib/systemd/system/rescue.target >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 500 Mar 17 12:38 usr/lib/systemd/system/rpcbind.target >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 402 Mar 17 12:38 usr/lib/systemd/system/shutdown.target >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 362 Mar 17 12:38 usr/lib/systemd/system/sigpwr.target >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 409 Mar 17 12:38 usr/lib/systemd/system/slices.target >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 356 Mar 17 12:38 usr/lib/systemd/system/sockets.target >Mar 20 14:47:50 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 usr/lib/systemd/system/sockets.target.wants >Mar 20 14:47:50 spectre dracut[28156]: lrwxrwxrwx 1 root root 26 Mar 20 14:47 usr/lib/systemd/system/sockets.target.wants/systemd-journald.socket -> ../systemd-journald.socket >Mar 20 14:47:50 spectre dracut[28156]: lrwxrwxrwx 1 root root 31 Mar 20 14:47 usr/lib/systemd/system/sockets.target.wants/systemd-udevd-control.socket -> ../systemd-udevd-control.socket >Mar 20 14:47:50 spectre dracut[28156]: lrwxrwxrwx 1 root root 30 Mar 20 14:47 usr/lib/systemd/system/sockets.target.wants/systemd-udevd-kernel.socket -> ../systemd-udevd-kernel.socket >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 353 Mar 17 12:38 usr/lib/systemd/system/swap.target >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 685 Mar 17 12:38 usr/lib/systemd/system/sys-kernel-config.mount >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 540 Mar 17 12:38 usr/lib/systemd/system/sysinit.target >Mar 20 14:47:50 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 usr/lib/systemd/system/sysinit.target.wants >Mar 20 14:47:50 spectre dracut[28156]: lrwxrwxrwx 1 root root 28 Mar 20 14:47 usr/lib/systemd/system/sysinit.target.wants/kmod-static-nodes.service -> ../kmod-static-nodes.service >Mar 20 14:47:50 spectre dracut[28156]: lrwxrwxrwx 1 root root 25 Mar 20 14:47 usr/lib/systemd/system/sysinit.target.wants/plymouth-start.service -> ../plymouth-start.service >Mar 20 14:47:50 spectre dracut[28156]: lrwxrwxrwx 1 root root 36 Mar 20 14:47 usr/lib/systemd/system/sysinit.target.wants/systemd-ask-password-console.path -> ../systemd-ask-password-console.path >Mar 20 14:47:50 spectre dracut[28156]: lrwxrwxrwx 1 root root 27 Mar 20 14:47 usr/lib/systemd/system/sysinit.target.wants/systemd-journald.service -> ../systemd-journald.service >Mar 20 14:47:50 spectre dracut[28156]: lrwxrwxrwx 1 root root 31 Mar 20 14:47 usr/lib/systemd/system/sysinit.target.wants/systemd-modules-load.service -> ../systemd-modules-load.service >Mar 20 14:47:50 spectre dracut[28156]: lrwxrwxrwx 1 root root 37 Mar 20 14:47 usr/lib/systemd/system/sysinit.target.wants/systemd-tmpfiles-setup-dev.service -> ../systemd-tmpfiles-setup-dev.service >Mar 20 14:47:50 spectre dracut[28156]: lrwxrwxrwx 1 root root 31 Mar 20 14:47 usr/lib/systemd/system/sysinit.target.wants/systemd-udev-trigger.service -> ../systemd-udev-trigger.service >Mar 20 14:47:50 spectre dracut[28156]: lrwxrwxrwx 1 root root 24 Mar 20 14:47 usr/lib/systemd/system/sysinit.target.wants/systemd-udevd.service -> ../systemd-udevd.service >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 1235 Mar 17 12:38 usr/lib/systemd/system/syslog.socket >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 433 Mar 17 12:38 usr/lib/systemd/system/system.slice >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 646 Mar 17 12:38 usr/lib/systemd/system/systemd-ask-password-console.path >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 657 Mar 17 12:38 usr/lib/systemd/system/systemd-ask-password-console.service >Mar 20 14:47:50 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 usr/lib/systemd/system/systemd-ask-password-console.service.wants >Mar 20 14:47:50 spectre dracut[28156]: lrwxrwxrwx 1 root root 33 Mar 20 14:47 usr/lib/systemd/system/systemd-ask-password-console.service.wants/systemd-vconsole-setup.service -> ../systemd-vconsole-setup.service >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 419 Feb 20 14:34 usr/lib/systemd/system/systemd-ask-password-plymouth.path >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 400 Feb 20 14:34 usr/lib/systemd/system/systemd-ask-password-plymouth.service >Mar 20 14:47:50 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 usr/lib/systemd/system/systemd-ask-password-plymouth.service.wants >Mar 20 14:47:50 spectre dracut[28156]: lrwxrwxrwx 1 root root 33 Mar 20 14:47 usr/lib/systemd/system/systemd-ask-password-plymouth.service.wants/systemd-vconsole-setup.service -> ../systemd-vconsole-setup.service >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 682 Mar 17 12:38 usr/lib/systemd/system/systemd-fsck@.service >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 548 Mar 17 12:38 usr/lib/systemd/system/systemd-halt.service >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 957 Mar 17 12:38 usr/lib/systemd/system/systemd-journald.service >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 833 Mar 17 12:38 usr/lib/systemd/system/systemd-journald.socket >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 561 Mar 17 12:38 usr/lib/systemd/system/systemd-kexec.service >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 1029 Mar 17 12:38 usr/lib/systemd/system/systemd-modules-load.service >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 557 Mar 17 12:38 usr/lib/systemd/system/systemd-poweroff.service >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 552 Mar 17 12:38 usr/lib/systemd/system/systemd-reboot.service >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 622 Mar 17 12:38 usr/lib/systemd/system/systemd-tmpfiles-setup-dev.service >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 827 Mar 17 12:38 usr/lib/systemd/system/systemd-udev-settle.service >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 723 Mar 17 12:38 usr/lib/systemd/system/systemd-udev-trigger.service >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 578 Mar 17 12:38 usr/lib/systemd/system/systemd-udevd-control.socket >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 575 Mar 17 12:38 usr/lib/systemd/system/systemd-udevd-kernel.socket >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 772 Mar 17 12:38 usr/lib/systemd/system/systemd-udevd.service >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 690 Mar 17 12:38 usr/lib/systemd/system/systemd-vconsole-setup.service >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 355 Mar 17 12:38 usr/lib/systemd/system/timers.target >Mar 20 14:47:50 spectre dracut[28156]: -rw-r--r-- 1 root root 417 Mar 17 12:38 usr/lib/systemd/system/umount.target >Mar 20 14:47:50 spectre dracut[28156]: -rwxr-xr-x 1 root root 1318968 Mar 20 14:47 usr/lib/systemd/systemd >Mar 20 14:47:50 spectre dracut[28156]: -rwxr-xr-x 1 root root 245544 Mar 20 14:47 usr/lib/systemd/systemd-cgroups-agent >Mar 20 14:47:50 spectre dracut[28156]: -rwxr-xr-x 1 root root 266392 Mar 20 14:47 usr/lib/systemd/systemd-fsck >Mar 20 14:47:50 spectre dracut[28156]: -rwxr-xr-x 1 root root 308280 Mar 20 14:47 usr/lib/systemd/systemd-journald >Mar 20 14:47:50 spectre dracut[28156]: -rwxr-xr-x 1 root root 41400 Mar 20 14:47 usr/lib/systemd/systemd-modules-load >Mar 20 14:47:50 spectre dracut[28156]: -rwxr-xr-x 1 root root 24632 Mar 20 14:47 usr/lib/systemd/systemd-reply-password >Mar 20 14:47:50 spectre dracut[28156]: -rwxr-xr-x 1 root root 95656 Mar 20 14:47 usr/lib/systemd/systemd-shutdown >Mar 20 14:47:50 spectre dracut[28156]: -rwxr-xr-x 1 root root 41352 Mar 20 14:47 usr/lib/systemd/systemd-sysctl >Mar 20 14:47:50 spectre dracut[28156]: -rwxr-xr-x 1 root root 290656 Mar 20 14:47 usr/lib/systemd/systemd-udevd >Mar 20 14:47:50 spectre dracut[28156]: -rwxr-xr-x 1 root root 37160 Mar 20 14:47 usr/lib/systemd/systemd-vconsole-setup >Mar 20 14:47:50 spectre dracut[28156]: drwxr-xr-x 3 root root 0 Mar 20 14:47 usr/lib/udev >Mar 20 14:47:50 spectre dracut[28156]: -rwxr-xr-x 1 root root 24488 Mar 20 14:47 usr/lib/udev/ata_id >Mar 20 14:47:50 spectre dracut[28156]: -rwxr-xr-x 1 root root 36808 Mar 20 14:47 usr/lib/udev/cdrom_id >Mar 20 14:47:50 spectre dracut[28156]: -rwxr-xr-x 1 root root 18568 Mar 20 14:47 usr/lib/udev/pcmcia-check-broken-cis >Mar 20 14:47:50 spectre dracut[28156]: -rwxr-xr-x 1 root root 31096 Mar 20 14:47 usr/lib/udev/pcmcia-socket-startup >Mar 20 14:47:50 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 usr/lib/udev/rules.d >Mar 20 14:47:50 spectre dracut[28156]: -r--r--r-- 1 root root 6633 Jan 27 05:38 usr/lib/udev/rules.d/10-dm.rules >Mar 20 14:47:50 spectre dracut[28156]: -r--r--r-- 1 root root 2454 Jan 27 05:38 usr/lib/udev/rules.d/11-dm-lvm.rules >Mar 20 14:47:51 spectre dracut[28156]: -r--r--r-- 1 root root 1499 Jan 27 05:38 usr/lib/udev/rules.d/13-dm-disk.rules >Mar 20 14:47:51 spectre dracut[28156]: -rw-r--r-- 1 root root 3160 Mar 17 12:38 usr/lib/udev/rules.d/50-udev-default.rules >Mar 20 14:47:51 spectre dracut[28156]: -rw-r--r-- 1 root root 1060 Aug 3 2013 usr/lib/udev/rules.d/60-pcmcia.rules >Mar 20 14:47:51 spectre dracut[28156]: -rw-r--r-- 1 root root 5592 Mar 17 12:38 usr/lib/udev/rules.d/60-persistent-storage.rules >Mar 20 14:47:51 spectre dracut[28156]: -r--r--r-- 1 root root 3975 Mar 20 14:47 usr/lib/udev/rules.d/69-dm-lvm-metad.rules >Mar 20 14:47:51 spectre dracut[28156]: -rw-r--r-- 1 root root 1022 Sep 2 2013 usr/lib/udev/rules.d/71-biosdevname.rules >Mar 20 14:47:51 spectre dracut[28156]: -rw-r--r-- 1 root root 2360 Mar 17 12:38 usr/lib/udev/rules.d/71-seat.rules >Mar 20 14:47:51 spectre dracut[28156]: -rw-r--r-- 1 root root 596 Mar 17 12:38 usr/lib/udev/rules.d/73-seat-late.rules >Mar 20 14:47:51 spectre dracut[28156]: -rw-r--r-- 1 root root 452 Mar 17 12:38 usr/lib/udev/rules.d/75-net-description.rules >Mar 20 14:47:51 spectre dracut[28156]: -rw-r--r-- 1 root root 618 Mar 17 12:38 usr/lib/udev/rules.d/80-drivers.rules >Mar 20 14:47:51 spectre dracut[28156]: -r--r--r-- 1 root root 483 Jan 27 05:38 usr/lib/udev/rules.d/95-dm-notify.rules >Mar 20 14:47:51 spectre dracut[28156]: -rw-r--r-- 1 root root 155 Mar 17 12:38 usr/lib/udev/rules.d/95-udev-late.rules >Mar 20 14:47:51 spectre dracut[28156]: -rw-r--r-- 1 root root 4000 Mar 17 12:38 usr/lib/udev/rules.d/99-systemd.rules >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 33456 Mar 20 14:47 usr/lib/udev/scsi_id >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 4851 Jan 29 02:35 usr/lib/uefi-lib.sh >Mar 20 14:47:51 spectre dracut[28156]: drwxr-xr-x 9 root root 0 Mar 20 14:47 usr/lib64 >Mar 20 14:47:51 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 usr/lib64/atlas >Mar 20 14:47:51 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 usr/lib64/device-mapper >Mar 20 14:47:51 spectre dracut[28156]: -r-xr-xr-x 1 root root 11304 Mar 20 14:47 usr/lib64/device-mapper/libdevmapper-event-lvm2mirror.so >Mar 20 14:47:51 spectre dracut[28156]: -r-xr-xr-x 1 root root 11248 Mar 20 14:47 usr/lib64/device-mapper/libdevmapper-event-lvm2raid.so >Mar 20 14:47:51 spectre dracut[28156]: -r-xr-xr-x 1 root root 11400 Mar 20 14:47 usr/lib64/device-mapper/libdevmapper-event-lvm2snapshot.so >Mar 20 14:47:51 spectre dracut[28156]: -r-xr-xr-x 1 root root 15544 Mar 20 14:47 usr/lib64/device-mapper/libdevmapper-event-lvm2thin.so >Mar 20 14:47:51 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 usr/lib64/iscsi >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 170174 Mar 20 14:47 usr/lib64/ld-2.19.90.so >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 13 Mar 20 14:47 usr/lib64/ld-linux-x86-64.so.2 -> ld-2.19.90.so >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 15 Mar 20 14:47 usr/lib64/libacl.so.1 -> libacl.so.1.1.0 >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 39200 Mar 20 14:47 usr/lib64/libacl.so.1.1.0 >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 16 Mar 20 14:47 usr/lib64/libattr.so.1 -> libattr.so.1.1.0 >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 22160 Mar 20 14:47 usr/lib64/libattr.so.1.1.0 >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 17 Mar 20 14:47 usr/lib64/libaudit.so -> libaudit.so.1.0.0 >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 17 Mar 20 14:47 usr/lib64/libaudit.so.1 -> libaudit.so.1.0.0 >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 116872 Mar 20 14:47 usr/lib64/libaudit.so.1.0.0 >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 17 Mar 20 14:47 usr/lib64/libblkid.so.1 -> libblkid.so.1.1.0 >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 259432 Mar 20 14:47 usr/lib64/libblkid.so.1.1.0 >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 2108670 Mar 20 14:47 usr/lib64/libc-2.19.90.so >Mar 20 14:47:51 spectre dracut[28156]: -rw-r--r-- 1 root root 253 Mar 12 18:24 usr/lib64/libc.so >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 15 Mar 20 14:47 usr/lib64/libc.so.6 -> libc-2.19.90.so >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 18 Mar 20 14:47 usr/lib64/libcap-ng.so.0 -> libcap-ng.so.0.0.0 >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 22144 Mar 20 14:47 usr/lib64/libcap-ng.so.0.0.0 >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 14 Mar 20 14:47 usr/lib64/libcap.so.2 -> libcap.so.2.22 >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 21424 Mar 20 14:47 usr/lib64/libcap.so.2.22 >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 17 Mar 20 14:47 usr/lib64/libcom_err.so.2 -> libcom_err.so.2.1 >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 18320 Mar 20 14:47 usr/lib64/libcom_err.so.2.1 >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 18 Mar 20 14:47 usr/lib64/libconfig.so.9 -> libconfig.so.9.1.3 >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 48888 Mar 20 14:47 usr/lib64/libconfig.so.9.1.3 >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 43815 Mar 20 14:47 usr/lib64/libcrypt-2.19.90.so >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 19 Mar 20 14:47 usr/lib64/libcrypt.so -> libcrypt-2.19.90.so >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 19 Mar 20 14:47 usr/lib64/libcrypt.so.1 -> libcrypt-2.19.90.so >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 1982408 Mar 20 14:47 usr/lib64/libcrypto.so.1.0.1e >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 19 Mar 20 14:47 usr/lib64/libcrypto.so.10 -> libcrypto.so.1.0.1e >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 18 Mar 20 14:47 usr/lib64/libdaemon.so.0 -> libdaemon.so.0.5.0 >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 30656 Mar 20 14:47 usr/lib64/libdaemon.so.0.5.0 >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 18 Mar 20 14:47 usr/lib64/libdbus-1.so -> libdbus-1.so.3.7.6 >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 18 Mar 20 14:47 usr/lib64/libdbus-1.so.3 -> libdbus-1.so.3.7.6 >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 304840 Mar 20 14:47 usr/lib64/libdbus-1.so.3.7.6 >Mar 20 14:47:51 spectre dracut[28156]: -r-xr-xr-x 1 root root 11288 Mar 20 14:47 usr/lib64/libdevmapper-event-lvm2.so.2.02 >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 46 Mar 20 14:47 usr/lib64/libdevmapper-event-lvm2mirror.so -> device-mapper/libdevmapper-event-lvm2mirror.so >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 44 Mar 20 14:47 usr/lib64/libdevmapper-event-lvm2raid.so -> device-mapper/libdevmapper-event-lvm2raid.so >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 48 Mar 20 14:47 usr/lib64/libdevmapper-event-lvm2snapshot.so -> device-mapper/libdevmapper-event-lvm2snapshot.so >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 44 Mar 20 14:47 usr/lib64/libdevmapper-event-lvm2thin.so -> device-mapper/libdevmapper-event-lvm2thin.so >Mar 20 14:47:51 spectre dracut[28156]: -r-xr-xr-x 1 root root 26736 Mar 20 14:47 usr/lib64/libdevmapper-event.so.1.02 >Mar 20 14:47:51 spectre dracut[28156]: -r-xr-xr-x 1 root root 251864 Mar 20 14:47 usr/lib64/libdevmapper.so.1.02 >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 22056 Mar 20 14:47 usr/lib64/libdl-2.19.90.so >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 16 Mar 20 14:47 usr/lib64/libdl.so -> libdl-2.19.90.so >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 16 Mar 20 14:47 usr/lib64/libdl.so.2 -> libdl-2.19.90.so >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 24 Mar 20 14:47 usr/lib64/libdns-export.so.100 -> libdns-export.so.100.2.2 >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 1327544 Mar 20 14:47 usr/lib64/libdns-export.so.100.2.2 >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 15 Mar 20 14:47 usr/lib64/libdrm.so -> libdrm.so.2.4.0 >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 15 Mar 20 14:47 usr/lib64/libdrm.so.2 -> libdrm.so.2.4.0 >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 51072 Mar 20 14:47 usr/lib64/libdrm.so.2.4.0 >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 13 Mar 20 14:47 usr/lib64/libe2p.so.2 -> libe2p.so.2.3 >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 35848 Mar 20 14:47 usr/lib64/libe2p.so.2.3 >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 16 Mar 20 14:47 usr/lib64/libext2fs.so.2 -> libext2fs.so.2.4 >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 286320 Mar 20 14:47 usr/lib64/libext2fs.so.2.4 >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 513304 Mar 20 14:47 usr/lib64/libfreebl3.so >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 91352 Mar 20 14:47 usr/lib64/libgcc_s-4.8.2-20140120.so.1 >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 28 Mar 20 14:47 usr/lib64/libgcc_s.so.1 -> libgcc_s-4.8.2-20140120.so.1 >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 19 Mar 20 14:47 usr/lib64/libgcrypt.so.20 -> libgcrypt.so.20.0.1 >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 919856 Mar 20 14:47 usr/lib64/libgcrypt.so.20.0.1 >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 22 Mar 20 14:47 usr/lib64/libgpg-error.so.0 -> libgpg-error.so.0.10.0 >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 21760 Mar 20 14:47 usr/lib64/libgpg-error.so.0.10.0 >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 21 Mar 20 14:47 usr/lib64/libgssapi_krb5.so.2 -> libgssapi_krb5.so.2.2 >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 314976 Mar 20 14:47 usr/lib64/libgssapi_krb5.so.2.2 >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 17 Mar 20 14:47 usr/lib64/libidn.so.11 -> libidn.so.11.6.11 >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 211192 Mar 20 14:47 usr/lib64/libidn.so.11.6.11 >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 23 Mar 20 14:47 usr/lib64/libirs-export.so.91 -> libirs-export.so.91.0.0 >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 45216 Mar 20 14:47 usr/lib64/libirs-export.so.91.0.0 >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 23 Mar 20 14:47 usr/lib64/libisc-export.so.95 -> libisc-export.so.95.5.0 >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 345408 Mar 20 14:47 usr/lib64/libisc-export.so.95.5.0 >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 26 Mar 20 14:47 usr/lib64/libisccfg-export.so.90 -> libisccfg-export.so.90.1.0 >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 55136 Mar 20 14:47 usr/lib64/libisccfg-export.so.90.1.0 >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 19 Mar 20 14:47 usr/lib64/libjansson.so.4 -> libjansson.so.4.6.0 >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 55880 Mar 20 14:47 usr/lib64/libjansson.so.4.6.0 >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 18 Mar 20 14:47 usr/lib64/libk5crypto.so.3 -> libk5crypto.so.3.1 >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 209304 Mar 20 14:47 usr/lib64/libk5crypto.so.3.1 >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 18 Mar 20 14:47 usr/lib64/libkeyutils.so.1 -> libkeyutils.so.1.5 >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 17984 Mar 20 14:47 usr/lib64/libkeyutils.so.1.5 >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 16 Mar 20 14:47 usr/lib64/libkmod.so.2 -> libkmod.so.2.2.6 >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 91536 Mar 20 14:47 usr/lib64/libkmod.so.2.2.6 >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 14 Mar 20 14:47 usr/lib64/libkrb5.so.3 -> libkrb5.so.3.3 >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 934440 Mar 20 14:47 usr/lib64/libkrb5.so.3.3 >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 21 Mar 20 14:47 usr/lib64/libkrb5support.so.0 -> libkrb5support.so.0.1 >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 65024 Mar 20 14:47 usr/lib64/libkrb5support.so.0.1 >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 21 Mar 20 14:47 usr/lib64/liblber-2.4.so.2 -> liblber-2.4.so.2.10.2 >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 63272 Mar 20 14:47 usr/lib64/liblber-2.4.so.2.10.2 >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 21 Mar 20 14:47 usr/lib64/libldap-2.4.so.2 -> libldap-2.4.so.2.10.2 >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 340520 Mar 20 14:47 usr/lib64/libldap-2.4.so.2.10.2 >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 21 Mar 20 14:47 usr/lib64/liblldp_clif.so.1 -> liblldp_clif.so.1.0.0 >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 10920 Mar 20 14:47 usr/lib64/liblldp_clif.so.1.0.0 >Mar 20 14:47:51 spectre dracut[28156]: -r-xr-xr-x 1 root root 1129264 Mar 20 14:47 usr/lib64/liblvm2cmd.so.2.02 >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 17 Mar 20 14:47 usr/lib64/liblzma.so -> liblzma.so.5.0.99 >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 17 Mar 20 14:47 usr/lib64/liblzma.so.5 -> liblzma.so.5.0.99 >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 155400 Mar 20 14:47 usr/lib64/liblzma.so.5.0.99 >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 1147328 Mar 20 14:47 usr/lib64/libm-2.19.90.so >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 15 Mar 20 14:47 usr/lib64/libm.so -> libm-2.19.90.so >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 15 Mar 20 14:47 usr/lib64/libm.so.6 -> libm-2.19.90.so >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 17 Mar 20 14:47 usr/lib64/libmount.so.1 -> libmount.so.1.1.0 >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 279352 Mar 20 14:47 usr/lib64/libmount.so.1.1.0 >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 19 Mar 20 14:47 usr/lib64/libnl-3.so.200 -> libnl-3.so.200.19.0 >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 126776 Mar 20 14:47 usr/lib64/libnl-3.so.200.19.0 >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 23 Mar 20 14:47 usr/lib64/libnl-cli-3.so.200 -> libnl-cli-3.so.200.19.0 >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 47872 Mar 20 14:47 usr/lib64/libnl-cli-3.so.200.19.0 >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 24 Mar 20 14:47 usr/lib64/libnl-genl-3.so.200 -> libnl-genl-3.so.200.19.0 >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 27800 Mar 20 14:47 usr/lib64/libnl-genl-3.so.200.19.0 >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 22 Mar 20 14:47 usr/lib64/libnl-nf-3.so.200 -> libnl-nf-3.so.200.19.0 >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 105704 Mar 20 14:47 usr/lib64/libnl-nf-3.so.200.19.0 >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 25 Mar 20 14:47 usr/lib64/libnl-route-3.so.200 -> libnl-route-3.so.200.19.0 >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 363008 Mar 20 14:47 usr/lib64/libnl-route-3.so.200.19.0 >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 14 Mar 20 14:47 usr/lib64/libnl.so -> libnl.so.1.1.4 >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 14 Mar 20 14:47 usr/lib64/libnl.so.1 -> libnl.so.1.1.4 >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 347328 Mar 20 14:47 usr/lib64/libnl.so.1.1.4 >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 119035 Mar 20 14:47 usr/lib64/libnsl-2.19.90.so >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 17 Mar 20 14:47 usr/lib64/libnsl.so -> libnsl-2.19.90.so >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 17 Mar 20 14:47 usr/lib64/libnsl.so.1 -> libnsl-2.19.90.so >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 251536 Mar 20 14:47 usr/lib64/libnspr4.so >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 1356344 Mar 20 14:47 usr/lib64/libnss3.so >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 27310 Mar 20 14:47 usr/lib64/libnss_dns-2.19.90.so >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 21 Mar 20 14:47 usr/lib64/libnss_dns.so.2 -> libnss_dns-2.19.90.so >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 57416 Mar 20 14:47 usr/lib64/libnss_files-2.19.90.so >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 23 Mar 20 14:47 usr/lib64/libnss_files.so -> libnss_files-2.19.90.so >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 23 Mar 20 14:47 usr/lib64/libnss_files.so.2 -> libnss_files-2.19.90.so >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 11400 Mar 20 14:47 usr/lib64/libnss_mdns4_minimal.so.2 >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 184296 Mar 20 14:47 usr/lib64/libnssutil3.so >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 17 Mar 20 14:47 usr/lib64/libomapi.so.0 -> libomapi.so.0.0.0 >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 126216 Mar 20 14:47 usr/lib64/libomapi.so.0.0.0 >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 16 Mar 20 14:47 usr/lib64/libpam.so.0 -> libpam.so.0.83.1 >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 64048 Mar 20 14:47 usr/lib64/libpam.so.0.83.1 >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 15 Mar 20 14:47 usr/lib64/libpci.so.3 -> libpci.so.3.2.1 >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 56840 Mar 20 14:47 usr/lib64/libpci.so.3.2.1 >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 16 Mar 20 14:47 usr/lib64/libpcre.so.1 -> libpcre.so.1.2.3 >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 437496 Mar 20 14:47 usr/lib64/libpcre.so.1.2.3 >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 22272 Mar 20 14:47 usr/lib64/libplc4.so >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 18168 Mar 20 14:47 usr/lib64/libplds4.so >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 27 Mar 20 14:47 usr/lib64/libply-splash-core.so.2 -> libply-splash-core.so.2.1.0 >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 80680 Mar 20 14:47 usr/lib64/libply-splash-core.so.2.1.0 >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 31 Mar 20 14:47 usr/lib64/libply-splash-graphics.so.2 -> libply-splash-graphics.so.2.1.0 >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 40600 Mar 20 14:47 usr/lib64/libply-splash-graphics.so.2.1.0 >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 15 Mar 20 14:47 usr/lib64/libply.so.2 -> libply.so.2.1.0 >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 101704 Mar 20 14:47 usr/lib64/libply.so.2.1.0 >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 18 Mar 20 14:47 usr/lib64/libpng16.so -> libpng16.so.16.8.0 >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 18 Mar 20 14:47 usr/lib64/libpng16.so.16 -> libpng16.so.16.8.0 >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 214272 Mar 20 14:47 usr/lib64/libpng16.so.16.8.0 >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 18 Mar 20 14:47 usr/lib64/libprocps.so.3 -> libprocps.so.3.0.0 >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 76696 Mar 20 14:47 usr/lib64/libprocps.so.3.0.0 >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 148854 Mar 20 14:47 usr/lib64/libpthread-2.19.90.so >Mar 20 14:47:51 spectre dracut[28156]: -rw-r--r-- 1 root root 222 Mar 12 18:25 usr/lib64/libpthread.so >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 21 Mar 20 14:47 usr/lib64/libpthread.so.0 -> libpthread-2.19.90.so >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 20 Mar 20 14:47 usr/lib64/libqrencode.so.3 -> libqrencode.so.3.4.2 >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 53128 Mar 20 14:47 usr/lib64/libqrencode.so.3.4.2 >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 18 Mar 20 14:47 usr/lib64/libreadline.so.6 -> libreadline.so.6.2 >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 284824 Mar 20 14:47 usr/lib64/libreadline.so.6.2 >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 117569 Mar 20 14:47 usr/lib64/libresolv-2.19.90.so >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 20 Mar 20 14:47 usr/lib64/libresolv.so -> libresolv-2.19.90.so >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 20 Mar 20 14:47 usr/lib64/libresolv.so.2 -> libresolv-2.19.90.so >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 46647 Mar 20 14:47 usr/lib64/librt-2.19.90.so >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 16 Mar 20 14:47 usr/lib64/librt.so -> librt-2.19.90.so >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 16 Mar 20 14:47 usr/lib64/librt.so.1 -> librt-2.19.90.so >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 17 Mar 20 14:47 usr/lib64/libsasl2.so.3 -> libsasl2.so.3.0.0 >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 122848 Mar 20 14:47 usr/lib64/libsasl2.so.3.0.0 >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 19 Mar 20 14:47 usr/lib64/libseccomp.so.2 -> libseccomp.so.2.1.1 >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 93808 Mar 20 14:47 usr/lib64/libseccomp.so.2.1.1 >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 149040 Mar 20 14:47 usr/lib64/libselinux.so.1 >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 290112 Mar 20 14:47 usr/lib64/libsepol.so.1 >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 192440 Mar 20 14:47 usr/lib64/libsmime3.so >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 262944 Mar 20 14:47 usr/lib64/libssl3.so >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 17 Mar 20 14:47 usr/lib64/libsysfs.so.2 -> libsysfs.so.2.0.1 >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 51168 Mar 20 14:47 usr/lib64/libsysfs.so.2.0.1 >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 27 Mar 20 14:47 usr/lib64/libsystemd-daemon.so.0 -> libsystemd-daemon.so.0.0.12 >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 21096 Mar 20 14:47 usr/lib64/libsystemd-daemon.so.0.0.12 >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 19 Mar 20 14:47 usr/lib64/libsystemd.so.0 -> libsystemd.so.0.0.2 >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 144408 Mar 20 14:47 usr/lib64/libsystemd.so.0.0.2 >Mar 20 14:47:51 spectre dracut[28156]: lrwxrwxrwx 1 root root 16 Mar 20 14:47 usr/lib64/libteam.so.5 -> libteam.so.5.0.0 >Mar 20 14:47:51 spectre dracut[28156]: -rwxr-xr-x 1 root root 52160 Mar 20 14:47 usr/lib64/libteam.so.5.0.0 >Mar 20 14:47:52 spectre dracut[28156]: lrwxrwxrwx 1 root root 20 Mar 20 14:47 usr/lib64/libteamdctl.so.0 -> libteamdctl.so.0.1.0 >Mar 20 14:47:52 spectre dracut[28156]: -rwxr-xr-x 1 root root 26424 Mar 20 14:47 usr/lib64/libteamdctl.so.0.1.0 >Mar 20 14:47:52 spectre dracut[28156]: lrwxrwxrwx 1 root root 15 Mar 20 14:47 usr/lib64/libtinfo.so.5 -> libtinfo.so.5.9 >Mar 20 14:47:52 spectre dracut[28156]: -rwxr-xr-x 1 root root 175560 Mar 20 14:47 usr/lib64/libtinfo.so.5.9 >Mar 20 14:47:52 spectre dracut[28156]: lrwxrwxrwx 1 root root 16 Mar 20 14:47 usr/lib64/libudev.so.1 -> libudev.so.1.4.0 >Mar 20 14:47:52 spectre dracut[28156]: -rwxr-xr-x 1 root root 69144 Mar 20 14:47 usr/lib64/libudev.so.1.4.0 >Mar 20 14:47:52 spectre dracut[28156]: lrwxrwxrwx 1 root root 16 Mar 20 14:47 usr/lib64/libuuid.so.1 -> libuuid.so.1.3.0 >Mar 20 14:47:52 spectre dracut[28156]: -rwxr-xr-x 1 root root 22624 Mar 20 14:47 usr/lib64/libuuid.so.1.3.0 >Mar 20 14:47:52 spectre dracut[28156]: lrwxrwxrwx 1 root root 16 Mar 20 14:47 usr/lib64/libwrap.so.0 -> libwrap.so.0.7.6 >Mar 20 14:47:52 spectre dracut[28156]: -rwxr-xr-x 1 root root 44696 Mar 20 14:47 usr/lib64/libwrap.so.0.7.6 >Mar 20 14:47:52 spectre dracut[28156]: lrwxrwxrwx 1 root root 16 Mar 20 14:47 usr/lib64/libxml2.so -> libxml2.so.2.9.1 >Mar 20 14:47:52 spectre dracut[28156]: lrwxrwxrwx 1 root root 16 Mar 20 14:47 usr/lib64/libxml2.so.2 -> libxml2.so.2.9.1 >Mar 20 14:47:52 spectre dracut[28156]: -rwxr-xr-x 1 root root 1502232 Mar 20 14:47 usr/lib64/libxml2.so.2.9.1 >Mar 20 14:47:52 spectre dracut[28156]: lrwxrwxrwx 1 root root 13 Mar 20 14:47 usr/lib64/libz.so -> libz.so.1.2.8 >Mar 20 14:47:52 spectre dracut[28156]: lrwxrwxrwx 1 root root 13 Mar 20 14:47 usr/lib64/libz.so.1 -> libz.so.1.2.8 >Mar 20 14:47:52 spectre dracut[28156]: -rwxr-xr-x 1 root root 92552 Mar 20 14:47 usr/lib64/libz.so.1.2.8 >Mar 20 14:47:52 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 usr/lib64/llvm >Mar 20 14:47:52 spectre dracut[28156]: drwxr-xr-x 3 root root 0 Mar 20 14:47 usr/lib64/plymouth >Mar 20 14:47:52 spectre dracut[28156]: -rwxr-xr-x 1 root root 15800 Mar 20 14:47 usr/lib64/plymouth/details.so >Mar 20 14:47:52 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 usr/lib64/plymouth/renderers >Mar 20 14:47:52 spectre dracut[28156]: -rwxr-xr-x 1 root root 36976 Mar 20 14:47 usr/lib64/plymouth/renderers/drm.so >Mar 20 14:47:52 spectre dracut[28156]: -rwxr-xr-x 1 root root 24272 Mar 20 14:47 usr/lib64/plymouth/renderers/frame-buffer.so >Mar 20 14:47:52 spectre dracut[28156]: -rwxr-xr-x 1 root root 20128 Mar 20 14:47 usr/lib64/plymouth/text.so >Mar 20 14:47:52 spectre dracut[28156]: -rwxr-xr-x 1 root root 37024 Mar 20 14:47 usr/lib64/plymouth/two-step.so >Mar 20 14:47:52 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 usr/lib64/tracker-1.0 >Mar 20 14:47:52 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 usr/lib64/xulrunner >Mar 20 14:47:52 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 usr/sbin >Mar 20 14:47:52 spectre dracut[28156]: -rwxr-xr-x 1 root root 23792 Mar 20 14:47 usr/sbin/arping >Mar 20 14:47:52 spectre dracut[28156]: -rwxr-xr-x 1 root root 40032 Mar 20 14:47 usr/sbin/biosdevname >Mar 20 14:47:52 spectre dracut[28156]: -rwxr-xr-x 1 root root 76080 Mar 20 14:47 usr/sbin/blkid >Mar 20 14:47:52 spectre dracut[28156]: -rwxr-xr-x 1 root root 35680 Mar 20 14:47 usr/sbin/brctl >Mar 20 14:47:52 spectre dracut[28156]: -rwxr-xr-x 1 root root 37040 Mar 20 14:47 usr/sbin/chroot >Mar 20 14:47:52 spectre dracut[28156]: -rwxr-xr-x 1 root root 61480 Mar 20 14:47 usr/sbin/dcbtool >Mar 20 14:47:52 spectre dracut[28156]: -rwxr-xr-x 1 root root 433440 Mar 20 14:47 usr/sbin/dhclient >Mar 20 14:47:52 spectre dracut[28156]: -rwxr-xr-x 1 root root 3647 Jan 29 02:35 usr/sbin/dhclient-script >Mar 20 14:47:52 spectre dracut[28156]: -r-xr-xr-x 1 root root 36544 Mar 20 14:47 usr/sbin/dmeventd >Mar 20 14:47:52 spectre dracut[28156]: -r-xr-xr-x 1 root root 80544 Mar 20 14:47 usr/sbin/dmsetup >Mar 20 14:47:52 spectre dracut[28156]: -rwxr-xr-x 2 root root 0 Mar 20 14:47 usr/sbin/e2fsck >Mar 20 14:47:52 spectre dracut[28156]: -rwxr-xr-x 1 root root 628 Jan 29 02:35 usr/sbin/fcoe-edd >Mar 20 14:47:52 spectre dracut[28156]: -rwxr-xr-x 1 root root 816 Jan 29 02:35 usr/sbin/fcoe-genrules.sh >Mar 20 14:47:52 spectre dracut[28156]: -rwxr-xr-x 1 root root 1482 Jan 29 02:35 usr/sbin/fcoe-up >Mar 20 14:47:52 spectre dracut[28156]: -rwxr-xr-x 1 root root 37000 Mar 20 14:47 usr/sbin/fipvlan >Mar 20 14:47:52 spectre dracut[28156]: -rwxr-xr-x 1 root root 41448 Mar 20 14:47 usr/sbin/fsck >Mar 20 14:47:52 spectre dracut[28156]: -rwxr-xr-x 2 root root 267856 Mar 20 14:47 usr/sbin/fsck.ext4 >Mar 20 14:47:52 spectre dracut[28156]: lrwxrwxrwx 1 root root 16 Mar 20 14:47 usr/sbin/halt -> ../bin/systemctl >Mar 20 14:47:52 spectre dracut[28156]: -rwxr-xr-x 1 root root 10449 Feb 6 11:13 usr/sbin/ifup >Mar 20 14:47:52 spectre dracut[28156]: lrwxrwxrwx 1 root root 22 Mar 20 14:47 usr/sbin/init -> ../lib/systemd/systemd >Mar 20 14:47:52 spectre dracut[28156]: -rwxr-xr-x 1 root root 1158 Jan 29 02:35 usr/sbin/initqueue >Mar 20 14:47:52 spectre dracut[28156]: -rwxr-xr-x 1 root root 303 Jan 29 02:35 usr/sbin/insmodpost.sh >Mar 20 14:47:52 spectre dracut[28156]: -rwxr-xr-x 1 root root 316888 Mar 20 14:47 usr/sbin/ip >Mar 20 14:47:52 spectre dracut[28156]: -rwxr-xr-x 1 root root 168472 Mar 20 14:47 usr/sbin/kexec >Mar 20 14:47:52 spectre dracut[28156]: -rwxr-xr-x 1 root root 357424 Mar 20 14:47 usr/sbin/lldpad >Mar 20 14:47:52 spectre dracut[28156]: -rwxr-xr-x 1 root root 584 Jan 29 02:35 usr/sbin/loginit >Mar 20 14:47:52 spectre dracut[28156]: -rwxr-xr-x 1 root root 79800 Mar 20 14:47 usr/sbin/losetup >Mar 20 14:47:52 spectre dracut[28156]: -r-xr-xr-x 1 root root 1154384 Mar 20 14:47 usr/sbin/lvm >Mar 20 14:47:52 spectre dracut[28156]: -rwxr-xr-x 1 root root 3611 Jan 29 02:35 usr/sbin/lvm_scan >Mar 20 14:47:52 spectre dracut[28156]: lrwxrwxrwx 1 root root 11 Mar 20 14:47 usr/sbin/modprobe -> ../bin/kmod >Mar 20 14:47:52 spectre dracut[28156]: -rwxr-xr-x 1 root root 2742 Jan 29 02:35 usr/sbin/netroot >Mar 20 14:47:52 spectre dracut[28156]: -rwxr-xr-x 1 root root 14120 Mar 20 14:47 usr/sbin/nologin >Mar 20 14:47:52 spectre dracut[28156]: lrwxrwxrwx 1 root root 12 Mar 20 14:47 usr/sbin/ping6 -> ../bin/ping6 >Mar 20 14:47:52 spectre dracut[28156]: -rwxr-xr-x 1 root root 94624 Mar 20 14:47 usr/sbin/plymouthd >Mar 20 14:47:52 spectre dracut[28156]: lrwxrwxrwx 1 root root 16 Mar 20 14:47 usr/sbin/poweroff -> ../bin/systemctl >Mar 20 14:47:52 spectre dracut[28156]: -rwxr-xr-x 1 root root 942 Feb 6 11:13 usr/sbin/rdsosreport >Mar 20 14:47:52 spectre dracut[28156]: lrwxrwxrwx 1 root root 16 Mar 20 14:47 usr/sbin/reboot -> ../bin/systemctl >Mar 20 14:47:52 spectre dracut[28156]: lrwxrwxrwx 1 root root 11 Mar 20 14:47 usr/sbin/rmmod -> ../bin/kmod >Mar 20 14:47:52 spectre dracut[28156]: -rwxr-xr-x 1 root root 21856 Mar 20 14:47 usr/sbin/swapoff >Mar 20 14:47:52 spectre dracut[28156]: lrwxrwxrwx 1 root root 14 Mar 20 14:47 usr/sbin/udevadm -> ../bin/udevadm >Mar 20 14:47:52 spectre dracut[28156]: drwxr-xr-x 5 root root 0 Mar 20 14:47 usr/share >Mar 20 14:47:52 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 usr/share/pixmaps >Mar 20 14:47:52 spectre dracut[28156]: -rw-r--r-- 1 root root 12056 Feb 4 04:24 usr/share/pixmaps/system-logo-white.png >Mar 20 14:47:52 spectre dracut[28156]: drwxr-xr-x 3 root root 0 Mar 20 14:47 usr/share/plymouth >Mar 20 14:47:52 spectre dracut[28156]: -rw-r--r-- 1 root root 109 Feb 20 14:33 usr/share/plymouth/plymouthd.defaults >Mar 20 14:47:52 spectre dracut[28156]: drwxr-xr-x 5 root root 0 Mar 20 14:47 usr/share/plymouth/themes >Mar 20 14:47:52 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 usr/share/plymouth/themes/charge >Mar 20 14:47:52 spectre dracut[28156]: -rw-r--r-- 1 root root 870 Feb 20 14:34 usr/share/plymouth/themes/charge/box.png >Mar 20 14:47:52 spectre dracut[28156]: -rw-r--r-- 1 root root 131 Feb 20 14:34 usr/share/plymouth/themes/charge/bullet.png >Mar 20 14:47:52 spectre dracut[28156]: -rw-r--r-- 1 