Summary: SELinux is preventing pam-console-com (consolekit_t) "search" pam_var_console_t. Detailed Description: SELinux denied access requested by pam-console-com. It is not expected that this access is required by pam-console-com and this access may signal an intrusion attempt. It is also possible that the specific version or configuration of the application is causing it to require additional access. Allowing Access: You can generate a local policy module to allow this access - see FAQ (http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385) Or you can disable SELinux protection altogether. Disabling SELinux protection is not recommended. Please file a bug report (http://bugzilla.redhat.com/bugzilla/enter_bug.cgi) against this package. Additional Information: Source Context system_u:system_r:consolekit_t:s0-s0:c0.c1023 Target Context system_u:object_r:pam_var_console_t:s0 Target Objects /var/run/console [ dir ] Source pam-console-com Source Path /bin/bash Port <Unknown> Host (removed) Source RPM Packages bash-4.0-8.fc11 Target RPM Packages pam-1.0.91-6.fc11 Policy RPM selinux-policy-3.6.12-85.fc11 Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Plugin Name catchall Host Name (removed) Platform Linux (removed) 2.6.30.8-64.fc11.i686.PAE #1 SMP Fri Sep 25 04:56:58 EDT 2009 i686 i686 Alert Count 3 First Seen Mon 19 Oct 2009 00:16:10 CEST Last Seen Mon 19 Oct 2009 07:23:05 CEST Local ID f3004b10-a337-4d28-b49c-616d5872e6ad Line Numbers Raw Audit Messages node=(removed) type=AVC msg=audit(1255929785.884:16): avc: denied { search } for pid=2290 comm="pam-console-com" name="console" dev=dm-0 ino=58312 scontext=system_u:system_r:consolekit_t:s0-s0:c0.c1023 tcontext=system_u:object_r:pam_var_console_t:s0 tclass=dir node=(removed) type=SYSCALL msg=audit(1255929785.884:16): arch=40000003 syscall=5 success=no exit=-13 a0=95c07e8 a1=8401 a2=0 a3=ffffffff items=0 ppid=1463 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="pam-console-com" exe="/bin/bash" subj=system_u:system_r:consolekit_t:s0-s0:c0.c1023 key=(null) Hash String generated from selinux-policy-3.6.12-85.fc11,catchall,pam-console-com,consolekit_t,pam_var_console_t,dir,search audit2allow suggests: #============= consolekit_t ============== allow consolekit_t pam_var_console_t:dir search;
*** This bug has been marked as a duplicate of bug 538428 ***