root root 366 Feb 20 14:34 usr/share/plymouth/themes/charge/charge.plymouth >Mar 20 14:47:52 spectre dracut[28156]: -rw-r--r-- 1 root root 367 Feb 20 14:34 usr/share/plymouth/themes/charge/entry.png >Mar 20 14:47:52 spectre dracut[28156]: -rw-r--r-- 1 root root 1896 Feb 20 14:34 usr/share/plymouth/themes/charge/lock.png >Mar 20 14:47:52 spectre dracut[28156]: -rw-r--r-- 1 root root 421 Feb 4 04:20 usr/share/plymouth/themes/charge/progress-00.png >Mar 20 14:47:52 spectre dracut[28156]: -rw-r--r-- 1 root root 423 Feb 4 04:20 usr/share/plymouth/themes/charge/progress-01.png >Mar 20 14:47:52 spectre dracut[28156]: -rw-r--r-- 1 root root 435 Feb 4 04:20 usr/share/plymouth/themes/charge/progress-02.png >Mar 20 14:47:52 spectre dracut[28156]: -rw-r--r-- 1 root root 446 Feb 4 04:20 usr/share/plymouth/themes/charge/progress-03.png >Mar 20 14:47:52 spectre dracut[28156]: -rw-r--r-- 1 root root 456 Feb 4 04:20 usr/share/plymouth/themes/charge/progress-04.png >Mar 20 14:47:52 spectre dracut[28156]: -rw-r--r-- 1 root root 470 Feb 4 04:20 usr/share/plymouth/themes/charge/progress-05.png >Mar 20 14:47:52 spectre dracut[28156]: -rw-r--r-- 1 root root 495 Feb 4 04:20 usr/share/plymouth/themes/charge/progress-06.png >Mar 20 14:47:52 spectre dracut[28156]: -rw-r--r-- 1 root root 500 Feb 4 04:20 usr/share/plymouth/themes/charge/progress-07.png >Mar 20 14:47:52 spectre dracut[28156]: -rw-r--r-- 1 root root 511 Feb 4 04:20 usr/share/plymouth/themes/charge/progress-08.png >Mar 20 14:47:52 spectre dracut[28156]: -rw-r--r-- 1 root root 510 Feb 4 04:20 usr/share/plymouth/themes/charge/progress-09.png >Mar 20 14:47:52 spectre dracut[28156]: -rw-r--r-- 1 root root 501 Feb 4 04:20 usr/share/plymouth/themes/charge/progress-10.png >Mar 20 14:47:52 spectre dracut[28156]: -rw-r--r-- 1 root root 494 Feb 4 04:20 usr/share/plymouth/themes/charge/progress-11.png >Mar 20 14:47:52 spectre dracut[28156]: -rw-r--r-- 1 root root 487 Feb 4 04:20 usr/share/plymouth/themes/charge/progress-12.png >Mar 20 14:47:52 spectre dracut[28156]: -rw-r--r-- 1 root root 483 Feb 4 04:20 usr/share/plymouth/themes/charge/progress-13.png >Mar 20 14:47:52 spectre dracut[28156]: -rw-r--r-- 1 root root 470 Feb 4 04:20 usr/share/plymouth/themes/charge/progress-14.png >Mar 20 14:47:52 spectre dracut[28156]: -rw-r--r-- 1 root root 464 Feb 4 04:20 usr/share/plymouth/themes/charge/progress-15.png >Mar 20 14:47:52 spectre dracut[28156]: -rw-r--r-- 1 root root 639 Feb 4 04:20 usr/share/plymouth/themes/charge/progress-16.png >Mar 20 14:47:52 spectre dracut[28156]: -rw-r--r-- 1 root root 605 Feb 4 04:20 usr/share/plymouth/themes/charge/progress-17.png >Mar 20 14:47:52 spectre dracut[28156]: -rw-r--r-- 1 root root 550 Feb 4 04:20 usr/share/plymouth/themes/charge/progress-18.png >Mar 20 14:47:52 spectre dracut[28156]: -rw-r--r-- 1 root root 1124 Feb 4 04:20 usr/share/plymouth/themes/charge/throbber-00.png >Mar 20 14:47:52 spectre dracut[28156]: -rw-r--r-- 1 root root 2318 Feb 4 04:20 usr/share/plymouth/themes/charge/throbber-01.png >Mar 20 14:47:52 spectre dracut[28156]: -rw-r--r-- 1 root root 3939 Feb 4 04:20 usr/share/plymouth/themes/charge/throbber-02.png >Mar 20 14:47:52 spectre dracut[28156]: -rw-r--r-- 1 root root 6396 Feb 4 04:20 usr/share/plymouth/themes/charge/throbber-03.png >Mar 20 14:47:52 spectre dracut[28156]: -rw-r--r-- 1 root root 16436 Feb 4 04:20 usr/share/plymouth/themes/charge/throbber-04.png >Mar 20 14:47:52 spectre dracut[28156]: -rw-r--r-- 1 root root 18111 Feb 4 04:20 usr/share/plymouth/themes/charge/throbber-05.png >Mar 20 14:47:52 spectre dracut[28156]: -rw-r--r-- 1 root root 20558 Feb 4 04:20 usr/share/plymouth/themes/charge/throbber-06.png >Mar 20 14:47:52 spectre dracut[28156]: -rw-r--r-- 1 root root 20381 Feb 4 04:20 usr/share/plymouth/themes/charge/throbber-07.png >Mar 20 14:47:52 spectre dracut[28156]: -rw-r--r-- 1 root root 21051 Feb 4 04:20 usr/share/plymouth/themes/charge/throbber-08.png >Mar 20 14:47:52 spectre dracut[28156]: -rw-r--r-- 1 root root 20927 Feb 4 04:20 usr/share/plymouth/themes/charge/throbber-09.png >Mar 20 14:47:52 spectre dracut[28156]: -rw-r--r-- 1 root root 23327 Feb 4 04:20 usr/share/plymouth/themes/charge/throbber-10.png >Mar 20 14:47:52 spectre dracut[28156]: -rw-r--r-- 1 root root 19595 Feb 4 04:20 usr/share/plymouth/themes/charge/throbber-11.png >Mar 20 14:47:52 spectre dracut[28156]: -rw-r--r-- 1 root root 12805 Feb 4 04:20 usr/share/plymouth/themes/charge/throbber-12.png >Mar 20 14:47:52 spectre dracut[28156]: -rw-r--r-- 1 root root 10008 Feb 4 04:20 usr/share/plymouth/themes/charge/throbber-13.png >Mar 20 14:47:52 spectre dracut[28156]: -rw-r--r-- 1 root root 7198 Feb 4 04:20 usr/share/plymouth/themes/charge/throbber-14.png >Mar 20 14:47:52 spectre dracut[28156]: -rw-r--r-- 1 root root 4740 Feb 4 04:20 usr/share/plymouth/themes/charge/throbber-15.png >Mar 20 14:47:52 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 usr/share/plymouth/themes/details >Mar 20 14:47:52 spectre dracut[28156]: -rw-r--r-- 1 root root 84 Feb 20 14:34 usr/share/plymouth/themes/details/details.plymouth >Mar 20 14:47:52 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 usr/share/plymouth/themes/text >Mar 20 14:47:52 spectre dracut[28156]: -rw-r--r-- 1 root root 98 Feb 20 14:34 usr/share/plymouth/themes/text/text.plymouth >Mar 20 14:47:52 spectre dracut[28156]: drwxr-xr-x 4 root root 0 Mar 20 14:47 usr/share/terminfo >Mar 20 14:47:52 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 usr/share/terminfo/l >Mar 20 14:47:52 spectre dracut[28156]: -rw-r--r-- 1 root root 1787 Nov 29 16:38 usr/share/terminfo/l/linux >Mar 20 14:47:52 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 usr/share/terminfo/v >Mar 20 14:47:52 spectre dracut[28156]: -rw-r--r-- 1 root root 1194 Nov 29 16:38 usr/share/terminfo/v/vt100 >Mar 20 14:47:52 spectre dracut[28156]: -rw-r--r-- 1 root root 1188 Nov 29 16:38 usr/share/terminfo/v/vt102 >Mar 20 14:47:52 spectre dracut[28156]: -rw-r--r-- 1 root root 1377 Nov 29 16:38 usr/share/terminfo/v/vt220 >Mar 20 14:47:52 spectre dracut[28156]: drwxr-xr-x 3 root root 0 Mar 20 14:47 var >Mar 20 14:47:52 spectre dracut[28156]: drwxr-xr-x 3 root root 0 Mar 20 14:47 var/lib >Mar 20 14:47:52 spectre dracut[28156]: drwxr-xr-x 2 root root 0 Mar 20 14:47 var/lib/lldpad >Mar 20 14:47:52 spectre dracut[28156]: lrwxrwxrwx 1 root root 11 Mar 20 14:47 var/lock -> ../run/lock >Mar 20 14:47:52 spectre dracut[28156]: lrwxrwxrwx 1 root root 10 Mar 20 14:47 var/log -> ../run/log >Mar 20 14:47:52 spectre dracut[28156]: lrwxrwxrwx 1 root root 6 Mar 20 14:47 var/run -> ../run >Mar 20 14:47:52 spectre dracut[28156]: ======================================================================== >Mar 20 14:48:58 spectre sudo[6046]: dshea : TTY=pts/4 ; PWD=/home/dshea/rpmbuild ; USER=root ; COMMAND=/bin/yum install RPMS/noarch/pykickstart-1.99.52-1.fc21.noarch.rpm >Mar 20 14:49:03 spectre yum[6047]: Updated: pykickstart-1.99.52-1.fc21.noarch >Mar 20 14:49:12 spectre sudo[6052]: dshea : TTY=pts/4 ; PWD=/home/dshea/rpmbuild ; USER=root ; COMMAND=/bin/yum install python-blivet >Mar 20 14:51:34 spectre sudo[8974]: dshea : TTY=pts/4 ; PWD=/home/dshea/rpmbuild ; USER=root ; COMMAND=/bin/yum install RPMS/noarch/python-blivet-0.45-1.fc21.noarch.rpm >Mar 20 14:51:38 spectre yum[8975]: Updated: python-blivet-0.45-1.fc21.noarch >Mar 20 14:51:39 spectre dbus-daemon[637]: dbus[637]: [system] Activating via systemd: service name='org.freedesktop.PackageKit' unit='packagekit.service' >Mar 20 14:51:39 spectre dbus[637]: [system] Activating via systemd: service name='org.freedesktop.PackageKit' unit='packagekit.service' >Mar 20 14:51:39 spectre systemd[1]: Starting PackageKit Daemon... >Mar 20 14:51:39 spectre PackageKit[8981]: daemon start >Mar 20 14:51:39 spectre dbus[637]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' >Mar 20 14:51:39 spectre dbus-daemon[637]: dbus[637]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' >Mar 20 14:51:39 spectre systemd[1]: Starting Authorization Manager... >Mar 20 14:51:39 spectre polkitd[8985]: Started polkitd version 0.112 >Mar 20 14:51:39 spectre polkitd[8985]: Loading rules from directory /etc/polkit-1/rules.d >Mar 20 14:51:39 spectre polkitd[8985]: Loading rules from directory /usr/share/polkit-1/rules.d >Mar 20 14:51:39 spectre polkitd[8985]: Finished loading, compiling and executing 3 rules >Mar 20 14:51:39 spectre dbus[637]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' >Mar 20 14:51:39 spectre systemd[1]: Started Authorization Manager. >Mar 20 14:51:39 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' >Mar 20 14:51:39 spectre polkitd[8985]: Acquired the name org.freedesktop.PolicyKit1 on the system bus >Mar 20 14:51:39 spectre dbus[637]: [system] Successfully activated service 'org.freedesktop.PackageKit' >Mar 20 14:51:39 spectre systemd[1]: Started PackageKit Daemon. >Mar 20 14:51:39 spectre dbus-daemon[637]: dbus[637]: [system] Successfully activated service 'org.freedesktop.PackageKit' >Mar 20 14:56:44 spectre PackageKit[8981]: daemon quit >Mar 20 14:56:45 spectre packagekitd[8981]: (packagekitd:8981): GLib-CRITICAL **: Source ID 8 was not found when attempting to remove it >Mar 20 15:01:01 spectre systemd[1]: Starting user-0.slice. >Mar 20 15:01:01 spectre systemd[1]: Created slice user-0.slice. >Mar 20 15:01:01 spectre systemd[1]: Starting Session 98 of user root. >Mar 20 15:01:01 spectre systemd[1]: Started Session 98 of user root. >Mar 20 15:01:01 spectre systemd[1]: Starting User Manager for UID 0... >Mar 20 15:01:01 spectre systemd[15089]: pam_unix(systemd-user:session): session opened for user root by (uid=0) >Mar 20 15:01:01 spectre systemd[15089]: Starting Paths. >Mar 20 15:01:01 spectre systemd[15089]: Reached target Paths. >Mar 20 15:01:01 spectre systemd[15089]: Starting Timers. >Mar 20 15:01:01 spectre systemd[15089]: Reached target Timers. >Mar 20 15:01:01 spectre systemd[15089]: Starting Sockets. >Mar 20 15:01:01 spectre systemd[15089]: Reached target Sockets. >Mar 20 15:01:01 spectre systemd[15089]: Starting Basic System. >Mar 20 15:01:01 spectre systemd[15089]: Reached target Basic System. >Mar 20 15:01:01 spectre systemd[15089]: Starting Default. >Mar 20 15:01:01 spectre systemd[15089]: Reached target Default. >Mar 20 15:01:01 spectre systemd[15089]: Startup finished in 17ms. >Mar 20 15:01:01 spectre systemd[1]: Started User Manager for UID 0. >Mar 20 15:01:01 spectre CROND[15096]: (root) CMD (run-parts /etc/cron.hourly) >Mar 20 15:01:01 spectre run-parts[15099]: (/etc/cron.hourly) starting 0anacron >Mar 20 15:01:01 spectre run-parts[15105]: (/etc/cron.hourly) finished 0anacron >Mar 20 15:01:01 spectre run-parts[15107]: (/etc/cron.hourly) starting mcelog.cron >Mar 20 15:01:01 spectre run-parts[15111]: (/etc/cron.hourly) finished mcelog.cron >Mar 20 15:01:01 spectre systemd[1]: Stopping User Manager for UID 0... >Mar 20 15:01:01 spectre systemd[15089]: Stopping Default. >Mar 20 15:01:01 spectre systemd[15089]: Stopped target Default. >Mar 20 15:01:01 spectre systemd[15089]: Stopping Basic System. >Mar 20 15:01:01 spectre systemd[15089]: Stopped target Basic System. >Mar 20 15:01:01 spectre systemd[15089]: Stopping Paths. >Mar 20 15:01:01 spectre systemd[15089]: Stopped target Paths. >Mar 20 15:01:01 spectre systemd[15089]: Stopping Timers. >Mar 20 15:01:01 spectre systemd[15089]: Stopped target Timers. >Mar 20 15:01:01 spectre systemd[15089]: Stopping Sockets. >Mar 20 15:01:01 spectre systemd[15089]: Stopped target Sockets. >Mar 20 15:01:01 spectre systemd[15089]: Starting Shutdown. >Mar 20 15:01:01 spectre systemd[15089]: Reached target Shutdown. >Mar 20 15:01:01 spectre systemd[15089]: Starting Exit the Session... >Mar 20 15:01:01 spectre systemd[15089]: Received SIGRTMIN+24 from PID 15114 (kill). >Mar 20 15:01:01 spectre systemd[15094]: pam_unix(systemd-user:session): session closed for user root >Mar 20 15:01:01 spectre systemd[1]: Stopped User Manager for UID 0. >Mar 20 15:01:01 spectre systemd[1]: Stopping user-0.slice. >Mar 20 15:01:01 spectre systemd[1]: Removed slice user-0.slice. >Mar 20 15:01:37 spectre sudo[19287]: dshea : TTY=pts/4 ; PWD=/home/dshea/rpmbuild ; USER=root ; COMMAND=/bin/yum install RPMS/x86_64/anaconda-core-21.28-1.fc21.x86_64.rpm >Mar 20 15:01:44 spectre sudo[19289]: dshea : TTY=pts/4 ; PWD=/home/dshea/rpmbuild ; USER=root ; COMMAND=/bin/yum install RPMS/x86_64/anaconda-core-21.28-1.fc21.x86_64.rpm RPMS/x86_64/anaconda-tui-21.28-1.fc21.x86_64.rpm >Mar 20 15:01:50 spectre yum[19290]: Installed: python-deltarpm-3.6-3.fc21.x86_64 >Mar 20 15:01:50 spectre yum[19290]: Installed: createrepo-0.10.3-2.fc21.noarch >Mar 20 15:01:51 spectre yum[19290]: Installed: anaconda-tui-21.28-1.fc21.x86_64 >Mar 20 15:01:53 spectre yum[19290]: Installed: anaconda-core-21.28-1.fc21.x86_64 >Mar 20 15:03:19 spectre sudo[19294]: dshea : TTY=pts/4 ; PWD=/home/dshea ; USER=root ; COMMAND=/bin/yum install docker-io >Mar 20 15:03:35 spectre groupadd[19300]: group added to /etc/group: name=docker, GID=986 >Mar 20 15:03:35 spectre groupadd[19300]: group added to /etc/gshadow: name=docker >Mar 20 15:03:35 spectre groupadd[19300]: new group: name=docker, GID=986 >Mar 20 15:03:37 spectre systemd[1]: Reloading. >Mar 20 15:03:37 spectre systemd[19306]: /usr/lib/systemd/system-generators/systemd-gpt-auto-generator failed with error code 1. >Mar 20 15:03:37 spectre systemd-gpt-auto-generator[19312]: Out of memory. >Mar 20 15:03:37 spectre systemd[1]: Configuration file /usr/lib/systemd/system/auditd.service is marked world-inaccessible. This has no effect as configuration data is accessible via APIs without restrictions. Proceeding anyway. >Mar 20 15:03:37 spectre yum[19295]: Installed: docker-io-0.9.0-3.fc21.x86_64 >Mar 20 15:04:42 spectre sshd[12409]: Received disconnect from 192.168.100.1: 11: disconnected by user >Mar 20 15:04:42 spectre sshd[12326]: pam_unix(sshd:session): session closed for user dshea >Mar 20 15:04:42 spectre systemd-logind[17665]: Removed session 96. >Mar 20 15:04:43 spectre sshd[19323]: Accepted publickey for dshea from 192.168.100.1 port 55819 ssh2: RSA 29:71:d3:be:dc:71:8e:0d:ef:a5:2f:ab:31:0c:82:d4 >Mar 20 15:04:43 spectre systemd-logind[17665]: New session 99 of user dshea. >Mar 20 15:04:43 spectre systemd[1]: Starting Session 99 of user dshea. >Mar 20 15:04:43 spectre systemd[1]: Started Session 99 of user dshea. >Mar 20 15:04:43 spectre sshd[19323]: pam_unix(sshd:session): session opened for user dshea by (uid=0) >Mar 20 15:08:42 spectre sudo[19369]: dshea : TTY=pts/4 ; PWD=/home/dshea ; USER=root ; COMMAND=./cont_build.sh dwalsh-test koji >Mar 20 15:09:34 spectre yum[19371]: Installed: libgcc-4.8.2-1.fc20.x86_64 >Mar 20 15:09:34 spectre yum[19371]: Installed: setup-2.8.71-2.fc20.noarch >Mar 20 15:09:34 spectre yum[19371]: Installed: filesystem-3.2-19.fc20.x86_64 >Mar 20 15:09:35 spectre yum[19371]: Installed: basesystem-10.0-9.fc20.noarch >Mar 20 15:09:36 spectre yum[19371]: Installed: tzdata-2013h-1.fc20.noarch >Mar 20 15:09:36 spectre yum[19371]: Installed: ncurses-base-5.9-12.20130511.fc20.noarch >Mar 20 15:09:36 spectre yum[19371]: Installed: nss-softokn-freebl-3.15.2-2.fc20.x86_64 >Mar 20 15:09:39 spectre yum[19371]: Installed: glibc-common-2.18-11.fc20.x86_64 >Mar 20 15:09:42 spectre yum[19371]: Installed: glibc-2.18-11.fc20.x86_64 >Mar 20 15:09:43 spectre yum[19371]: Installed: libstdc++-4.8.2-1.fc20.x86_64 >Mar 20 15:09:43 spectre yum[19371]: Installed: ncurses-libs-5.9-12.20130511.fc20.x86_64 >Mar 20 15:09:44 spectre yum[19371]: Installed: bash-4.2.45-4.fc20.x86_64 >Mar 20 15:09:44 spectre yum[19371]: Installed: libsepol-2.1.9-2.fc20.x86_64 >Mar 20 15:09:44 spectre yum[19371]: Installed: pcre-8.33-2.fc20.1.x86_64 >Mar 20 15:09:45 spectre yum[19371]: Installed: libselinux-2.1.13-19.fc20.x86_64 >Mar 20 15:09:45 spectre yum[19371]: Installed: zlib-1.2.8-3.fc20.x86_64 >Mar 20 15:09:45 spectre yum[19371]: Installed: info-5.1-4.fc20.x86_64 >Mar 20 15:09:45 spectre yum[19371]: Installed: nspr-4.10.1-1.fc20.x86_64 >Mar 20 15:09:45 spectre yum[19371]: Installed: nss-util-3.15.2-2.fc20.x86_64 >Mar 20 15:09:46 spectre yum[19371]: Installed: libdb-5.3.28-1.fc20.x86_64 >Mar 20 15:09:46 spectre yum[19371]: Installed: bzip2-libs-1.0.6-9.fc20.x86_64 >Mar 20 15:09:46 spectre yum[19371]: Installed: popt-1.13-15.fc20.x86_64 >Mar 20 15:09:46 spectre yum[19371]: Installed: xz-libs-5.1.2-6alpha.fc20.x86_64 >Mar 20 15:09:47 spectre yum[19371]: Installed: readline-6.2-8.fc20.x86_64 >Mar 20 15:09:47 spectre yum[19371]: Installed: libcom_err-1.42.8-3.fc20.x86_64 >Mar 20 15:09:47 spectre yum[19371]: Installed: audit-libs-2.3.2-1.fc20.x86_64 >Mar 20 15:09:48 spectre yum[19371]: Installed: libattr-2.4.47-3.fc20.x86_64 >Mar 20 15:09:48 spectre yum[19371]: Installed: libacl-2.2.52-4.fc20.x86_64 >Mar 20 15:09:48 spectre yum[19371]: Installed: libcap-2.22-7.fc20.x86_64 >Mar 20 15:09:48 spectre yum[19371]: Installed: libffi-3.0.13-5.fc20.x86_64 >Mar 20 15:09:49 spectre yum[19371]: Installed: libgpg-error-1.12-1.fc20.x86_64 >Mar 20 15:09:49 spectre yum[19371]: Installed: lua-5.2.2-5.fc20.x86_64 >Mar 20 15:09:49 spectre yum[19371]: Installed: chkconfig-1.3.60-4.fc20.x86_64 >Mar 20 15:09:49 spectre yum[19371]: Installed: libuuid-2.24-2.fc20.x86_64 >Mar 20 15:09:50 spectre yum[19371]: Installed: elfutils-libelf-0.157-1.fc20.x86_64 >Mar 20 15:09:50 spectre yum[19371]: Installed: libgcrypt-1.5.3-2.fc20.x86_64 >Mar 20 15:09:50 spectre yum[19371]: Installed: p11-kit-0.20.1-1.fc20.x86_64 >Mar 20 15:09:50 spectre yum[19371]: Installed: sed-4.2.2-5.fc20.x86_64 >Mar 20 15:09:51 spectre yum[19371]: Installed: sqlite-3.8.1-2.fc20.x86_64 >Mar 20 15:09:51 spectre yum[19371]: Installed: nss-softokn-3.15.2-2.fc20.x86_64 >Mar 20 15:09:51 spectre yum[19371]: Installed: libidn-1.28-2.fc20.x86_64 >Mar 20 15:09:52 spectre yum[19371]: Installed: grep-2.15-1.fc20.x86_64 >Mar 20 15:09:52 spectre yum[19371]: Installed: keyutils-libs-1.5.8-1.fc20.x86_64 >Mar 20 15:09:52 spectre yum[19371]: Installed: expat-2.1.0-7.fc20.x86_64 >Mar 20 15:09:53 spectre yum[19371]: Installed: libmetalink-0.1.2-4.fc20.x86_64 >Mar 20 15:09:54 spectre yum[19371]: Installed: pinentry-0.8.1-11.fc20.x86_64 >Mar 20 15:09:54 spectre yum[19371]: Installed: libassuan-2.1.0-2.fc20.x86_64 >Mar 20 15:09:54 spectre yum[19371]: Installed: libxml2-2.9.1-2.fc20.x86_64 >Mar 20 15:09:54 spectre yum[19371]: Installed: 1:pkgconfig-0.28-3.fc20.x86_64 >Mar 20 15:09:55 spectre yum[19371]: Installed: glib2-2.38.2-2.fc20.x86_64 >Mar 20 15:10:33 spectre yum[19371]: Installed: shared-mime-info-1.2-1.fc20.x86_64 >Mar 20 15:10:34 spectre yum[19371]: Installed: libdb-utils-5.3.28-1.fc20.x86_64 >Mar 20 15:10:34 spectre yum[19371]: Installed: cyrus-sasl-lib-2.1.26-14.fc20.x86_64 >Mar 20 15:10:34 spectre yum[19371]: Installed: gawk-4.1.0-2.fc20.x86_64 >Mar 20 15:10:35 spectre yum[19371]: Installed: file-libs-5.14-12.fc20.x86_64 >Mar 20 15:10:35 spectre yum[19371]: Installed: ncurses-5.9-12.20130511.fc20.x86_64 >Mar 20 15:10:35 spectre yum[19371]: Installed: 1:gmp-5.1.2-2.fc20.x86_64 >Mar 20 15:10:35 spectre yum[19371]: Installed: libverto-0.2.5-3.fc20.x86_64 >Mar 20 15:10:35 spectre yum[19371]: Installed: gdbm-1.10-7.fc20.x86_64 >Mar 20 15:10:36 spectre yum[19371]: Installed: libcap-ng-0.7.3-6.fc20.x86_64 >Mar 20 15:10:36 spectre yum[19371]: Installed: ustr-1.0.4-15.fc20.x86_64 >Mar 20 15:10:36 spectre yum[19371]: Installed: libsemanage-2.1.10-14.fc20.x86_64 >Mar 20 15:10:36 spectre yum[19371]: Installed: 1:dbus-libs-1.6.12-1.fc20.x86_64 >Mar 20 15:10:37 spectre yum[19371]: Installed: nss-tools-3.15.2-3.fc20.x86_64 >Mar 20 15:10:37 spectre yum[19371]: Installed: gzip-1.6-2.fc20.x86_64 >Mar 20 15:10:37 spectre yum[19371]: Installed: cracklib-2.9.0-5.fc20.x86_64 >Mar 20 15:10:38 spectre yum[19371]: Installed: cracklib-dicts-2.9.0-5.fc20.x86_64 >Mar 20 15:10:38 spectre yum[19371]: Installed: openldap-2.4.36-4.fc20.x86_64 >Mar 20 15:10:38 spectre yum[19371]: Installed: nss-3.15.2-3.fc20.x86_64 >Mar 20 15:10:39 spectre yum[19371]: Installed: libuser-0.60-3.fc20.x86_64 >Mar 20 15:10:39 spectre yum[19371]: Installed: systemd-libs-208-9.fc20.x86_64 >Mar 20 15:10:39 spectre yum[19371]: Installed: libpwquality-1.2.3-1.fc20.x86_64 >Mar 20 15:10:39 spectre yum[19371]: Installed: libmount-2.24-2.fc20.x86_64 >Mar 20 15:10:40 spectre yum[19371]: Installed: coreutils-8.21-18.fc20.x86_64 >Mar 20 15:10:40 spectre yum[19371]: Installed: pam-1.1.8-1.fc20.x86_64 >Mar 20 15:10:41 spectre yum[19371]: Installed: libblkid-2.24-2.fc20.x86_64 >Mar 20 15:10:41 spectre yum[19371]: Installed: nss-sysinit-3.15.2-3.fc20.x86_64 >Mar 20 15:10:41 spectre yum[19371]: Installed: 2:shadow-utils-4.1.5.1-8.fc20.x86_64 >Mar 20 15:10:42 spectre yum[19371]: Installed: libutempter-1.1.6-3.fc20.x86_64 >Mar 20 15:10:42 spectre yum[19371]: Installed: util-linux-2.24-2.fc20.x86_64 >Mar 20 15:10:43 spectre yum[19371]: Installed: krb5-libs-1.11.3-33.fc20.x86_64 >Mar 20 15:10:43 spectre yum[19371]: Installed: pth-2.0.7-21.fc20.x86_64 >Mar 20 15:10:43 spectre yum[19371]: Installed: libtasn1-3.3-2.fc20.x86_64 >Mar 20 15:10:43 spectre yum[19371]: Installed: p11-kit-trust-0.20.1-1.fc20.x86_64 >Mar 20 15:10:45 spectre yum[19371]: Installed: ca-certificates-2013.1.94-18.fc20.noarch >Mar 20 15:10:45 spectre yum[19371]: Installed: 1:openssl-libs-1.0.1e-30.fc20.x86_64 >Mar 20 15:10:47 spectre yum[19371]: Installed: python-libs-2.7.5-9.fc20.x86_64 >Mar 20 15:10:47 spectre yum[19371]: Installed: python-2.7.5-9.fc20.x86_64 >Mar 20 15:10:47 spectre yum[19371]: Installed: libssh2-1.4.3-8.fc20.x86_64 >Mar 20 15:10:48 spectre yum[19371]: Installed: libcurl-7.32.0-3.fc20.x86_64 >Mar 20 15:10:48 spectre yum[19371]: Installed: python-pycurl-7.19.0-17.20120408git9b8f4e38.fc20.x86_64 >Mar 20 15:10:48 spectre yum[19371]: Installed: python-urlgrabber-3.9.1-32.fc20.noarch >Mar 20 15:10:49 spectre yum[19371]: Installed: gnupg2-2.0.22-1.fc20.x86_64 >Mar 20 15:10:49 spectre yum[19371]: Installed: curl-7.32.0-3.fc20.x86_64 >Mar 20 15:10:49 spectre yum[19371]: Installed: rpm-libs-4.11.1-7.fc20.x86_64 >Mar 20 15:10:50 spectre yum[19371]: Installed: rpm-4.11.1-7.fc20.x86_64 >Mar 20 15:10:50 spectre yum[19371]: Installed: rpm-build-libs-4.11.1-7.fc20.x86_64 >Mar 20 15:10:50 spectre yum[19371]: Installed: rpm-python-4.11.1-7.fc20.x86_64 >Mar 20 15:10:50 spectre yum[19371]: Installed: pyOpenSSL-0.13.1-1.fc20.x86_64 >Mar 20 15:10:50 spectre yum[19371]: Installed: python-krbV-1.0.90-7.fc20.x86_64 >Mar 20 15:10:51 spectre yum[19371]: Installed: koji-1.8.0-2.fc20.noarch >Mar 20 15:13:06 spectre sudo[19551]: dshea : TTY=pts/4 ; PWD=/srv ; USER=root ; COMMAND=/bin/rm -rf dwalsh-test/ >Mar 20 15:13:14 spectre sudo[19553]: dshea : TTY=pts/4 ; PWD=/srv ; USER=root ; COMMAND=/home/dshea/cont_build.sh dwalsh-test koji >Mar 20 15:13:42 spectre yum[19555]: Installed: libgcc-4.8.2-1.fc20.x86_64 >Mar 20 15:13:43 spectre yum[19555]: Installed: setup-2.8.71-2.fc20.noarch >Mar 20 15:13:43 spectre yum[19555]: Installed: filesystem-3.2-19.fc20.x86_64 >Mar 20 15:13:43 spectre yum[19555]: Installed: basesystem-10.0-9.fc20.noarch >Mar 20 15:13:44 spectre yum[19555]: Installed: tzdata-2013h-1.fc20.noarch >Mar 20 15:13:45 spectre yum[19555]: Installed: ncurses-base-5.9-12.20130511.fc20.noarch >Mar 20 15:13:45 spectre yum[19555]: Installed: nss-softokn-freebl-3.15.2-2.fc20.x86_64 >Mar 20 15:13:48 spectre yum[19555]: Installed: glibc-common-2.18-11.fc20.x86_64 >Mar 20 15:13:51 spectre yum[19555]: Installed: glibc-2.18-11.fc20.x86_64 >Mar 20 15:13:51 spectre yum[19555]: Installed: libstdc++-4.8.2-1.fc20.x86_64 >Mar 20 15:13:52 spectre yum[19555]: Installed: ncurses-libs-5.9-12.20130511.fc20.x86_64 >Mar 20 15:13:52 spectre yum[19555]: Installed: bash-4.2.45-4.fc20.x86_64 >Mar 20 15:13:52 spectre yum[19555]: Installed: libsepol-2.1.9-2.fc20.x86_64 >Mar 20 15:13:53 spectre yum[19555]: Installed: pcre-8.33-2.fc20.1.x86_64 >Mar 20 15:13:53 spectre yum[19555]: Installed: libselinux-2.1.13-19.fc20.x86_64 >Mar 20 15:13:53 spectre yum[19555]: Installed: zlib-1.2.8-3.fc20.x86_64 >Mar 20 15:13:53 spectre yum[19555]: Installed: info-5.1-4.fc20.x86_64 >Mar 20 15:13:53 spectre yum[19555]: Installed: nspr-4.10.1-1.fc20.x86_64 >Mar 20 15:13:54 spectre yum[19555]: Installed: nss-util-3.15.2-2.fc20.x86_64 >Mar 20 15:13:54 spectre yum[19555]: Installed: libdb-5.3.28-1.fc20.x86_64 >Mar 20 15:13:54 spectre yum[19555]: Installed: bzip2-libs-1.0.6-9.fc20.x86_64 >Mar 20 15:13:54 spectre yum[19555]: Installed: popt-1.13-15.fc20.x86_64 >Mar 20 15:13:55 spectre yum[19555]: Installed: xz-libs-5.1.2-6alpha.fc20.x86_64 >Mar 20 15:13:55 spectre yum[19555]: Installed: readline-6.2-8.fc20.x86_64 >Mar 20 15:13:55 spectre yum[19555]: Installed: libcom_err-1.42.8-3.fc20.x86_64 >Mar 20 15:13:55 spectre yum[19555]: Installed: audit-libs-2.3.2-1.fc20.x86_64 >Mar 20 15:13:56 spectre yum[19555]: Installed: libattr-2.4.47-3.fc20.x86_64 >Mar 20 15:13:56 spectre yum[19555]: Installed: libacl-2.2.52-4.fc20.x86_64 >Mar 20 15:13:56 spectre yum[19555]: Installed: libcap-2.22-7.fc20.x86_64 >Mar 20 15:13:56 spectre yum[19555]: Installed: libffi-3.0.13-5.fc20.x86_64 >Mar 20 15:13:57 spectre yum[19555]: Installed: libgpg-error-1.12-1.fc20.x86_64 >Mar 20 15:13:57 spectre yum[19555]: Installed: lua-5.2.2-5.fc20.x86_64 >Mar 20 15:13:57 spectre yum[19555]: Installed: chkconfig-1.3.60-4.fc20.x86_64 >Mar 20 15:13:57 spectre yum[19555]: Installed: libuuid-2.24-2.fc20.x86_64 >Mar 20 15:13:58 spectre yum[19555]: Installed: elfutils-libelf-0.157-1.fc20.x86_64 >Mar 20 15:13:58 spectre yum[19555]: Installed: libgcrypt-1.5.3-2.fc20.x86_64 >Mar 20 15:13:58 spectre yum[19555]: Installed: p11-kit-0.20.1-1.fc20.x86_64 >Mar 20 15:13:58 spectre yum[19555]: Installed: sed-4.2.2-5.fc20.x86_64 >Mar 20 15:13:59 spectre yum[19555]: Installed: sqlite-3.8.1-2.fc20.x86_64 >Mar 20 15:13:59 spectre yum[19555]: Installed: nss-softokn-3.15.2-2.fc20.x86_64 >Mar 20 15:14:00 spectre yum[19555]: Installed: libidn-1.28-2.fc20.x86_64 >Mar 20 15:14:00 spectre yum[19555]: Installed: grep-2.15-1.fc20.x86_64 >Mar 20 15:14:00 spectre yum[19555]: Installed: keyutils-libs-1.5.8-1.fc20.x86_64 >Mar 20 15:14:00 spectre yum[19555]: Installed: expat-2.1.0-7.fc20.x86_64 >Mar 20 15:14:01 spectre yum[19555]: Installed: libmetalink-0.1.2-4.fc20.x86_64 >Mar 20 15:14:01 spectre yum[19555]: Installed: pinentry-0.8.1-11.fc20.x86_64 >Mar 20 15:14:01 spectre yum[19555]: Installed: libassuan-2.1.0-2.fc20.x86_64 >Mar 20 15:14:01 spectre yum[19555]: Installed: libxml2-2.9.1-2.fc20.x86_64 >Mar 20 15:14:02 spectre yum[19555]: Installed: 1:pkgconfig-0.28-3.fc20.x86_64 >Mar 20 15:14:02 spectre yum[19555]: Installed: glib2-2.38.2-2.fc20.x86_64 >Mar 20 15:14:41 spectre yum[19555]: Installed: shared-mime-info-1.2-1.fc20.x86_64 >Mar 20 15:14:41 spectre yum[19555]: Installed: libdb-utils-5.3.28-1.fc20.x86_64 >Mar 20 15:14:41 spectre yum[19555]: Installed: cyrus-sasl-lib-2.1.26-14.fc20.x86_64 >Mar 20 15:14:42 spectre yum[19555]: Installed: gawk-4.1.0-2.fc20.x86_64 >Mar 20 15:14:42 spectre yum[19555]: Installed: file-libs-5.14-12.fc20.x86_64 >Mar 20 15:14:43 spectre yum[19555]: Installed: ncurses-5.9-12.20130511.fc20.x86_64 >Mar 20 15:14:43 spectre yum[19555]: Installed: 1:gmp-5.1.2-2.fc20.x86_64 >Mar 20 15:14:43 spectre yum[19555]: Installed: libverto-0.2.5-3.fc20.x86_64 >Mar 20 15:14:43 spectre yum[19555]: Installed: gdbm-1.10-7.fc20.x86_64 >Mar 20 15:14:43 spectre yum[19555]: Installed: libcap-ng-0.7.3-6.fc20.x86_64 >Mar 20 15:14:44 spectre yum[19555]: Installed: ustr-1.0.4-15.fc20.x86_64 >Mar 20 15:14:44 spectre yum[19555]: Installed: libsemanage-2.1.10-14.fc20.x86_64 >Mar 20 15:14:44 spectre yum[19555]: Installed: 1:dbus-libs-1.6.12-1.fc20.x86_64 >Mar 20 15:14:45 spectre yum[19555]: Installed: nss-tools-3.15.2-3.fc20.x86_64 >Mar 20 15:14:45 spectre yum[19555]: Installed: gzip-1.6-2.fc20.x86_64 >Mar 20 15:14:45 spectre yum[19555]: Installed: cracklib-2.9.0-5.fc20.x86_64 >Mar 20 15:14:46 spectre yum[19555]: Installed: cracklib-dicts-2.9.0-5.fc20.x86_64 >Mar 20 15:14:46 spectre yum[19555]: Installed: openldap-2.4.36-4.fc20.x86_64 >Mar 20 15:14:46 spectre yum[19555]: Installed: nss-3.15.2-3.fc20.x86_64 >Mar 20 15:14:46 spectre yum[19555]: Installed: libuser-0.60-3.fc20.x86_64 >Mar 20 15:14:47 spectre yum[19555]: Installed: systemd-libs-208-9.fc20.x86_64 >Mar 20 15:14:47 spectre yum[19555]: Installed: libpwquality-1.2.3-1.fc20.x86_64 >Mar 20 15:14:47 spectre yum[19555]: Installed: libmount-2.24-2.fc20.x86_64 >Mar 20 15:14:48 spectre yum[19555]: Installed: coreutils-8.21-18.fc20.x86_64 >Mar 20 15:14:48 spectre yum[19555]: Installed: pam-1.1.8-1.fc20.x86_64 >Mar 20 15:14:49 spectre yum[19555]: Installed: libblkid-2.24-2.fc20.x86_64 >Mar 20 15:14:49 spectre yum[19555]: Installed: nss-sysinit-3.15.2-3.fc20.x86_64 >Mar 20 15:14:49 spectre yum[19555]: Installed: 2:shadow-utils-4.1.5.1-8.fc20.x86_64 >Mar 20 15:14:50 spectre yum[19555]: Installed: libutempter-1.1.6-3.fc20.x86_64 >Mar 20 15:14:50 spectre yum[19555]: Installed: util-linux-2.24-2.fc20.x86_64 >Mar 20 15:14:51 spectre yum[19555]: Installed: krb5-libs-1.11.3-33.fc20.x86_64 >Mar 20 15:14:51 spectre yum[19555]: Installed: pth-2.0.7-21.fc20.x86_64 >Mar 20 15:14:51 spectre yum[19555]: Installed: libtasn1-3.3-2.fc20.x86_64 >Mar 20 15:14:51 spectre yum[19555]: Installed: p11-kit-trust-0.20.1-1.fc20.x86_64 >Mar 20 15:14:53 spectre yum[19555]: Installed: ca-certificates-2013.1.94-18.fc20.noarch >Mar 20 15:14:53 spectre yum[19555]: Installed: 1:openssl-libs-1.0.1e-30.fc20.x86_64 >Mar 20 15:14:55 spectre yum[19555]: Installed: python-libs-2.7.5-9.fc20.x86_64 >Mar 20 15:14:55 spectre yum[19555]: Installed: python-2.7.5-9.fc20.x86_64 >Mar 20 15:14:55 spectre yum[19555]: Installed: libssh2-1.4.3-8.fc20.x86_64 >Mar 20 15:14:56 spectre yum[19555]: Installed: libcurl-7.32.0-3.fc20.x86_64 >Mar 20 15:14:56 spectre yum[19555]: Installed: python-pycurl-7.19.0-17.20120408git9b8f4e38.fc20.x86_64 >Mar 20 15:14:56 spectre yum[19555]: Installed: python-urlgrabber-3.9.1-32.fc20.noarch >Mar 20 15:14:57 spectre yum[19555]: Installed: gnupg2-2.0.22-1.fc20.x86_64 >Mar 20 15:14:57 spectre yum[19555]: Installed: curl-7.32.0-3.fc20.x86_64 >Mar 20 15:14:57 spectre yum[19555]: Installed: rpm-libs-4.11.1-7.fc20.x86_64 >Mar 20 15:14:58 spectre yum[19555]: Installed: rpm-4.11.1-7.fc20.x86_64 >Mar 20 15:14:58 spectre yum[19555]: Installed: rpm-build-libs-4.11.1-7.fc20.x86_64 >Mar 20 15:14:58 spectre yum[19555]: Installed: rpm-python-4.11.1-7.fc20.x86_64 >Mar 20 15:14:58 spectre yum[19555]: Installed: pyOpenSSL-0.13.1-1.fc20.x86_64 >Mar 20 15:14:58 spectre yum[19555]: Installed: python-krbV-1.0.90-7.fc20.x86_64 >Mar 20 15:14:59 spectre yum[19555]: Installed: koji-1.8.0-2.fc20.noarch >Mar 20 15:16:49 spectre systemd[1]: Starting dnf makecache... >Mar 20 15:16:49 spectre dnf[19712]: Config time: 0.007 >Mar 20 15:16:49 spectre dnf[19712]: cachedir: /var/cache/dnf/x86_64/21 >Mar 20 15:16:49 spectre dnf[19712]: dnf version: 0.4.18 >Mar 20 15:16:49 spectre dnf[19712]: Making cache files for all metadata files. >Mar 20 15:16:49 spectre dnf[19712]: Metadata cache refreshed recently. >Mar 20 15:16:49 spectre systemd[1]: Started dnf makecache. >Mar 20 15:16:52 spectre sudo[19715]: dshea : TTY=pts/4 ; PWD=/srv ; USER=root ; COMMAND=/bin/systemctl start docker >Mar 20 15:16:52 spectre systemd[1]: Starting Docker Application Container Engine... >Mar 20 15:16:52 spectre systemd[1]: Started Docker Application Container Engine. >Mar 20 15:16:52 spectre docker[19718]: [/var/lib/docker|7e296e71] +job serveapi(unix:///var/run/docker.sock) >Mar 20 15:16:52 spectre docker[19718]: [/var/lib/docker|7e296e71] +job initserver() >Mar 20 15:16:52 spectre docker[19718]: [/var/lib/docker|7e296e71.initserver()] Creating server >Mar 20 15:16:52 spectre docker[19718]: 2014/03/20 15:16:52 Listening for HTTP on unix (/var/run/docker.sock) >Mar 20 15:16:53 spectre kernel: loop: module loaded >Mar 20 15:16:53 spectre kernel: bio: create slab <bio-2> at 2 >Mar 20 15:16:59 spectre docker[19718]: [/var/lib/docker|7e296e71] +job init_networkdriver() >Mar 20 15:16:59 spectre docker[19718]: [/var/lib/docker|7e296e71.init_networkdriver()] creating new bridge for docker0 >Mar 20 15:16:59 spectre docker[19718]: [/var/lib/docker|7e296e71.init_networkdriver()] getting iface addr >Mar 20 15:16:59 spectre avahi-daemon[622]: Joining mDNS multicast group on interface docker0.IPv4 with address 172.17.42.1. >Mar 20 15:16:59 spectre avahi-daemon[622]: New relevant interface docker0.IPv4 for mDNS. >Mar 20 15:16:59 spectre avahi-daemon[622]: Registering new address record for 172.17.42.1 on docker0.IPv4. >Mar 20 15:16:59 spectre systemd-udevd[19766]: Could not apply link config to docker0 >Mar 20 15:16:59 spectre NetworkManager[746]: <info> (docker0): carrier is OFF >Mar 20 15:16:59 spectre NetworkManager[746]: <info> (docker0): new Bridge device (driver: 'bridge' ifindex: 3) >Mar 20 15:16:59 spectre NetworkManager[746]: <info> (docker0): exported as /org/freedesktop/NetworkManager/Devices/2 >Mar 20 15:16:59 spectre NetworkManager[746]: ifcfg-rh: read connection 'docker0' >Mar 20 15:16:59 spectre NetworkManager[746]: <info> (docker0): device state change: unmanaged -> unavailable (reason 'connection-assumed') [10 20 41] >Mar 20 15:16:59 spectre NetworkManager[746]: <info> (docker0): device state change: unavailable -> disconnected (reason 'connection-assumed') [20 30 41] >Mar 20 15:16:59 spectre NetworkManager[746]: <info> Activation (docker0) starting connection 'docker0' >Mar 20 15:16:59 spectre NetworkManager[746]: <info> Activation (docker0) Stage 1 of 5 (Device Prepare) scheduled... >Mar 20 15:16:59 spectre NetworkManager[746]: <info> Activation (docker0) Stage 1 of 5 (Device Prepare) started... >Mar 20 15:16:59 spectre NetworkManager[746]: <info> (docker0): device state change: disconnected -> prepare (reason 'none') [30 40 0] >Mar 20 15:16:59 spectre NetworkManager[746]: <info> Activation (docker0) Stage 2 of 5 (Device Configure) scheduled... >Mar 20 15:16:59 spectre NetworkManager[746]: <info> Activation (docker0) Stage 1 of 5 (Device Prepare) complete. >Mar 20 15:16:59 spectre NetworkManager[746]: <info> Activation (docker0) Stage 2 of 5 (Device Configure) starting... >Mar 20 15:16:59 spectre NetworkManager[746]: <info> (docker0): device state change: prepare -> config (reason 'none') [40 50 0] >Mar 20 15:16:59 spectre NetworkManager[746]: <info> Activation (docker0) Stage 2 of 5 (Device Configure) successful. >Mar 20 15:16:59 spectre NetworkManager[746]: <info> Activation (docker0) Stage 2 of 5 (Device Configure) complete. >Mar 20 15:16:59 spectre docker[19718]: Unable to allow incoming packets: iptables failed: iptables -I FORWARD -o docker0 -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT: Another app is currently holding the xtables lock. Perhaps you want to use the -w option? >Mar 20 15:16:59 spectre docker[19718]: (exit status 4) >Mar 20 15:16:59 spectre docker[19718]: [/var/lib/docker|7e296e71] -job init_networkdriver() = ERR (1) >Mar 20 15:16:59 spectre docker[19718]: (exit status 4) >Mar 20 15:16:59 spectre docker[19718]: [/var/lib/docker|7e296e71] -job initserver() = ERR (1) >Mar 20 15:16:59 spectre docker[19718]: 2014/03/20 15:16:59 (exit status 4) >Mar 20 15:16:59 spectre systemd[1]: docker.service: main process exited, code=exited, status=1/FAILURE >Mar 20 15:16:59 spectre systemd[1]: Unit docker.service entered failed state. >Mar 20 15:16:59 spectre NetworkManager[746]: <info> Activation (docker0) Stage 3 of 5 (IP Configure Start) scheduled. >Mar 20 15:16:59 spectre NetworkManager[746]: <info> Activation (docker0) Stage 3 of 5 (IP Configure Start) started... >Mar 20 15:16:59 spectre NetworkManager[746]: <info> (docker0): device state change: config -> ip-config (reason 'none') [50 70 0] >Mar 20 15:16:59 spectre NetworkManager[746]: <info> (docker0): IPv4 config waiting until carrier is on >Mar 20 15:16:59 spectre NetworkManager[746]: <info> (docker0): IPv6 config waiting until carrier is on >Mar 20 15:16:59 spectre NetworkManager[746]: <info> Activation (docker0) Stage 3 of 5 (IP Configure Start) complete. >Mar 20 15:16:59 spectre systemd[1]: docker.service holdoff time over, scheduling restart. >Mar 20 15:16:59 spectre systemd[1]: Stopping Docker Application Container Engine... >Mar 20 15:16:59 spectre systemd[1]: Starting Docker Application Container Engine... >Mar 20 15:16:59 spectre systemd[1]: Started Docker Application Container Engine. >Mar 20 15:16:59 spectre docker[19794]: [/var/lib/docker|ab867797] +job serveapi(unix:///var/run/docker.sock) >Mar 20 15:16:59 spectre docker[19794]: [/var/lib/docker|ab867797] +job initserver() >Mar 20 15:16:59 spectre docker[19794]: [/var/lib/docker|ab867797.initserver()] Creating server >Mar 20 15:16:59 spectre docker[19794]: 2014/03/20 15:16:59 Listening for HTTP on unix (/var/run/docker.sock) >Mar 20 15:16:59 spectre docker[19794]: [/var/lib/docker|ab867797] +job init_networkdriver() >Mar 20 15:16:59 spectre docker[19794]: [/var/lib/docker|ab867797] -job init_networkdriver() = OK (0) >Mar 20 15:17:00 spectre docker[19794]: Loading containers: : done. >Mar 20 15:17:00 spectre docker[19794]: [/var/lib/docker|ab867797.initserver()] Creating pidfile >Mar 20 15:17:00 spectre docker[19794]: [/var/lib/docker|ab867797.initserver()] Setting up signal traps >Mar 20 15:17:00 spectre docker[19794]: [/var/lib/docker|ab867797] -job initserver() = OK (0) >Mar 20 15:17:00 spectre docker[19794]: [/var/lib/docker|ab867797] +job acceptconnections() >Mar 20 15:17:00 spectre docker[19794]: [/var/lib/docker|ab867797] -job acceptconnections() = OK (0) >Mar 20 15:17:00 spectre avahi-daemon[622]: Registering new address record for fe80::907c:98ff:fe5d:472a on docker0.*. >Mar 20 15:17:18 spectre sudo[19821]: dshea : TTY=pts/4 ; PWD=/srv ; USER=root ; COMMAND=/home/dshea/cont_build.sh dwalsh-test koji >Mar 20 15:17:18 spectre docker[19794]: 2014/03/20 15:17:18 POST /v1.10/images/create?fromSrc=-&repo=&tag= >Mar 20 15:17:18 spectre docker[19794]: [/var/lib/docker|ab867797] +job import(-, , ) >Mar 20 15:17:18 spectre kernel: ODEBUG: object is on stack, but not annotated >Mar 20 15:17:18 spectre kernel: ------------[ cut here ]------------ >Mar 20 15:17:18 spectre kernel: WARNING: CPU: 3 PID: 19794 at lib/debugobjects.c:300 __debug_object_init+0x221/0x480() >Mar 20 15:17:18 spectre kernel: Modules linked in: xt_addrtype ipt_MASQUERADE dm_thin_pool dm_persistent_data dm_bio_prison libcrc32c loop ip6t_rpfilter cfg80211 rfkill ip6t_REJECT xt_conntrack ebtable_nat ebtable_broute bridge stp llc ebtable_filter ebtables ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle ip6table_security ip6table_raw ip6table_filter ip6_tables iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack iptable_mangle iptable_security iptable_raw joydev ppdev parport_pc virtio_console virtio_balloon microcode parport pvpanic serio_raw i2c_piix4 nfsd auth_rpcgss nfs_acl lockd sunrpc dm_multipath virtio_blk virtio_net qxl drm_kms_helper ttm drm i2c_core virtio_pci virtio_ring virtio ata_generic pata_acpi >Mar 20 15:17:18 spectre kernel: CPU: 3 PID: 19794 Comm: docker Not tainted 3.14.0-0.rc6.git4.1.fc21.x86_64 #1 >Mar 20 15:17:18 spectre kernel: Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 >Mar 20 15:17:18 spectre kernel: 0000000000000000 000000007b6afcc0 ffff8800d5a55aa0 ffffffff817d19a8 >Mar 20 15:17:18 spectre kernel: 0000000000000000 ffff8800d5a55ad8 ffffffff8109671d ffffffff82c66598 >Mar 20 15:17:18 spectre kernel: ffffffff82c66590 0000000000000292 0000000000046f50 ffff8800d5a55ba0 >Mar 20 15:17:18 spectre kernel: Call Trace: >Mar 20 15:17:18 spectre kernel: [<ffffffff817d19a8>] dump_stack+0x4d/0x66 >Mar 20 15:17:18 spectre kernel: [<ffffffff8109671d>] warn_slowpath_common+0x7d/0xa0 >Mar 20 15:17:18 spectre kernel: [<ffffffff8109684a>] warn_slowpath_null+0x1a/0x20 >Mar 20 15:17:18 spectre kernel: [<ffffffff813e2031>] __debug_object_init+0x221/0x480 >Mar 20 15:17:18 spectre kernel: [<ffffffffa03d3bd0>] ? thin_status+0x2a0/0x2a0 [dm_thin_pool] >Mar 20 15:17:18 spectre kernel: [<ffffffff813e22ab>] debug_object_init+0x1b/0x20 >Mar 20 15:17:18 spectre kernel: [<ffffffff810b6829>] __init_work+0x19/0x30 >Mar 20 15:17:18 spectre kernel: [<ffffffffa03d3ca6>] noflush_work+0x36/0x150 [dm_thin_pool] >Mar 20 15:17:18 spectre kernel: [<ffffffff810f8c1d>] ? trace_hardirqs_on+0xd/0x10 >Mar 20 15:17:18 spectre kernel: [<ffffffff817dac0c>] ? _raw_spin_unlock_irq+0x2c/0x40 >Mar 20 15:17:18 spectre kernel: [<ffffffff81115069>] ? srcu_reschedule+0xd9/0xe0 >Mar 20 15:17:18 spectre kernel: [<ffffffff81115174>] ? __synchronize_srcu+0x104/0x1f0 >Mar 20 15:17:18 spectre kernel: [<ffffffff81114c30>] ? call_srcu+0x80/0x80 >Mar 20 15:17:18 spectre kernel: [<ffffffffa03d3dd9>] thin_postsuspend+0x19/0x20 [dm_thin_pool] >Mar 20 15:17:18 spectre kernel: [<ffffffff81610e5a>] dm_table_postsuspend_targets+0x4a/0x60 >Mar 20 15:17:18 spectre kernel: [<ffffffff8160e637>] dm_suspend+0xe7/0x1f0 >Mar 20 15:17:18 spectre kernel: [<ffffffff81613af4>] dev_suspend+0x194/0x250 >Mar 20 15:17:18 spectre kernel: [<ffffffff81613960>] ? table_load+0x380/0x380 >Mar 20 15:17:18 spectre kernel: [<ffffffff816143d8>] ctl_ioctl+0x278/0x520 >Mar 20 15:17:18 spectre kernel: [<ffffffff81614693>] dm_ctl_ioctl+0x13/0x20 >Mar 20 15:17:18 spectre kernel: [<ffffffff81248f00>] do_vfs_ioctl+0x300/0x520 >Mar 20 15:17:18 spectre kernel: [<ffffffff81254fc5>] ? __fget+0x5/0x300 >Mar 20 15:17:18 spectre kernel: [<ffffffff812491a1>] SyS_ioctl+0x81/0xa0 >Mar 20 15:17:18 spectre kernel: [<ffffffff8115482c>] ? __audit_syscall_entry+0x9c/0xf0 >Mar 20 15:17:18 spectre kernel: [<ffffffff817e5829>] system_call_fastpath+0x16/0x1b >Mar 20 15:17:18 spectre kernel: ---[ end trace f4cb43aae2366f69 ]--- >Mar 20 15:17:18 spectre kernel: EXT4-fs (dm-4): mounted filesystem with ordered data mode. Opts: discard >Mar 20 15:17:18 spectre kernel: SELinux: initialized (dev dm-4, type ext4), uses xattr >Mar 20 15:17:19 spectre kernel: ODEBUG: object is on stack, but not annotated >Mar 20 15:17:19 spectre kernel: ------------[ cut here ]------------ >Mar 20 15:17:19 spectre kernel: WARNING: CPU: 0 PID: 19794 at lib/debugobjects.c:300 __debug_object_init+0x221/0x480() >Mar 20 15:17:19 spectre kernel: Modules linked in: xt_addrtype ipt_MASQUERADE dm_thin_pool dm_persistent_data dm_bio_prison libcrc32c loop ip6t_rpfilter cfg80211 rfkill ip6t_REJECT xt_conntrack ebtable_nat ebtable_broute bridge stp llc ebtable_filter ebtables ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle ip6table_security ip6table_raw ip6table_filter ip6_tables iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack iptable_mangle iptable_security iptable_raw joydev ppdev parport_pc virtio_console virtio_balloon microcode parport pvpanic serio_raw i2c_piix4 nfsd auth_rpcgss nfs_acl lockd sunrpc dm_multipath virtio_blk virtio_net qxl drm_kms_helper ttm drm i2c_core virtio_pci virtio_ring virtio ata_generic pata_acpi >Mar 20 15:17:19 spectre kernel: CPU: 0 PID: 19794 Comm: docker Tainted: G W 3.14.0-0.rc6.git4.1.fc21.x86_64 #1 >Mar 20 15:17:19 spectre kernel: Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 >Mar 20 15:17:19 spectre kernel: 0000000000000000 000000007b6afcc0 ffff8800d5a55a98 ffffffff817d19a8 >Mar 20 15:17:19 spectre kernel: 0000000000000000 ffff8800d5a55ad0 ffffffff8109671d ffffffff82c66598 >Mar 20 15:17:19 spectre kernel: ffffffff82c66590 0000000000000286 0000000000046f50 ffff8800d5a55b98 >Mar 20 15:17:19 spectre kernel: Call Trace: >Mar 20 15:17:19 spectre kernel: [<ffffffff817d19a8>] dump_stack+0x4d/0x66 >Mar 20 15:17:19 spectre kernel: [<ffffffff8109671d>] warn_slowpath_common+0x7d/0xa0 >Mar 20 15:17:19 spectre kernel: [<ffffffff8109684a>] warn_slowpath_null+0x1a/0x20 >Mar 20 15:17:19 spectre kernel: [<ffffffff813e2031>] __debug_object_init+0x221/0x480 >Mar 20 15:17:19 spectre kernel: [<ffffffffa03d3bd0>] ? thin_status+0x2a0/0x2a0 [dm_thin_pool] >Mar 20 15:17:19 spectre kernel: [<ffffffff813e22ab>] debug_object_init+0x1b/0x20 >Mar 20 15:17:19 spectre kernel: [<ffffffff810b6829>] __init_work+0x19/0x30 >Mar 20 15:17:19 spectre kernel: [<ffffffffa03d3ca6>] noflush_work+0x36/0x150 [dm_thin_pool] >Mar 20 15:17:19 spectre kernel: [<ffffffff8160d184>] ? __dm_destroy+0x94/0x2b0 >Mar 20 15:17:19 spectre kernel: [<ffffffff810dd5e8>] ? sched_clock_cpu+0xa8/0xd0 >Mar 20 15:17:19 spectre kernel: [<ffffffff810fb6f1>] ? lock_release_non_nested+0x1d1/0x350 >Mar 20 15:17:19 spectre kernel: [<ffffffff8160cac5>] ? dm_get_live_table+0x5/0xc0 >Mar 20 15:17:19 spectre kernel: [<ffffffff8160d184>] ? __dm_destroy+0x94/0x2b0 >Mar 20 15:17:19 spectre kernel: [<ffffffffa03d3dd9>] thin_postsuspend+0x19/0x20 [dm_thin_pool] >Mar 20 15:17:19 spectre kernel: [<ffffffff81610e5a>] dm_table_postsuspend_targets+0x4a/0x60 >Mar 20 15:17:19 spectre kernel: [<ffffffff8160d380>] __dm_destroy+0x290/0x2b0 >Mar 20 15:17:19 spectre kernel: [<ffffffff8160e173>] dm_destroy+0x13/0x20 >Mar 20 15:17:19 spectre kernel: [<ffffffff81613cce>] dev_remove+0x11e/0x180 >Mar 20 15:17:19 spectre kernel: [<ffffffff81613bb0>] ? dev_suspend+0x250/0x250 >Mar 20 15:17:19 spectre kernel: [<ffffffff816143d8>] ctl_ioctl+0x278/0x520 >Mar 20 15:17:19 spectre kernel: [<ffffffff81614693>] dm_ctl_ioctl+0x13/0x20 >Mar 20 15:17:19 spectre kernel: [<ffffffff81248f00>] do_vfs_ioctl+0x300/0x520 >Mar 20 15:17:19 spectre kernel: [<ffffffff81254fc5>] ? __fget+0x5/0x300 >Mar 20 15:17:19 spectre kernel: [<ffffffff812491a1>] SyS_ioctl+0x81/0xa0 >Mar 20 15:17:19 spectre kernel: [<ffffffff8115482c>] ? __audit_syscall_entry+0x9c/0xf0 >Mar 20 15:17:19 spectre kernel: [<ffffffff817e5829>] system_call_fastpath+0x16/0x1b >Mar 20 15:17:19 spectre kernel: ---[ end trace f4cb43aae2366f6a ]--- >Mar 20 15:17:19 spectre multipathd[479]: dm-4: remove map (uevent) >Mar 20 15:17:19 spectre multipathd[479]: dm-4: devmap not registered, can't remove >Mar 20 15:17:19 spectre multipathd[479]: dm-4: remove map (uevent) >Mar 20 15:17:22 spectre multipathd[479]: dm-4: mapname not found for 253:4 >Mar 20 15:17:22 spectre multipathd[479]: uevent trigger error >Mar 20 15:17:22 spectre multipathd[479]: dm-4: remove map (uevent) >Mar 20 15:17:23 spectre multipathd[479]: dm-4: remove map (uevent) >Mar 20 15:17:23 spectre docker[19794]: Tarball too short >Mar 20 15:17:23 spectre docker[19794]: [/var/lib/docker|ab867797] -job import(-, , ) = ERR (1) >Mar 20 15:17:23 spectre docker[19794]: [error] server.go:951 Error: Tarball too short >Mar 20 15:17:23 spectre docker[19794]: [error] server.go:86 HTTP Error: statusCode=500 Tarball too short >Mar 20 15:18:07 spectre sudo[19856]: dshea : TTY=pts/4 ; PWD=/srv ; USER=root ; COMMAND=/bin/rm -rf dwalsh-test/ >Mar 20 15:18:15 spectre sudo[19858]: dshea : TTY=pts/4 ; PWD=/srv ; USER=root ; COMMAND=/home/dshea/cont_build.sh dwalsh-test koji >Mar 20 15:18:32 spectre yum[19860]: Installed: libgcc-4.8.2-1.fc20.x86_64 >Mar 20 15:18:32 spectre yum[19860]: Installed: setup-2.8.71-2.fc20.noarch >Mar 20 15:18:32 spectre yum[19860]: Installed: filesystem-3.2-19.fc20.x86_64 >Mar 20 15:18:33 spectre yum[19860]: Installed: basesystem-10.0-9.fc20.noarch >Mar 20 15:18:34 spectre yum[19860]: Installed: tzdata-2013h-1.fc20.noarch >Mar 20 15:18:34 spectre yum[19860]: Installed: ncurses-base-5.9-12.20130511.fc20.noarch >Mar 20 15:18:34 spectre yum[19860]: Installed: nss-softokn-freebl-3.15.2-2.fc20.x86_64 >Mar 20 15:18:37 spectre yum[19860]: Installed: glibc-common-2.18-11.fc20.x86_64 >Mar 20 15:18:40 spectre yum[19860]: Installed: glibc-2.18-11.fc20.x86_64 >Mar 20 15:18:47 spectre yum[19860]: Installed: libstdc++-4.8.2-1.fc20.x86_64 >Mar 20 15:18:47 spectre yum[19860]: Installed: ncurses-libs-5.9-12.20130511.fc20.x86_64 >Mar 20 15:18:48 spectre yum[19860]: Installed: bash-4.2.45-4.fc20.x86_64 >Mar 20 15:18:48 spectre yum[19860]: Installed: libsepol-2.1.9-2.fc20.x86_64 >Mar 20 15:18:48 spectre yum[19860]: Installed: pcre-8.33-2.fc20.1.x86_64 >Mar 20 15:18:48 spectre yum[19860]: Installed: libselinux-2.1.13-19.fc20.x86_64 >Mar 20 15:18:49 spectre yum[19860]: Installed: zlib-1.2.8-3.fc20.x86_64 >Mar 20 15:18:49 spectre yum[19860]: Installed: info-5.1-4.fc20.x86_64 >Mar 20 15:18:49 spectre yum[19860]: Installed: nspr-4.10.1-1.fc20.x86_64 >Mar 20 15:18:49 spectre yum[19860]: Installed: nss-util-3.15.2-2.fc20.x86_64 >Mar 20 15:18:50 spectre yum[19860]: Installed: libdb-5.3.28-1.fc20.x86_64 >Mar 20 15:18:50 spectre yum[19860]: Installed: bzip2-libs-1.0.6-9.fc20.x86_64 >Mar 20 15:18:50 spectre yum[19860]: Installed: popt-1.13-15.fc20.x86_64 >Mar 20 15:18:50 spectre yum[19860]: Installed: xz-libs-5.1.2-6alpha.fc20.x86_64 >Mar 20 15:18:51 spectre yum[19860]: Installed: readline-6.2-8.fc20.x86_64 >Mar 20 15:18:51 spectre yum[19860]: Installed: libcom_err-1.42.8-3.fc20.x86_64 >Mar 20 15:18:51 spectre yum[19860]: Installed: audit-libs-2.3.2-1.fc20.x86_64 >Mar 20 15:18:51 spectre yum[19860]: Installed: libattr-2.4.47-3.fc20.x86_64 >Mar 20 15:18:52 spectre yum[19860]: Installed: libacl-2.2.52-4.fc20.x86_64 >Mar 20 15:18:52 spectre yum[19860]: Installed: libcap-2.22-7.fc20.x86_64 >Mar 20 15:18:52 spectre yum[19860]: Installed: libffi-3.0.13-5.fc20.x86_64 >Mar 20 15:18:52 spectre yum[19860]: Installed: libgpg-error-1.12-1.fc20.x86_64 >Mar 20 15:18:53 spectre yum[19860]: Installed: lua-5.2.2-5.fc20.x86_64 >Mar 20 15:18:53 spectre yum[19860]: Installed: chkconfig-1.3.60-4.fc20.x86_64 >Mar 20 15:18:53 spectre yum[19860]: Installed: libuuid-2.24-2.fc20.x86_64 >Mar 20 15:18:53 spectre yum[19860]: Installed: elfutils-libelf-0.157-1.fc20.x86_64 >Mar 20 15:18:54 spectre yum[19860]: Installed: libgcrypt-1.5.3-2.fc20.x86_64 >Mar 20 15:18:54 spectre yum[19860]: Installed: p11-kit-0.20.1-1.fc20.x86_64 >Mar 20 15:18:54 spectre yum[19860]: Installed: sed-4.2.2-5.fc20.x86_64 >Mar 20 15:18:55 spectre yum[19860]: Installed: sqlite-3.8.1-2.fc20.x86_64 >Mar 20 15:18:55 spectre yum[19860]: Installed: nss-softokn-3.15.2-2.fc20.x86_64 >Mar 20 15:18:55 spectre yum[19860]: Installed: libidn-1.28-2.fc20.x86_64 >Mar 20 15:18:56 spectre yum[19860]: Installed: grep-2.15-1.fc20.x86_64 >Mar 20 15:18:56 spectre yum[19860]: Installed: keyutils-libs-1.5.8-1.fc20.x86_64 >Mar 20 15:18:56 spectre yum[19860]: Installed: expat-2.1.0-7.fc20.x86_64 >Mar 20 15:18:56 spectre yum[19860]: Installed: libmetalink-0.1.2-4.fc20.x86_64 >Mar 20 15:18:57 spectre yum[19860]: Installed: pinentry-0.8.1-11.fc20.x86_64 >Mar 20 15:18:57 spectre yum[19860]: Installed: libassuan-2.1.0-2.fc20.x86_64 >Mar 20 15:18:57 spectre yum[19860]: Installed: libxml2-2.9.1-2.fc20.x86_64 >Mar 20 15:18:57 spectre yum[19860]: Installed: 1:pkgconfig-0.28-3.fc20.x86_64 >Mar 20 15:18:58 spectre yum[19860]: Installed: glib2-2.38.2-2.fc20.x86_64 >Mar 20 15:19:34 spectre yum[19860]: Installed: shared-mime-info-1.2-1.fc20.x86_64 >Mar 20 15:19:34 spectre yum[19860]: Installed: libdb-utils-5.3.28-1.fc20.x86_64 >Mar 20 15:19:35 spectre yum[19860]: Installed: cyrus-sasl-lib-2.1.26-14.fc20.x86_64 >Mar 20 15:19:35 spectre yum[19860]: Installed: gawk-4.1.0-2.fc20.x86_64 >Mar 20 15:19:35 spectre yum[19860]: Installed: file-libs-5.14-12.fc20.x86_64 >Mar 20 15:19:36 spectre yum[19860]: Installed: ncurses-5.9-12.20130511.fc20.x86_64 >Mar 20 15:19:36 spectre yum[19860]: Installed: 1:gmp-5.1.2-2.fc20.x86_64 >Mar 20 15:19:36 spectre yum[19860]: Installed: libverto-0.2.5-3.fc20.x86_64 >Mar 20 15:19:36 spectre yum[19860]: Installed: gdbm-1.10-7.fc20.x86_64 >Mar 20 15:19:36 spectre yum[19860]: Installed: libcap-ng-0.7.3-6.fc20.x86_64 >Mar 20 15:19:37 spectre yum[19860]: Installed: ustr-1.0.4-15.fc20.x86_64 >Mar 20 15:19:37 spectre yum[19860]: Installed: libsemanage-2.1.10-14.fc20.x86_64 >Mar 20 15:19:37 spectre yum[19860]: Installed: 1:dbus-libs-1.6.12-1.fc20.x86_64 >Mar 20 15:19:38 spectre yum[19860]: Installed: nss-tools-3.15.2-3.fc20.x86_64 >Mar 20 15:19:38 spectre yum[19860]: Installed: gzip-1.6-2.fc20.x86_64 >Mar 20 15:19:38 spectre yum[19860]: Installed: cracklib-2.9.0-5.fc20.x86_64 >Mar 20 15:19:39 spectre yum[19860]: Installed: cracklib-dicts-2.9.0-5.fc20.x86_64 >Mar 20 15:19:39 spectre yum[19860]: Installed: openldap-2.4.36-4.fc20.x86_64 >Mar 20 15:19:39 spectre yum[19860]: Installed: nss-3.15.2-3.fc20.x86_64 >Mar 20 15:19:40 spectre yum[19860]: Installed: libuser-0.60-3.fc20.x86_64 >Mar 20 15:19:40 spectre yum[19860]: Installed: systemd-libs-208-9.fc20.x86_64 >Mar 20 15:19:40 spectre yum[19860]: Installed: libpwquality-1.2.3-1.fc20.x86_64 >Mar 20 15:19:40 spectre yum[19860]: Installed: libmount-2.24-2.fc20.x86_64 >Mar 20 15:19:41 spectre yum[19860]: Installed: coreutils-8.21-18.fc20.x86_64 >Mar 20 15:19:41 spectre yum[19860]: Installed: pam-1.1.8-1.fc20.x86_64 >Mar 20 15:19:42 spectre yum[19860]: Installed: libblkid-2.24-2.fc20.x86_64 >Mar 20 15:19:42 spectre yum[19860]: Installed: nss-sysinit-3.15.2-3.fc20.x86_64 >Mar 20 15:19:42 spectre yum[19860]: Installed: 2:shadow-utils-4.1.5.1-8.fc20.x86_64 >Mar 20 15:19:43 spectre yum[19860]: Installed: libutempter-1.1.6-3.fc20.x86_64 >Mar 20 15:19:43 spectre yum[19860]: Installed: util-linux-2.24-2.fc20.x86_64 >Mar 20 15:19:44 spectre yum[19860]: Installed: krb5-libs-1.11.3-33.fc20.x86_64 >Mar 20 15:19:44 spectre yum[19860]: Installed: pth-2.0.7-21.fc20.x86_64 >Mar 20 15:19:44 spectre yum[19860]: Installed: libtasn1-3.3-2.fc20.x86_64 >Mar 20 15:19:45 spectre yum[19860]: Installed: p11-kit-trust-0.20.1-1.fc20.x86_64 >Mar 20 15:19:46 spectre yum[19860]: Installed: ca-certificates-2013.1.94-18.fc20.noarch >Mar 20 15:19:46 spectre yum[19860]: Installed: 1:openssl-libs-1.0.1e-30.fc20.x86_64 >Mar 20 15:19:48 spectre yum[19860]: Installed: python-libs-2.7.5-9.fc20.x86_64 >Mar 20 15:19:48 spectre yum[19860]: Installed: python-2.7.5-9.fc20.x86_64 >Mar 20 15:19:49 spectre yum[19860]: Installed: libssh2-1.4.3-8.fc20.x86_64 >Mar 20 15:19:49 spectre yum[19860]: Installed: libcurl-7.32.0-3.fc20.x86_64 >Mar 20 15:19:49 spectre yum[19860]: Installed: python-pycurl-7.19.0-17.20120408git9b8f4e38.fc20.x86_64 >Mar 20 15:19:49 spectre yum[19860]: Installed: python-urlgrabber-3.9.1-32.fc20.noarch >Mar 20 15:19:50 spectre yum[19860]: Installed: gnupg2-2.0.22-1.fc20.x86_64 >Mar 20 15:19:50 spectre yum[19860]: Installed: curl-7.32.0-3.fc20.x86_64 >Mar 20 15:19:51 spectre yum[19860]: Installed: rpm-libs-4.11.1-7.fc20.x86_64 >Mar 20 15:19:51 spectre yum[19860]: Installed: rpm-4.11.1-7.fc20.x86_64 >Mar 20 15:19:51 spectre yum[19860]: Installed: rpm-build-libs-4.11.1-7.fc20.x86_64 >Mar 20 15:19:51 spectre yum[19860]: Installed: rpm-python-4.11.1-7.fc20.x86_64 >Mar 20 15:19:52 spectre yum[19860]: Installed: pyOpenSSL-0.13.1-1.fc20.x86_64 >Mar 20 15:19:52 spectre yum[19860]: Installed: python-krbV-1.0.90-7.fc20.x86_64 >Mar 20 15:19:52 spectre yum[19860]: Installed: koji-1.8.0-2.fc20.noarch >Mar 20 15:20:18 spectre kernel: ODEBUG: object is on stack, but not annotated >Mar 20 15:20:18 spectre kernel: ------------[ cut here ]------------ >Mar 20 15:20:18 spectre kernel: WARNING: CPU: 3 PID: 19800 at lib/debugobjects.c:300 __debug_object_init+0x221/0x480() >Mar 20 15:20:18 spectre kernel: Modules linked in: xt_addrtype ipt_MASQUERADE dm_thin_pool dm_persistent_data dm_bio_prison libcrc32c loop ip6t_rpfilter cfg80211 rfkill ip6t_REJECT xt_conntrack ebtable_nat ebtable_broute bridge stp llc ebtable_filter ebtables ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle ip6table_security ip6table_raw ip6table_filter ip6_tables iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack iptable_mangle iptable_security iptable_raw joydev ppdev parport_pc virtio_console virtio_balloon microcode parport pvpanic serio_raw i2c_piix4 nfsd auth_rpcgss nfs_acl lockd sunrpc dm_multipath virtio_blk virtio_net qxl drm_kms_helper ttm drm i2c_core virtio_pci virtio_ring virtio ata_generic pata_acpi >Mar 20 15:20:18 spectre kernel: CPU: 3 PID: 19800 Comm: docker Tainted: G W 3.14.0-0.rc6.git4.1.fc21.x86_64 #1 >Mar 20 15:20:18 spectre kernel: Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 >Mar 20 15:20:18 spectre kernel: 0000000000000000 00000000d3050513 ffff880004e13aa0 ffffffff817d19a8 >Mar 20 15:20:18 spectre kernel: 0000000000000000 ffff880004e13ad8 ffffffff8109671d ffffffff82d214d8 >Mar 20 15:20:18 spectre kernel: ffffffff82d214d0 0000000000000292 0000000000101e90 ffff880004e13ba0 >Mar 20 15:20:18 spectre kernel: Call Trace: >Mar 20 15:20:18 spectre kernel: [<ffffffff817d19a8>] dump_stack+0x4d/0x66 >Mar 20 15:20:18 spectre kernel: [<ffffffff8109671d>] warn_slowpath_common+0x7d/0xa0 >Mar 20 15:20:18 spectre kernel: [<ffffffff8109684a>] warn_slowpath_null+0x1a/0x20 >Mar 20 15:20:18 spectre kernel: [<ffffffff813e2031>] __debug_object_init+0x221/0x480 >Mar 20 15:20:18 spectre kernel: [<ffffffffa03d3bd0>] ? thin_status+0x2a0/0x2a0 [dm_thin_pool] >Mar 20 15:20:18 spectre kernel: [<ffffffff813e22ab>] debug_object_init+0x1b/0x20 >Mar 20 15:20:18 spectre kernel: [<ffffffff810b6829>] __init_work+0x19/0x30 >Mar 20 15:20:18 spectre kernel: [<ffffffffa03d3ca6>] noflush_work+0x36/0x150 [dm_thin_pool] >Mar 20 15:20:18 spectre kernel: [<ffffffff810f8c1d>] ? trace_hardirqs_on+0xd/0x10 >Mar 20 15:20:18 spectre kernel: [<ffffffff817dac0c>] ? _raw_spin_unlock_irq+0x2c/0x40 >Mar 20 15:20:18 spectre kernel: [<ffffffff81115069>] ? srcu_reschedule+0xd9/0xe0 >Mar 20 15:20:18 spectre kernel: [<ffffffff81115174>] ? __synchronize_srcu+0x104/0x1f0 >Mar 20 15:20:18 spectre kernel: [<ffffffff81114c30>] ? call_srcu+0x80/0x80 >Mar 20 15:20:18 spectre kernel: [<ffffffffa03d3dd9>] thin_postsuspend+0x19/0x20 [dm_thin_pool] >Mar 20 15:20:18 spectre kernel: [<ffffffff81610e5a>] dm_table_postsuspend_targets+0x4a/0x60 >Mar 20 15:20:18 spectre kernel: [<ffffffff8160e637>] dm_suspend+0xe7/0x1f0 >Mar 20 15:20:18 spectre kernel: [<ffffffff81613af4>] dev_suspend+0x194/0x250 >Mar 20 15:20:18 spectre kernel: [<ffffffff81613960>] ? table_load+0x380/0x380 >Mar 20 15:20:18 spectre kernel: [<ffffffff816143d8>] ctl_ioctl+0x278/0x520 >Mar 20 15:20:18 spectre kernel: [<ffffffff81614693>] dm_ctl_ioctl+0x13/0x20 >Mar 20 15:20:18 spectre kernel: [<ffffffff81248f00>] do_vfs_ioctl+0x300/0x520 >Mar 20 15:20:18 spectre kernel: [<ffffffff81254fc5>] ? __fget+0x5/0x300 >Mar 20 15:20:18 spectre kernel: [<ffffffff812491a1>] SyS_ioctl+0x81/0xa0 >Mar 20 15:20:18 spectre kernel: [<ffffffff8115482c>] ? __audit_syscall_entry+0x9c/0xf0 >Mar 20 15:20:18 spectre kernel: [<ffffffff817e5829>] system_call_fastpath+0x16/0x1b >Mar 20 15:20:18 spectre kernel: ---[ end trace f4cb43aae2366f6b ]--- >Mar 20 15:20:18 spectre docker[19794]: 2014/03/20 15:20:18 POST /v1.10/images/create?fromSrc=-&repo=dwalsh-test&tag= >Mar 20 15:20:18 spectre docker[19794]: [/var/lib/docker|ab867797] +job import(-, dwalsh-test, ) >Mar 20 15:20:18 spectre kernel: EXT4-fs (dm-4): mounted filesystem with ordered data mode. Opts: discard >Mar 20 15:20:18 spectre kernel: SELinux: initialized (dev dm-4, type ext4), uses xattr >Mar 20 15:20:26 spectre kernel: ODEBUG: object is on stack, but not annotated >Mar 20 15:20:26 spectre kernel: ------------[ cut here ]------------ >Mar 20 15:20:26 spectre kernel: WARNING: CPU: 3 PID: 19800 at lib/debugobjects.c:300 __debug_object_init+0x221/0x480() >Mar 20 15:20:26 spectre kernel: Modules linked in: xt_addrtype ipt_MASQUERADE dm_thin_pool dm_persistent_data dm_bio_prison libcrc32c loop ip6t_rpfilter cfg80211 rfkill ip6t_REJECT xt_conntrack ebtable_nat ebtable_broute bridge stp llc ebtable_filter ebtables ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle ip6table_security ip6table_raw ip6table_filter ip6_tables iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack iptable_mangle iptable_security iptable_raw joydev ppdev parport_pc virtio_console virtio_balloon microcode parport pvpanic serio_raw i2c_piix4 nfsd auth_rpcgss nfs_acl lockd sunrpc dm_multipath virtio_blk virtio_net qxl drm_kms_helper ttm drm i2c_core virtio_pci virtio_ring virtio ata_generic pata_acpi >Mar 20 15:20:26 spectre kernel: CPU: 3 PID: 19800 Comm: docker Tainted: G W 3.14.0-0.rc6.git4.1.fc21.x86_64 #1 >Mar 20 15:20:26 spectre kernel: Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 >Mar 20 15:20:26 spectre kernel: 0000000000000000 00000000d3050513 ffff880004e13a98 ffffffff817d19a8 >Mar 20 15:20:26 spectre kernel: 0000000000000000 ffff880004e13ad0 ffffffff8109671d ffffffff82d214d8 >Mar 20 15:20:26 spectre kernel: ffffffff82d214d0 0000000000000286 0000000000101e90 ffff880004e13b98 >Mar 20 15:20:26 spectre kernel: Call Trace: >Mar 20 15:20:26 spectre kernel: [<ffffffff817d19a8>] dump_stack+0x4d/0x66 >Mar 20 15:20:26 spectre kernel: [<ffffffff8109671d>] warn_slowpath_common+0x7d/0xa0 >Mar 20 15:20:26 spectre kernel: [<ffffffff8109684a>] warn_slowpath_null+0x1a/0x20 >Mar 20 15:20:26 spectre kernel: [<ffffffff813e2031>] __debug_object_init+0x221/0x480 >Mar 20 15:20:26 spectre kernel: [<ffffffffa03d3bd0>] ? thin_status+0x2a0/0x2a0 [dm_thin_pool] >Mar 20 15:20:26 spectre kernel: [<ffffffff813e22ab>] debug_object_init+0x1b/0x20 >Mar 20 15:20:26 spectre kernel: [<ffffffff810b6829>] __init_work+0x19/0x30 >Mar 20 15:20:26 spectre kernel: [<ffffffffa03d3ca6>] noflush_work+0x36/0x150 [dm_thin_pool] >Mar 20 15:20:26 spectre kernel: [<ffffffff8160d184>] ? __dm_destroy+0x94/0x2b0 >Mar 20 15:20:26 spectre kernel: [<ffffffff810dd5e8>] ? sched_clock_cpu+0xa8/0xd0 >Mar 20 15:20:26 spectre kernel: [<ffffffff810fb6f1>] ? lock_release_non_nested+0x1d1/0x350 >Mar 20 15:20:26 spectre kernel: [<ffffffff8160cac5>] ? dm_get_live_table+0x5/0xc0 >Mar 20 15:20:26 spectre kernel: [<ffffffff8160d184>] ? __dm_destroy+0x94/0x2b0 >Mar 20 15:20:26 spectre kernel: [<ffffffffa03d3dd9>] thin_postsuspend+0x19/0x20 [dm_thin_pool] >Mar 20 15:20:26 spectre kernel: [<ffffffff81610e5a>] dm_table_postsuspend_targets+0x4a/0x60 >Mar 20 15:20:26 spectre kernel: [<ffffffff8160d380>] __dm_destroy+0x290/0x2b0 >Mar 20 15:20:26 spectre kernel: [<ffffffff8160e173>] dm_destroy+0x13/0x20 >Mar 20 15:20:26 spectre kernel: [<ffffffff81613cce>] dev_remove+0x11e/0x180 >Mar 20 15:20:26 spectre kernel: [<ffffffff81613bb0>] ? dev_suspend+0x250/0x250 >Mar 20 15:20:26 spectre kernel: [<ffffffff816143d8>] ctl_ioctl+0x278/0x520 >Mar 20 15:20:26 spectre kernel: [<ffffffff81614693>] dm_ctl_ioctl+0x13/0x20 >Mar 20 15:20:26 spectre kernel: [<ffffffff81248f00>] do_vfs_ioctl+0x300/0x520 >Mar 20 15:20:26 spectre kernel: [<ffffffff81254fc5>] ? __fget+0x5/0x300 >Mar 20 15:20:26 spectre kernel: [<ffffffff812491a1>] SyS_ioctl+0x81/0xa0 >Mar 20 15:20:26 spectre kernel: [<ffffffff8115482c>] ? __audit_syscall_entry+0x9c/0xf0 >Mar 20 15:20:26 spectre kernel: [<ffffffff817e5829>] system_call_fastpath+0x16/0x1b >Mar 20 15:20:26 spectre kernel: ---[ end trace f4cb43aae2366f6c ]--- >Mar 20 15:20:26 spectre docker[19794]: [/var/lib/docker|ab867797] -job import(-, dwalsh-test, ) = OK (0) >Mar 20 15:20:26 spectre multipathd[479]: dm-4: remove map (uevent) >Mar 20 15:20:26 spectre multipathd[479]: dm-4: devmap not registered, can't remove >Mar 20 15:20:26 spectre multipathd[479]: dm-4: remove map (uevent) >Mar 20 15:20:49 spectre sudo[20036]: dshea : TTY=pts/4 ; PWD=/srv ; USER=root ; COMMAND=/bin/mkdir dshea-test >Mar 20 15:21:50 spectre sudo[20040]: dshea : TTY=pts/4 ; PWD=/home/dshea ; USER=root ; COMMAND=/sbin/anaconda --dirinstall=/srv/dshea-test --ks=docker-test.ks >Mar 20 15:22:46 spectre sudo[20044]: dshea : TTY=pts/4 ; PWD=/home/dshea ; USER=root ; COMMAND=/bin/env ANACONDA_ROOT_PATH=/srv/dshea-test anaconda --dirinstall --ks=docker-test.ks >Mar 20 15:23:48 spectre sudo[20048]: dshea : TTY=pts/4 ; PWD=/home/dshea ; USER=root ; COMMAND=/bin/env ANACONDA_ROOT_PATH=/srv/dshea-test anaconda --dirinstall --kickstart=docker-test.ks >Mar 20 15:23:49 spectre anaconda[20049]: /sbin/anaconda 21.28-1 >Mar 20 15:23:49 spectre anaconda[20049]: 4063232 kB (3968 MB) are available >Mar 20 15:23:49 spectre anaconda[20049]: check_memory(): total:3968, needed:512, graphical:512 >Mar 20 15:23:49 spectre anaconda[20049]: Not doing 'start audit daemon' in directory installation >Mar 20 15:23:49 spectre anaconda[20049]: anaconda called with cmdline = ['/sbin/anaconda', '--dirinstall', '--kickstart=docker-test.ks'] >Mar 20 15:23:49 spectre anaconda[20049]: Default encoding = ascii >Mar 20 15:23:49 spectre program[20049]: Running... udevadm trigger --action=change --subsystem-match=block >Mar 20 15:23:49 spectre program[20049]: Return code: 0 >Mar 20 15:23:49 spectre program[20049]: Running... udevadm settle --timeout=300 >Mar 20 15:23:49 spectre program[20049]: Return code: 0 >Mar 20 15:23:49 spectre program[20049]: Running... modprobe fcoe >Mar 20 15:23:49 spectre program[20049]: Return code: 0 >Mar 20 15:23:49 spectre program[20049]: Running... /usr/libexec/fcoe/fcoe_edd.sh -i >Mar 20 15:23:49 spectre program[20049]: No FCoE boot disk information is found in EDD! >Mar 20 15:23:49 spectre program[20049]: Return code: 1 >Mar 20 15:23:49 spectre blivet[20049]: No FCoE EDD info found: No FCoE boot disk information is found in EDD! >Mar 20 15:23:49 spectre blivet[20049]: no /etc/zfcp.conf; not configuring zfcp >Mar 20 15:23:49 spectre anaconda[20049]: Graphical user interface not available, falling back to text mode >Mar 20 15:23:49 spectre anaconda[20049]: Not asking for VNC because of an automated install >Mar 20 15:23:49 spectre anaconda[20049]: Display mode = t >Mar 20 15:23:49 spectre anaconda[20049]: 4063232 kB (3968 MB) are available >Mar 20 15:23:49 spectre anaconda[20049]: check_memory(): total:3968, needed:512, graphical:512 >Mar 20 15:23:49 spectre blivet[20049]: trying to set new default fstype to 'ext4' >Mar 20 15:23:49 spectre blivet[20049]: Ext4FS.supported: supported: True ; >Mar 20 15:23:49 spectre blivet[20049]: getFormat('ext4') returning Ext4FS instance with object id 0 >Mar 20 15:23:49 spectre blivet[20049]: Ext4FS.supported: supported: True ; >Mar 20 15:23:49 spectre anaconda[20049]: module import of __init__ failed: <type 'exceptions.AttributeError'> >Mar 20 15:23:49 spectre anaconda[20049]: module import of __init__ failed: <type 'exceptions.AttributeError'> >Mar 20 15:23:49 spectre anaconda[20049]: using only installclass _Fedora >Mar 20 15:23:49 spectre packaging[20049]: about to acquire _yum_lock for MainThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:194 (reset) >Mar 20 15:23:49 spectre packaging[20049]: have _yum_lock for MainThread >Mar 20 15:23:49 spectre packaging[20049]: getting release version from tree at None (bluesky) >Mar 20 15:23:49 spectre packaging[20049]: got a release version of bluesky >Mar 20 15:23:49 spectre packaging[20049]: gave up _yum_lock for MainThread >Mar 20 15:23:49 spectre anaconda[20049]: bootloader GRUB2 on X86 platform >Mar 20 15:23:49 spectre blivet[20049]: Detected 3.87 GiB of memory >Mar 20 15:23:49 spectre blivet[20049]: Suggested swap size (3.87 GiB) exceeds 10 % of disk space, using 10 % of disk space (0.0) instead. >Mar 20 15:23:49 spectre blivet[20049]: Swap attempt of 0.0 >Mar 20 15:23:49 spectre anaconda[20049]: bootloader GRUB2 on X86 platform >Mar 20 15:23:49 spectre anaconda[20049]: network: devices found ['ens3', 'docker0'] >Mar 20 15:23:49 spectre ifcfg[20049]: content of files (network initialization): >Mar 20 15:23:49 spectre ifcfg[20049]: /etc/sysconfig/network-scripts/ifcfg-Wired_connection_1: >Mar 20 15:23:49 spectre ifcfg[20049]: HWADDR=52:54:00:DE:3D:45 >Mar 20 15:23:49 spectre ifcfg[20049]: TYPE=Ethernet >Mar 20 15:23:49 spectre ifcfg[20049]: BOOTPROTO=none >Mar 20 15:23:49 spectre ifcfg[20049]: IPADDR0=192.168.100.40 >Mar 20 15:23:49 spectre ifcfg[20049]: PREFIX0=24 >Mar 20 15:23:49 spectre ifcfg[20049]: GATEWAY0=192.168.100.1 >Mar 20 15:23:49 spectre ifcfg[20049]: DNS1=192.168.100.1 >Mar 20 15:23:49 spectre ifcfg[20049]: DEFROUTE=yes >Mar 20 15:23:49 spectre ifcfg[20049]: IPV4_FAILURE_FATAL=no >Mar 20 15:23:49 spectre ifcfg[20049]: IPV6INIT=yes >Mar 20 15:23:49 spectre ifcfg[20049]: IPV6_AUTOCONF=yes >Mar 20 15:23:49 spectre ifcfg[20049]: IPV6_DEFROUTE=yes >Mar 20 15:23:49 spectre ifcfg[20049]: IPV6_PEERDNS=yes >Mar 20 15:23:49 spectre ifcfg[20049]: IPV6_PEERROUTES=yes >Mar 20 15:23:49 spectre ifcfg[20049]: IPV6_FAILURE_FATAL=no >Mar 20 15:23:49 spectre ifcfg[20049]: NAME="Wired connection 1" >Mar 20 15:23:49 spectre ifcfg[20049]: UUID=3c57306f-f49c-4a1d-b0a8-d1f60baac46d >Mar 20 15:23:49 spectre ifcfg[20049]: ONBOOT=yes >Mar 20 15:23:49 spectre ifcfg[20049]: /etc/sysconfig/network-scripts/ifcfg-eth0: >Mar 20 15:23:49 spectre ifcfg[20049]: TYPE="Ethernet" >Mar 20 15:23:49 spectre ifcfg[20049]: BOOTPROTO=none >Mar 20 15:23:49 spectre ifcfg[20049]: DEFROUTE="yes" >Mar 20 15:23:49 spectre ifcfg[20049]: IPV4_FAILURE_FATAL="no" >Mar 20 15:23:49 spectre ifcfg[20049]: IPV6INIT=no >Mar 20 15:23:49 spectre ifcfg[20049]: IPV6_AUTOCONF="yes" >Mar 20 15:23:49 spectre ifcfg[20049]: IPV6_DEFROUTE="yes" >Mar 20 15:23:49 spectre ifcfg[20049]: IPV6_FAILURE_FATAL="no" >Mar 20 15:23:49 spectre ifcfg[20049]: NAME="eth0" >Mar 20 15:23:49 spectre ifcfg[20049]: UUID="3da51849-5a95-4bb8-9ed9-f9e9e6efecf9" >Mar 20 15:23:49 spectre ifcfg[20049]: ONBOOT="yes" >Mar 20 15:23:49 spectre ifcfg[20049]: IPADDR0=192.168.100.13 >Mar 20 15:23:49 spectre ifcfg[20049]: PREFIX0=24 >Mar 20 15:23:49 spectre ifcfg[20049]: GATEWAY0=192.168.100.1 >Mar 20 15:23:49 spectre ifcfg[20049]: DNS1=192.168.100.1 >Mar 20 15:23:49 spectre ifcfg[20049]: IPV6_PEERDNS=yes >Mar 20 15:23:49 spectre ifcfg[20049]: IPV6_PEERROUTES=yes >Mar 20 15:23:49 spectre ifcfg[20049]: HWADDR=52:54:00:01:25:97 >Mar 20 15:23:49 spectre ifcfg[20049]: all settings: [{'802-3-ethernet': {'s390-options': {}, 'mac-address': [82, 84, 0, 222, 61, 69]}, 'connection': {'timestamp': 1395343303L, 'type': '802-3-ethernet', 'id': 'Wired connection 1', 'uuid': '3c57306f-f49c-4a1d-b0a8-d1f60baac46d'}, 'ipv4': {'routes': [], 'addresses': [[677685440L, 24L, 23374016L]], 'dns': [23374016L], 'method': 'manual'}, 'ipv6': {'routes': [], 'addresses': [], 'dns': [], 'method': 'auto'}}, {'802-3-ethernet': {'s390-options': {}, 'mac-address': [82, 84, 0, 1, 37, 151]}, 'connection': {'timestamp': 1386792810L, 'type': '802-3-ethernet', 'id': 'eth0', 'uuid': '3da51849-5a95-4bb8-9ed9-f9e9e6efecf9'}, 'ipv4': {'routes': [], 'addresses': [[224700608L, 24L, 23374016L]], 'dns': [23374016L], 'method': 'manual'}, 'ipv6': {'routes': [], 'addresses': [], 'dns': [], 'method': 'ignore'}}, {'bridge': {'priority': 32768L, 'stp': False, 'interface-name': 'docker0'}, 'connection': {'autoconnect': False, 'interface-name': 'docker0', 'timestamp': 1395343019L, 'type': 'bridge', 'id': 'docker0', 'uuid': '1713b75c-4711-42d0-b099-181ccda40171'}, 'ipv4': {'routes': [], 'addresses': [], 'dns': [], 'method': 'disabled'}, 'ipv6': {'routes': [], 'addresses': [], 'dns': [], 'method': 'ignore'}}] >Mar 20 15:23:49 spectre ifcfg[20049]: IfcfFile.read /etc/sysconfig/network-scripts/ifcfg-Wired_connection_1 >Mar 20 15:23:49 spectre ifcfg[20049]: IfcfFile.read /etc/sysconfig/network-scripts/ifcfg-eth0 >Mar 20 15:23:49 spectre ifcfg[20049]: IfcfFile.read /etc/sysconfig/network-scripts/ifcfg-Wired_connection_1 >Mar 20 15:23:49 spectre ifcfg[20049]: IfcfFile.read /etc/sysconfig/network-scripts/ifcfg-eth0 >Mar 20 15:23:49 spectre ifcfg[20049]: IfcfFile.read /etc/sysconfig/network-scripts/ifcfg-Wired_connection_1 >Mar 20 15:23:49 spectre anaconda[20049]: updating hostname dhcp-100-40.dshea.bos.redhat.com >Mar 20 15:23:49 spectre anaconda[20049]: Running Thread: AnaWaitForConnectingNMThread (140533958457088) >Mar 20 15:23:49 spectre anaconda[20049]: Running Thread: AnaPayloadThread (140533880059648) >Mar 20 15:23:49 spectre anaconda[20049]: Not doing 'start chronyd' in directory installation >Mar 20 15:23:49 spectre anaconda[20049]: Running Thread: AnaSourceWatcher (140533871666944) >Mar 20 15:23:49 spectre anaconda[20049]: Running Thread: AnaSoftwareWatcher (140533863274240) >Mar 20 15:23:49 spectre anaconda[20049]: Running Thread: AnaStorageWatcher (140533854881536) >Mar 20 15:23:49 spectre anaconda[20049]: Thread Done: AnaStorageWatcher (140533854881536) >Mar 20 15:23:49 spectre anaconda[20049]: got 0 NTP servers from DHCP >Mar 20 15:23:49 spectre anaconda[20049]: Thread Done: AnaWaitForConnectingNMThread (140533958457088) >Mar 20 15:23:49 spectre packaging[20049]: configuring base repo >Mar 20 15:23:49 spectre packaging[20049]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:194 (reset) >Mar 20 15:23:49 spectre packaging[20049]: have _yum_lock for AnaPayloadThread >Mar 20 15:23:49 spectre yum[20049]: Loaded plugins: auto-update-debuginfo, langpacks >Mar 20 15:23:49 spectre yum[20049]: No plugin match for: fastestmirror >Mar 20 15:23:49 spectre yum[20049]: No plugin match for: langpacks >Mar 20 15:23:49 spectre yum[20049]: Adding en_US to language list >Mar 20 15:23:49 spectre yum[20049]: Config time: 0.009 >Mar 20 15:23:49 spectre packaging[20049]: getting release version from tree at None (bluesky) >Mar 20 15:23:49 spectre packaging[20049]: got a release version of bluesky >Mar 20 15:23:49 spectre packaging[20049]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:23:49 spectre packaging[20049]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:496 (updateBaseRepo) >Mar 20 15:23:49 spectre packaging[20049]: have _yum_lock for AnaPayloadThread >Mar 20 15:23:49 spectre yum[20049]: Loaded plugins: auto-update-debuginfo, langpacks >Mar 20 15:23:49 spectre yum[20049]: No plugin match for: fastestmirror >Mar 20 15:23:49 spectre yum[20049]: No plugin match for: langpacks >Mar 20 15:23:49 spectre yum[20049]: Adding en_US to language list >Mar 20 15:23:49 spectre yum[20049]: Config time: 0.008 >Mar 20 15:23:49 spectre packaging[20049]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:139 (inner_method) >Mar 20 15:23:50 spectre packaging[20049]: have _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: disabling repo rawhide-debuginfo >Mar 20 15:23:50 spectre packaging[20049]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:879 (disableRepo) >Mar 20 15:23:50 spectre packaging[20049]: have _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:139 (inner_method) >Mar 20 15:23:50 spectre packaging[20049]: have _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: disabling repo fedora >Mar 20 15:23:50 spectre packaging[20049]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:879 (disableRepo) >Mar 20 15:23:50 spectre packaging[20049]: have _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:139 (inner_method) >Mar 20 15:23:50 spectre packaging[20049]: have _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: disabling repo updates-debuginfo >Mar 20 15:23:50 spectre packaging[20049]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:879 (disableRepo) >Mar 20 15:23:50 spectre packaging[20049]: have _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:139 (inner_method) >Mar 20 15:23:50 spectre packaging[20049]: have _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: disabling repo rawhide-source >Mar 20 15:23:50 spectre packaging[20049]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:879 (disableRepo) >Mar 20 15:23:50 spectre packaging[20049]: have _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:139 (inner_method) >Mar 20 15:23:50 spectre packaging[20049]: have _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: disabling repo updates-testing >Mar 20 15:23:50 spectre packaging[20049]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:879 (disableRepo) >Mar 20 15:23:50 spectre packaging[20049]: have _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:139 (inner_method) >Mar 20 15:23:50 spectre packaging[20049]: have _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: disabling repo fedora-debuginfo >Mar 20 15:23:50 spectre packaging[20049]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:879 (disableRepo) >Mar 20 15:23:50 spectre packaging[20049]: have _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:139 (inner_method) >Mar 20 15:23:50 spectre packaging[20049]: have _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: disabling repo updates-testing-debuginfo >Mar 20 15:23:50 spectre packaging[20049]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:879 (disableRepo) >Mar 20 15:23:50 spectre packaging[20049]: have _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:139 (inner_method) >Mar 20 15:23:50 spectre packaging[20049]: have _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: disabling repo rawhide >Mar 20 15:23:50 spectre packaging[20049]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:879 (disableRepo) >Mar 20 15:23:50 spectre packaging[20049]: have _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:139 (inner_method) >Mar 20 15:23:50 spectre packaging[20049]: have _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:142 (inner_method) >Mar 20 15:23:50 spectre packaging[20049]: have _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:437 (_refreshBaseRepo) >Mar 20 15:23:50 spectre packaging[20049]: have _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:437 (_refreshBaseRepo) >Mar 20 15:23:50 spectre packaging[20049]: have _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:437 (_refreshBaseRepo) >Mar 20 15:23:50 spectre packaging[20049]: have _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: disabling repo updates-testing-source >Mar 20 15:23:50 spectre packaging[20049]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:879 (disableRepo) >Mar 20 15:23:50 spectre packaging[20049]: have _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:139 (inner_method) >Mar 20 15:23:50 spectre packaging[20049]: have _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: disabling repo updates-source >Mar 20 15:23:50 spectre packaging[20049]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:879 (disableRepo) >Mar 20 15:23:50 spectre packaging[20049]: have _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:139 (inner_method) >Mar 20 15:23:50 spectre packaging[20049]: have _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: disabling repo fedora-source >Mar 20 15:23:50 spectre packaging[20049]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:879 (disableRepo) >Mar 20 15:23:50 spectre packaging[20049]: have _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:139 (inner_method) >Mar 20 15:23:50 spectre packaging[20049]: have _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: disabling repo updates >Mar 20 15:23:50 spectre packaging[20049]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:879 (disableRepo) >Mar 20 15:23:50 spectre packaging[20049]: have _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:139 (inner_method) >Mar 20 15:23:50 spectre packaging[20049]: have _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:142 (inner_method) >Mar 20 15:23:50 spectre packaging[20049]: have _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:437 (_refreshBaseRepo) >Mar 20 15:23:50 spectre packaging[20049]: have _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:437 (_refreshBaseRepo) >Mar 20 15:23:50 spectre packaging[20049]: have _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:437 (_refreshBaseRepo) >Mar 20 15:23:50 spectre packaging[20049]: have _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: gathering repo metadata >Mar 20 15:23:50 spectre packaging[20049]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:599 (gatherRepoMetadata) >Mar 20 15:23:50 spectre packaging[20049]: have _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:139 (inner_method) >Mar 20 15:23:50 spectre packaging[20049]: have _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: skipping disabled repo rawhide-debuginfo >Mar 20 15:23:50 spectre packaging[20049]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:139 (inner_method) >Mar 20 15:23:50 spectre packaging[20049]: have _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: skipping disabled repo fedora >Mar 20 15:23:50 spectre packaging[20049]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:139 (inner_method) >Mar 20 15:23:50 spectre packaging[20049]: have _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: skipping disabled repo updates-debuginfo >Mar 20 15:23:50 spectre packaging[20049]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:139 (inner_method) >Mar 20 15:23:50 spectre packaging[20049]: have _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: skipping disabled repo rawhide-source >Mar 20 15:23:50 spectre packaging[20049]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:139 (inner_method) >Mar 20 15:23:50 spectre packaging[20049]: have _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: skipping disabled repo updates-testing >Mar 20 15:23:50 spectre packaging[20049]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:139 (inner_method) >Mar 20 15:23:50 spectre packaging[20049]: have _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: skipping disabled repo fedora-debuginfo >Mar 20 15:23:50 spectre packaging[20049]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:139 (inner_method) >Mar 20 15:23:50 spectre packaging[20049]: have _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: skipping disabled repo updates-testing-debuginfo >Mar 20 15:23:50 spectre packaging[20049]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:139 (inner_method) >Mar 20 15:23:50 spectre packaging[20049]: have _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: skipping disabled repo rawhide >Mar 20 15:23:50 spectre packaging[20049]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:139 (inner_method) >Mar 20 15:23:50 spectre packaging[20049]: have _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: skipping disabled repo updates-testing-source >Mar 20 15:23:50 spectre packaging[20049]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:139 (inner_method) >Mar 20 15:23:50 spectre packaging[20049]: have _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: skipping disabled repo updates-source >Mar 20 15:23:50 spectre packaging[20049]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:139 (inner_method) >Mar 20 15:23:50 spectre packaging[20049]: have _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: skipping disabled repo fedora-source >Mar 20 15:23:50 spectre packaging[20049]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:139 (inner_method) >Mar 20 15:23:50 spectre packaging[20049]: have _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: skipping disabled repo updates >Mar 20 15:23:50 spectre packaging[20049]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: Refreshing environmentAddons >Mar 20 15:23:50 spectre packaging[20049]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:894 (environments) >Mar 20 15:23:50 spectre packaging[20049]: have _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre yum[20049]: Setting up Package Sacks >Mar 20 15:23:50 spectre yum[20049]: rpmdb time: 0.001 >Mar 20 15:23:50 spectre yum[20049]: group time: 0.009 >Mar 20 15:23:50 spectre packaging[20049]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre ifcfg[20049]: IfcfFile.read /etc/sysconfig/network-scripts/ifcfg-Wired_connection_1 >Mar 20 15:23:50 spectre ifcfg[20049]: IfcfFile.read /etc/sysconfig/network-scripts/ifcfg-Wired_connection_1 >Mar 20 15:23:50 spectre packaging[20049]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/__init__.py:994 (_refreshEnvironmentAddons) >Mar 20 15:23:50 spectre packaging[20049]: have _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: metadata retrieval complete >Mar 20 15:23:50 spectre packaging[20049]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:142 (inner_method) >Mar 20 15:23:50 spectre packaging[20049]: have _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:437 (_refreshBaseRepo) >Mar 20 15:23:50 spectre packaging[20049]: have _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:437 (_refreshBaseRepo) >Mar 20 15:23:50 spectre packaging[20049]: have _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:437 (_refreshBaseRepo) >Mar 20 15:23:50 spectre packaging[20049]: have _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre packaging[20049]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:23:50 spectre anaconda[20049]: Thread Done: AnaPayloadThread (140533880059648) >Mar 20 15:23:50 spectre anaconda[20049]: Thread Done: AnaSourceWatcher (140533871666944) >Mar 20 15:23:50 spectre packaging[20049]: about to acquire _yum_lock for AnaSoftwareWatcher at /usr/lib64/python2.7/site-packages/pyanaconda/ui/tui/spokes/software.py:72 (_initialize) >Mar 20 15:23:50 spectre packaging[20049]: have _yum_lock for AnaSoftwareWatcher >Mar 20 15:23:50 spectre packaging[20049]: deleting package sacks >Mar 20 15:23:50 spectre packaging[20049]: gave up _yum_lock for AnaSoftwareWatcher >Mar 20 15:23:50 spectre anaconda[20049]: Thread Done: AnaSoftwareWatcher (140533863274240) >Mar 20 15:23:50 spectre ifcfg[20049]: IfcfFile.read /etc/sysconfig/network-scripts/ifcfg-Wired_connection_1 >Mar 20 15:23:50 spectre ifcfg[20049]: IfcfFile.read /etc/sysconfig/network-scripts/ifcfg-eth0 >Mar 20 15:23:50 spectre anaconda[20049]: updating hostname dhcp-100-40.dshea.bos.redhat.com >Mar 20 15:23:50 spectre anaconda[20049]: Running Thread: AnaInputThread1 (140533863274240) >Mar 20 15:23:55 spectre anaconda[20049]: Thread Done: AnaInputThread1 (140533863274240) >Mar 20 15:23:55 spectre anaconda[20049]: Running Thread: AnaInputThread2 (140533863274240) >Mar 20 15:24:04 spectre anaconda[20049]: Thread Done: AnaInputThread2 (140533863274240) >Mar 20 15:24:04 spectre anaconda[20049]: Running Thread: AnaInputThread3 (140533863274240) >Mar 20 15:24:04 spectre anaconda[20049]: Thread Done: AnaInputThread3 (140533863274240) >Mar 20 15:24:04 spectre anaconda[20049]: Running Thread: AnaInputThread4 (140533863274240) >Mar 20 15:24:12 spectre sudo[20095]: dshea : TTY=pts/4 ; PWD=/home/dshea ; USER=root ; COMMAND=/bin/killall -KILL anaconda >Mar 20 15:24:25 spectre sshd[20097]: Accepted publickey for dshea from 192.168.100.1 port 55983 ssh2: RSA 29:71:d3:be:dc:71:8e:0d:ef:a5:2f:ab:31:0c:82:d4 >Mar 20 15:24:25 spectre systemd-logind[17665]: New session 100 of user dshea. >Mar 20 15:24:25 spectre systemd[1]: Starting Session 100 of user dshea. >Mar 20 15:24:25 spectre systemd[1]: Started Session 100 of user dshea. >Mar 20 15:24:25 spectre sshd[20097]: pam_unix(sshd:session): session opened for user dshea by (uid=0) >Mar 20 15:28:43 spectre sudo[20132]: dshea : TTY=pts/4 ; PWD=/home/dshea ; USER=root ; COMMAND=/bin/env ANACONDA_ROOT_PATH=/srv/dshea-test anaconda --dirinstall --kickstart=docker-test.ks >Mar 20 15:28:44 spectre anaconda[20133]: /sbin/anaconda 21.28-1 >Mar 20 15:28:44 spectre anaconda[20133]: 4063232 kB (3968 MB) are available >Mar 20 15:28:44 spectre anaconda[20133]: check_memory(): total:3968, needed:512, graphical:512 >Mar 20 15:28:44 spectre anaconda[20133]: Not doing 'start audit daemon' in directory installation >Mar 20 15:28:44 spectre anaconda[20133]: anaconda called with cmdline = ['/sbin/anaconda', '--dirinstall', '--kickstart=docker-test.ks'] >Mar 20 15:28:44 spectre anaconda[20133]: Default encoding = ascii >Mar 20 15:28:44 spectre program[20133]: Running... udevadm trigger --action=change --subsystem-match=block >Mar 20 15:28:44 spectre program[20133]: Return code: 0 >Mar 20 15:28:44 spectre program[20133]: Running... udevadm settle --timeout=300 >Mar 20 15:28:44 spectre program[20133]: Return code: 0 >Mar 20 15:28:44 spectre program[20133]: Running... modprobe fcoe >Mar 20 15:28:44 spectre program[20133]: Return code: 0 >Mar 20 15:28:44 spectre program[20133]: Running... /usr/libexec/fcoe/fcoe_edd.sh -i >Mar 20 15:28:44 spectre program[20133]: No FCoE boot disk information is found in EDD! >Mar 20 15:28:44 spectre program[20133]: Return code: 1 >Mar 20 15:28:44 spectre blivet[20133]: No FCoE EDD info found: No FCoE boot disk information is found in EDD! >Mar 20 15:28:44 spectre blivet[20133]: no /etc/zfcp.conf; not configuring zfcp >Mar 20 15:28:44 spectre anaconda[20133]: Graphical user interface not available, falling back to text mode >Mar 20 15:28:44 spectre anaconda[20133]: Not asking for VNC because of an automated install >Mar 20 15:28:44 spectre anaconda[20133]: Display mode = t >Mar 20 15:28:44 spectre anaconda[20133]: 4063232 kB (3968 MB) are available >Mar 20 15:28:44 spectre anaconda[20133]: check_memory(): total:3968, needed:512, graphical:512 >Mar 20 15:28:44 spectre blivet[20133]: trying to set new default fstype to 'ext4' >Mar 20 15:28:44 spectre blivet[20133]: Ext4FS.supported: supported: True ; >Mar 20 15:28:44 spectre blivet[20133]: getFormat('ext4') returning Ext4FS instance with object id 0 >Mar 20 15:28:44 spectre blivet[20133]: Ext4FS.supported: supported: True ; >Mar 20 15:28:44 spectre anaconda[20133]: module import of __init__ failed: <type 'exceptions.AttributeError'> >Mar 20 15:28:44 spectre anaconda[20133]: module import of __init__ failed: <type 'exceptions.AttributeError'> >Mar 20 15:28:44 spectre anaconda[20133]: using only installclass _Fedora >Mar 20 15:28:44 spectre packaging[20133]: about to acquire _yum_lock for MainThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:194 (reset) >Mar 20 15:28:44 spectre packaging[20133]: have _yum_lock for MainThread >Mar 20 15:28:44 spectre packaging[20133]: getting release version from tree at None (bluesky) >Mar 20 15:28:44 spectre packaging[20133]: got a release version of bluesky >Mar 20 15:28:44 spectre packaging[20133]: gave up _yum_lock for MainThread >Mar 20 15:28:44 spectre anaconda[20133]: bootloader GRUB2 on X86 platform >Mar 20 15:28:44 spectre blivet[20133]: Detected 3.87 GiB of memory >Mar 20 15:28:44 spectre blivet[20133]: Suggested swap size (3.87 GiB) exceeds 10 % of disk space, using 10 % of disk space (0.0) instead. >Mar 20 15:28:44 spectre blivet[20133]: Swap attempt of 0.0 >Mar 20 15:28:44 spectre anaconda[20133]: bootloader GRUB2 on X86 platform >Mar 20 15:28:44 spectre anaconda[20133]: network: devices found ['ens3', 'docker0'] >Mar 20 15:28:44 spectre ifcfg[20133]: content of files (network initialization): >Mar 20 15:28:44 spectre ifcfg[20133]: /etc/sysconfig/network-scripts/ifcfg-Wired_connection_1: >Mar 20 15:28:44 spectre ifcfg[20133]: HWADDR=52:54:00:DE:3D:45 >Mar 20 15:28:44 spectre ifcfg[20133]: TYPE=Ethernet >Mar 20 15:28:44 spectre ifcfg[20133]: BOOTPROTO=none >Mar 20 15:28:44 spectre ifcfg[20133]: IPADDR0=192.168.100.40 >Mar 20 15:28:44 spectre ifcfg[20133]: PREFIX0=24 >Mar 20 15:28:44 spectre ifcfg[20133]: GATEWAY0=192.168.100.1 >Mar 20 15:28:44 spectre ifcfg[20133]: DNS1=192.168.100.1 >Mar 20 15:28:44 spectre ifcfg[20133]: DEFROUTE=yes >Mar 20 15:28:44 spectre ifcfg[20133]: IPV4_FAILURE_FATAL=no >Mar 20 15:28:44 spectre ifcfg[20133]: IPV6INIT=yes >Mar 20 15:28:44 spectre ifcfg[20133]: IPV6_AUTOCONF=yes >Mar 20 15:28:44 spectre ifcfg[20133]: IPV6_DEFROUTE=yes >Mar 20 15:28:44 spectre ifcfg[20133]: IPV6_PEERDNS=yes >Mar 20 15:28:44 spectre ifcfg[20133]: IPV6_PEERROUTES=yes >Mar 20 15:28:44 spectre ifcfg[20133]: IPV6_FAILURE_FATAL=no >Mar 20 15:28:44 spectre ifcfg[20133]: NAME="Wired connection 1" >Mar 20 15:28:44 spectre ifcfg[20133]: UUID=3c57306f-f49c-4a1d-b0a8-d1f60baac46d >Mar 20 15:28:44 spectre ifcfg[20133]: ONBOOT=yes >Mar 20 15:28:44 spectre ifcfg[20133]: /etc/sysconfig/network-scripts/ifcfg-eth0: >Mar 20 15:28:44 spectre ifcfg[20133]: TYPE="Ethernet" >Mar 20 15:28:44 spectre ifcfg[20133]: BOOTPROTO=none >Mar 20 15:28:44 spectre ifcfg[20133]: DEFROUTE="yes" >Mar 20 15:28:44 spectre ifcfg[20133]: IPV4_FAILURE_FATAL="no" >Mar 20 15:28:44 spectre ifcfg[20133]: IPV6INIT=no >Mar 20 15:28:44 spectre ifcfg[20133]: IPV6_AUTOCONF="yes" >Mar 20 15:28:44 spectre ifcfg[20133]: IPV6_DEFROUTE="yes" >Mar 20 15:28:44 spectre ifcfg[20133]: IPV6_FAILURE_FATAL="no" >Mar 20 15:28:44 spectre ifcfg[20133]: NAME="eth0" >Mar 20 15:28:44 spectre ifcfg[20133]: UUID="3da51849-5a95-4bb8-9ed9-f9e9e6efecf9" >Mar 20 15:28:44 spectre ifcfg[20133]: ONBOOT="yes" >Mar 20 15:28:44 spectre ifcfg[20133]: IPADDR0=192.168.100.13 >Mar 20 15:28:44 spectre ifcfg[20133]: PREFIX0=24 >Mar 20 15:28:44 spectre ifcfg[20133]: GATEWAY0=192.168.100.1 >Mar 20 15:28:44 spectre ifcfg[20133]: DNS1=192.168.100.1 >Mar 20 15:28:44 spectre ifcfg[20133]: IPV6_PEERDNS=yes >Mar 20 15:28:44 spectre ifcfg[20133]: IPV6_PEERROUTES=yes >Mar 20 15:28:44 spectre ifcfg[20133]: HWADDR=52:54:00:01:25:97 >Mar 20 15:28:44 spectre ifcfg[20133]: all settings: [{'802-3-ethernet': {'s390-options': {}, 'mac-address': [82, 84, 0, 222, 61, 69]}, 'connection': {'timestamp': 1395343602L, 'type': '802-3-ethernet', 'id': 'Wired connection 1', 'uuid': '3c57306f-f49c-4a1d-b0a8-d1f60baac46d'}, 'ipv4': {'routes': [], 'addresses': [[677685440L, 24L, 23374016L]], 'dns': [23374016L], 'method': 'manual'}, 'ipv6': {'routes': [], 'addresses': [], 'dns': [], 'method': 'auto'}}, {'802-3-ethernet': {'s390-options': {}, 'mac-address': [82, 84, 0, 1, 37, 151]}, 'connection': {'timestamp': 1386792810L, 'type': '802-3-ethernet', 'id': 'eth0', 'uuid': '3da51849-5a95-4bb8-9ed9-f9e9e6efecf9'}, 'ipv4': {'routes': [], 'addresses': [[224700608L, 24L, 23374016L]], 'dns': [23374016L], 'method': 'manual'}, 'ipv6': {'routes': [], 'addresses': [], 'dns': [], 'method': 'ignore'}}, {'bridge': {'priority': 32768L, 'stp': False, 'interface-name': 'docker0'}, 'connection': {'autoconnect': False, 'interface-name': 'docker0', 'timestamp': 1395343019L, 'type': 'bridge', 'id': 'docker0', 'uuid': '1713b75c-4711-42d0-b099-181ccda40171'}, 'ipv4': {'routes': [], 'addresses': [], 'dns': [], 'method': 'disabled'}, 'ipv6': {'routes': [], 'addresses': [], 'dns': [], 'method': 'ignore'}}] >Mar 20 15:28:44 spectre ifcfg[20133]: IfcfFile.read /etc/sysconfig/network-scripts/ifcfg-Wired_connection_1 >Mar 20 15:28:44 spectre ifcfg[20133]: IfcfFile.read /etc/sysconfig/network-scripts/ifcfg-eth0 >Mar 20 15:28:44 spectre ifcfg[20133]: IfcfFile.read /etc/sysconfig/network-scripts/ifcfg-Wired_connection_1 >Mar 20 15:28:44 spectre ifcfg[20133]: IfcfFile.read /etc/sysconfig/network-scripts/ifcfg-eth0 >Mar 20 15:28:44 spectre ifcfg[20133]: IfcfFile.read /etc/sysconfig/network-scripts/ifcfg-Wired_connection_1 >Mar 20 15:28:44 spectre anaconda[20133]: updating hostname dhcp-100-40.dshea.bos.redhat.com >Mar 20 15:28:44 spectre anaconda[20133]: Running Thread: AnaWaitForConnectingNMThread (140382192359168) >Mar 20 15:28:44 spectre anaconda[20133]: Running Thread: AnaPayloadThread (140382183966464) >Mar 20 15:28:44 spectre anaconda[20133]: Not doing 'start chronyd' in directory installation >Mar 20 15:28:44 spectre anaconda[20133]: Running Thread: AnaSourceWatcher (140382175573760) >Mar 20 15:28:44 spectre anaconda[20133]: Running Thread: AnaSoftwareWatcher (140382167181056) >Mar 20 15:28:44 spectre anaconda[20133]: Running Thread: AnaStorageWatcher (140382158788352) >Mar 20 15:28:44 spectre anaconda[20133]: Thread Done: AnaStorageWatcher (140382158788352) >Mar 20 15:28:44 spectre anaconda[20133]: got 0 NTP servers from DHCP >Mar 20 15:28:44 spectre anaconda[20133]: Thread Done: AnaWaitForConnectingNMThread (140382192359168) >Mar 20 15:28:44 spectre packaging[20133]: configuring base repo >Mar 20 15:28:44 spectre packaging[20133]: getting release version from tree at None (bluesky) >Mar 20 15:28:44 spectre packaging[20133]: got a release version of bluesky >Mar 20 15:28:44 spectre packaging[20133]: releasever from None is bluesky >Mar 20 15:28:44 spectre packaging[20133]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:194 (reset) >Mar 20 15:28:44 spectre packaging[20133]: have _yum_lock for AnaPayloadThread >Mar 20 15:28:44 spectre yum[20133]: Loaded plugins: auto-update-debuginfo, langpacks >Mar 20 15:28:44 spectre yum[20133]: No plugin match for: fastestmirror >Mar 20 15:28:44 spectre yum[20133]: No plugin match for: langpacks >Mar 20 15:28:44 spectre yum[20133]: Adding en_US to language list >Mar 20 15:28:44 spectre yum[20133]: Config time: 0.011 >Mar 20 15:28:44 spectre packaging[20133]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:28:44 spectre packaging[20133]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:496 (updateBaseRepo) >Mar 20 15:28:44 spectre packaging[20133]: have _yum_lock for AnaPayloadThread >Mar 20 15:28:44 spectre yum[20133]: Loaded plugins: auto-update-debuginfo, langpacks >Mar 20 15:28:44 spectre yum[20133]: No plugin match for: fastestmirror >Mar 20 15:28:44 spectre yum[20133]: No plugin match for: langpacks >Mar 20 15:28:44 spectre yum[20133]: Adding en_US to language list >Mar 20 15:28:44 spectre yum[20133]: Config time: 0.009 >Mar 20 15:28:44 spectre packaging[20133]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:28:44 spectre packaging[20133]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:524 (updateBaseRepo) >Mar 20 15:28:44 spectre packaging[20133]: have _yum_lock for AnaPayloadThread >Mar 20 15:28:44 spectre packaging[20133]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:28:44 spectre packaging[20133]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:803 (_addYumRepo) >Mar 20 15:28:44 spectre packaging[20133]: have _yum_lock for AnaPayloadThread >Mar 20 15:28:44 spectre packaging[20133]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:28:44 spectre packaging[20133]: adding yum repo anaconda with baseurl None and mirrorlist https://mirrors.fedoraproject.org/metalink?repo=fedora-bluesky&arch=x86_64 >Mar 20 15:28:44 spectre packaging[20133]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:524 (updateBaseRepo) >Mar 20 15:28:44 spectre packaging[20133]: have _yum_lock for AnaPayloadThread >Mar 20 15:28:44 spectre ifcfg[20133]: IfcfFile.read /etc/sysconfig/network-scripts/ifcfg-Wired_connection_1 >Mar 20 15:28:44 spectre ifcfg[20133]: IfcfFile.read /etc/sysconfig/network-scripts/ifcfg-Wired_connection_1 >Mar 20 15:28:44 spectre ifcfg[20133]: IfcfFile.read /etc/sysconfig/network-scripts/ifcfg-Wired_connection_1 >Mar 20 15:28:44 spectre ifcfg[20133]: IfcfFile.read /etc/sysconfig/network-scripts/ifcfg-eth0 >Mar 20 15:28:44 spectre anaconda[20133]: updating hostname dhcp-100-40.dshea.bos.redhat.com >Mar 20 15:28:45 spectre packaging[20133]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:28:45 spectre packaging[20133]: base repo (url/None) not valid -- removing it >Mar 20 15:28:45 spectre packaging[20133]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:837 (_removeYumRepo) >Mar 20 15:28:45 spectre packaging[20133]: have _yum_lock for AnaPayloadThread >Mar 20 15:28:45 spectre packaging[20133]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:28:45 spectre packaging[20133]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:528 (updateBaseRepo) >Mar 20 15:28:45 spectre packaging[20133]: have _yum_lock for AnaPayloadThread >Mar 20 15:28:45 spectre packaging[20133]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:28:45 spectre packaging[20133]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:139 (inner_method) >Mar 20 15:28:45 spectre packaging[20133]: have _yum_lock for AnaPayloadThread >Mar 20 15:28:45 spectre packaging[20133]: disabling repo rawhide >Mar 20 15:28:45 spectre packaging[20133]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:879 (disableRepo) >Mar 20 15:28:45 spectre packaging[20133]: have _yum_lock for AnaPayloadThread >Mar 20 15:28:45 spectre packaging[20133]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:28:45 spectre packaging[20133]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:139 (inner_method) >Mar 20 15:28:45 spectre packaging[20133]: have _yum_lock for AnaPayloadThread >Mar 20 15:28:45 spectre packaging[20133]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:28:45 spectre packaging[20133]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:142 (inner_method) >Mar 20 15:28:45 spectre packaging[20133]: have _yum_lock for AnaPayloadThread >Mar 20 15:28:45 spectre packaging[20133]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:437 (_refreshBaseRepo) >Mar 20 15:28:45 spectre packaging[20133]: have _yum_lock for AnaPayloadThread >Mar 20 15:28:45 spectre packaging[20133]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:28:45 spectre packaging[20133]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:437 (_refreshBaseRepo) >Mar 20 15:28:45 spectre packaging[20133]: have _yum_lock for AnaPayloadThread >Mar 20 15:28:45 spectre packaging[20133]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:28:45 spectre packaging[20133]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:437 (_refreshBaseRepo) >Mar 20 15:28:45 spectre packaging[20133]: have _yum_lock for AnaPayloadThread >Mar 20 15:28:45 spectre packaging[20133]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:28:45 spectre packaging[20133]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:28:45 spectre packaging[20133]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:28:45 spectre packaging[20133]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:142 (inner_method) >Mar 20 15:28:45 spectre packaging[20133]: have _yum_lock for AnaPayloadThread >Mar 20 15:28:45 spectre packaging[20133]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:437 (_refreshBaseRepo) >Mar 20 15:28:45 spectre packaging[20133]: have _yum_lock for AnaPayloadThread >Mar 20 15:28:45 spectre packaging[20133]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:28:45 spectre packaging[20133]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:437 (_refreshBaseRepo) >Mar 20 15:28:45 spectre packaging[20133]: have _yum_lock for AnaPayloadThread >Mar 20 15:28:45 spectre packaging[20133]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:28:45 spectre packaging[20133]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:437 (_refreshBaseRepo) >Mar 20 15:28:45 spectre packaging[20133]: have _yum_lock for AnaPayloadThread >Mar 20 15:28:45 spectre packaging[20133]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:28:45 spectre packaging[20133]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:28:45 spectre packaging[20133]: gathering repo metadata >Mar 20 15:28:45 spectre packaging[20133]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:599 (gatherRepoMetadata) >Mar 20 15:28:45 spectre packaging[20133]: have _yum_lock for AnaPayloadThread >Mar 20 15:28:45 spectre packaging[20133]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:28:45 spectre packaging[20133]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:139 (inner_method) >Mar 20 15:28:45 spectre packaging[20133]: have _yum_lock for AnaPayloadThread >Mar 20 15:28:45 spectre packaging[20133]: skipping disabled repo rawhide-debuginfo >Mar 20 15:28:45 spectre packaging[20133]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:28:45 spectre packaging[20133]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:139 (inner_method) >Mar 20 15:28:45 spectre packaging[20133]: have _yum_lock for AnaPayloadThread >Mar 20 15:28:45 spectre packaging[20133]: skipping disabled repo fedora >Mar 20 15:28:45 spectre packaging[20133]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:28:45 spectre packaging[20133]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:139 (inner_method) >Mar 20 15:28:45 spectre packaging[20133]: have _yum_lock for AnaPayloadThread >Mar 20 15:28:45 spectre packaging[20133]: skipping disabled repo updates-debuginfo >Mar 20 15:28:45 spectre packaging[20133]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:28:45 spectre packaging[20133]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:139 (inner_method) >Mar 20 15:28:45 spectre packaging[20133]: have _yum_lock for AnaPayloadThread >Mar 20 15:28:45 spectre packaging[20133]: skipping disabled repo rawhide-source >Mar 20 15:28:45 spectre packaging[20133]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:28:45 spectre packaging[20133]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:139 (inner_method) >Mar 20 15:28:45 spectre packaging[20133]: have _yum_lock for AnaPayloadThread >Mar 20 15:28:45 spectre packaging[20133]: skipping disabled repo updates-testing >Mar 20 15:28:45 spectre packaging[20133]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:28:45 spectre packaging[20133]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:139 (inner_method) >Mar 20 15:28:45 spectre packaging[20133]: have _yum_lock for AnaPayloadThread >Mar 20 15:28:45 spectre packaging[20133]: skipping disabled repo fedora-debuginfo >Mar 20 15:28:45 spectre packaging[20133]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:28:45 spectre packaging[20133]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:139 (inner_method) >Mar 20 15:28:45 spectre packaging[20133]: have _yum_lock for AnaPayloadThread >Mar 20 15:28:45 spectre packaging[20133]: skipping disabled repo updates-testing-debuginfo >Mar 20 15:28:45 spectre packaging[20133]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:28:45 spectre packaging[20133]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:139 (inner_method) >Mar 20 15:28:45 spectre packaging[20133]: have _yum_lock for AnaPayloadThread >Mar 20 15:28:45 spectre packaging[20133]: skipping disabled repo rawhide >Mar 20 15:28:45 spectre packaging[20133]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:28:45 spectre packaging[20133]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:139 (inner_method) >Mar 20 15:28:45 spectre packaging[20133]: have _yum_lock for AnaPayloadThread >Mar 20 15:28:45 spectre packaging[20133]: skipping disabled repo updates-testing-source >Mar 20 15:28:45 spectre packaging[20133]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:28:45 spectre packaging[20133]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:139 (inner_method) >Mar 20 15:28:45 spectre packaging[20133]: have _yum_lock for AnaPayloadThread >Mar 20 15:28:45 spectre packaging[20133]: skipping disabled repo updates-source >Mar 20 15:28:45 spectre packaging[20133]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:28:45 spectre packaging[20133]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:139 (inner_method) >Mar 20 15:28:45 spectre packaging[20133]: have _yum_lock for AnaPayloadThread >Mar 20 15:28:45 spectre packaging[20133]: skipping disabled repo fedora-source >Mar 20 15:28:45 spectre packaging[20133]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:28:45 spectre packaging[20133]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:139 (inner_method) >Mar 20 15:28:45 spectre packaging[20133]: have _yum_lock for AnaPayloadThread >Mar 20 15:28:45 spectre packaging[20133]: skipping disabled repo updates >Mar 20 15:28:45 spectre packaging[20133]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:28:45 spectre packaging[20133]: Refreshing environmentAddons >Mar 20 15:28:45 spectre packaging[20133]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:894 (environments) >Mar 20 15:28:45 spectre packaging[20133]: have _yum_lock for AnaPayloadThread >Mar 20 15:28:45 spectre yum[20133]: Setting up Package Sacks >Mar 20 15:28:45 spectre yum[20133]: rpmdb time: 0.000 >Mar 20 15:28:45 spectre yum[20133]: group time: 0.005 >Mar 20 15:28:45 spectre packaging[20133]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:28:45 spectre packaging[20133]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/__init__.py:994 (_refreshEnvironmentAddons) >Mar 20 15:28:45 spectre packaging[20133]: have _yum_lock for AnaPayloadThread >Mar 20 15:28:45 spectre packaging[20133]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:28:45 spectre packaging[20133]: metadata retrieval complete >Mar 20 15:28:45 spectre packaging[20133]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:142 (inner_method) >Mar 20 15:28:45 spectre packaging[20133]: have _yum_lock for AnaPayloadThread >Mar 20 15:28:45 spectre packaging[20133]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:437 (_refreshBaseRepo) >Mar 20 15:28:45 spectre packaging[20133]: have _yum_lock for AnaPayloadThread >Mar 20 15:28:45 spectre packaging[20133]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:28:45 spectre packaging[20133]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:437 (_refreshBaseRepo) >Mar 20 15:28:45 spectre packaging[20133]: have _yum_lock for AnaPayloadThread >Mar 20 15:28:45 spectre packaging[20133]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:28:45 spectre packaging[20133]: about to acquire _yum_lock for AnaPayloadThread at /usr/lib64/python2.7/site-packages/pyanaconda/packaging/yumpayload.py:437 (_refreshBaseRepo) >Mar 20 15:28:45 spectre packaging[20133]: have _yum_lock for AnaPayloadThread >Mar 20 15:28:45 spectre packaging[20133]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:28:45 spectre packaging[20133]: gave up _yum_lock for AnaPayloadThread >Mar 20 15:28:45 spectre anaconda[20133]: Thread Done: AnaPayloadThread (140382183966464) >Mar 20 15:28:45 spectre anaconda[20133]: Thread Done: AnaSourceWatcher (140382175573760) >Mar 20 15:28:45 spectre packaging[20133]: about to acquire _yum_lock for AnaSoftwareWatcher at /usr/lib64/python2.7/site-packages/pyanaconda/ui/tui/spokes/software.py:72 (_initialize) >Mar 20 15:28:45 spectre packaging[20133]: have _yum_lock for AnaSoftwareWatcher >Mar 20 15:28:45 spectre packaging[20133]: deleting package sacks >Mar 20 15:28:45 spectre packaging[20133]: gave up _yum_lock for AnaSoftwareWatcher >Mar 20 15:28:45 spectre anaconda[20133]: Thread Done: AnaSoftwareWatcher (140382167181056) >Mar 20 15:28:45 spectre anaconda[20133]: Not doing 'require network connection' in directory installation >Mar 20 15:28:46 spectre anaconda[20133]: Not doing 'require network connection' in directory installation >Mar 20 15:28:46 spectre anaconda[20133]: Running Thread: AnaInputThread1 (140382167181056) >Mar 20 15:28:52 spectre anaconda[20133]: Thread Done: AnaInputThread1 (140382167181056) >Mar 20 15:28:52 spectre anaconda[20133]: Not doing 'require network connection' in directory installation >Mar 20 15:28:52 spectre anaconda[20133]: Not doing 'require network connection' in directory installation >Mar 20 15:28:52 spectre anaconda[20133]: Running Thread: AnaInputThread2 (140382167181056) >Mar 20 15:29:20 spectre anaconda[20133]: Thread Done: AnaInputThread2 (140382167181056) >Mar 20 15:29:20 spectre anaconda[20133]: Not doing 'require network connection' in directory installation >Mar 20 15:29:20 spectre anaconda[20133]: Not doing 'require network connection' in directory installation >Mar 20 15:29:20 spectre anaconda[20133]: Running Thread: AnaInputThread3 (140382167181056) >Mar 20 15:29:27 spectre sudo[20175]: dshea : TTY=pts/4 ; PWD=/home/dshea ; USER=root ; COMMAND=/bin/killall -KILL anaconda >Mar 20 15:29:30 spectre sudo[20177]: dshea : TTY=pts/4 ; PWD=/home/dshea ; USER=root ; COMMAND=/bin/env ANACONDA_ROOT_PATH=/srv/dshea-test anaconda --dirinstall --kickstart=docker-test.ks >Mar 20 15:30:01 spectre kernel: SELinux: initialized (dev tmpfs, type tmpfs), uses transition SIDs >Mar 20 15:30:01 spectre systemd-journal[439]: Suppressed 22843 messages from /user.slice/user-1000.slice >Mar 20 15:30:31 spectre systemd-journal[439]: Suppressed 22870 messages from /user.slice/user-1000.slice >Mar 20 15:30:55 spectre sudo[20232]: dshea : TTY=pts/5 ; PWD=/home/dshea ; USER=root ; COMMAND=/bin/su - >Mar 20 15:30:55 spectre su[20233]: (to root) dshea on pts/5 >Mar 20 15:30:55 spectre su[20233]: pam_unix(su-l:session): session opened for user root by dshea(uid=0) >Mar 20 15:31:29 spectre su[20233]: pam_unix(su-l:session): session closed for user root >Mar 20 15:31:30 spectre sudo[20368]: dshea : TTY=pts/5 ; PWD=/home/dshea ; USER=root ; COMMAND=/bin/su - >Mar 20 15:31:30 spectre su[20369]: (to root) dshea on pts/5 >Mar 20 15:31:30 spectre su[20369]: pam_unix(su-l:session): session opened for user root by dshea(uid=0) >Mar 20 15:32:52 spectre groupadd[20472]: group added to /etc/group: name=utmp, GID=22 >Mar 20 15:32:52 spectre groupadd[20472]: group added to /etc/gshadow: name=utmp >Mar 20 15:32:52 spectre groupadd[20472]: new group: name=utmp, GID=22 >Mar 20 15:32:52 spectre groupadd[20476]: group added to /etc/group: name=utempter, GID=35 >Mar 20 15:32:52 spectre groupadd[20476]: group added to /etc/gshadow: name=utempter >Mar 20 15:32:52 spectre groupadd[20476]: new group: name=utempter, GID=35 >Mar 20 15:33:32 spectre groupadd[20518]: group added to /etc/group: name=systemd-journal, GID=190 >Mar 20 15:33:32 spectre groupadd[20518]: group added to /etc/gshadow: name=systemd-journal >Mar 20 15:33:32 spectre groupadd[20518]: new group: name=systemd-journal, GID=190 >Mar 20 15:33:35 spectre groupadd[20543]: group added to /etc/group: name=dbus, GID=81 >Mar 20 15:33:36 spectre groupadd[20543]: group added to /etc/gshadow: name=dbus >Mar 20 15:33:36 spectre groupadd[20543]: new group: name=dbus, GID=81 >Mar 20 15:33:36 spectre useradd[20547]: new user: name=dbus, UID=81, GID=81, home=/, shell=/sbin/nologin > >File "/usr/lib64/python2.7/site-packages/pyanaconda/threads.py", line 227, in run >threading.Thread.run(self, *args, **kwargs) > >File "/usr/lib64/python2.7/threading.py", line 766, in run >self.__target(*self.__args, **self.__kwargs) > >File "/usr/lib64/python2.7/site-packages/pyanaconda/install.py", line 70, in doConfiguration >ksdata.keyboard.execute(storage, ksdata, instClass) > >File "/usr/lib64/python2.7/site-packages/pyanaconda/kickstart.py", line 1560, in execute >keyboard.write_keyboard_config(self, ROOT_PATH) > >File "/usr/lib64/python2.7/site-packages/pyanaconda/keyboard.py", line 177, in write_keyboard_config >populate_missing_items(keyboard) > >File "/usr/lib64/python2.7/site-packages/pyanaconda/keyboard.py", line 159, in populate_missing_items >c_lay_var = localed.convert_keymap(keyboard.vc_keymap) > >File "/usr/lib64/python2.7/site-packages/pyanaconda/keyboard.py", line 813, in convert_keymap >orig_keymap = self.keymap > >File "/usr/lib64/python2.7/site-packages/pyanaconda/keyboard.py", line 707, in keymap >self._connection) > >File "/usr/lib64/python2.7/site-packages/pyanaconda/safe_dbus.py", line 134, in dbus_get_property_safe_sync >connection) > >File "/usr/lib64/python2.7/site-packages/pyanaconda/safe_dbus.py", line 98, in dbus_call_safe_sync >raise DBusCallError(msg) > >DBusCallError: Failed to call Get method on /org/freedesktop/locale1 with ('org.freedesktop.locale1', 'VConsoleKeymap') arguments: Timeout was reached > >File "/usr/lib64/python2.7/site-packages/pyanaconda/threads.py", line 227, in run >threading.Thread.run(self, *args, **kwargs) > >File "/usr/lib64/python2.7/threading.py", line 766, in run >self.__target(*self.__args, **self.__kwargs) > >File "/usr/lib64/python2.7/site-packages/pyanaconda/install.py", line 70, in doConfiguration >ksdata.keyboard.execute(storage, ksdata, instClass) > >File "/usr/lib64/python2.7/site-packages/pyanaconda/kickstart.py", line 1560, in execute >keyboard.write_keyboard_config(self, ROOT_PATH) > >File "/usr/lib64/python2.7/site-packages/pyanaconda/keyboard.py", line 177, in write_keyboard_config >populate_missing_items(keyboard) > >File "/usr/lib64/python2.7/site-packages/pyanaconda/keyboard.py", line 159, in populate_missing_items >c_lay_var = localed.convert_keymap(keyboard.vc_keymap) > >File "/usr/lib64/python2.7/site-packages/pyanaconda/keyboard.py", line 813, in convert_keymap >orig_keymap = self.keymap > >File "/usr/lib64/python2.7/site-packages/pyanaconda/keyboard.py", line 707, in keymap >self._connection) > >File "/usr/lib64/python2.7/site-packages/pyanaconda/safe_dbus.py", line 134, in dbus_get_property_safe_sync >connection) > >File "/usr/lib64/python2.7/site-packages/pyanaconda/safe_dbus.py", line 98, in dbus_call_safe_sync >raise DBusCallError(msg) > >DBusCallError: Failed to call Get method on /org/freedesktop/locale1 with ('org.freedesktop.locale1', 'VConsoleKeymap') arguments: Timeout was reached >Mar 20 15:36:00 spectre su[20369]: pam_unix(su-l:session): session closed for user root
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1079035
:
877003
|
877004
|
877005
|
877006
| 877007 |
877008
|
877009
|
877010
|
877011
|
877012
|
877013
|
877014
|
877185