strace and other tools seem to be failing since I began running my user as staff_u. Looking for ptrace privileges I see this: [cdahlin@fearengine linus-tree ((v2.6.21))]$ sesearch -A -s staff_t -p ptrace -C Found 7 semantic av rules: EF allow staff_t mock_t : process ptrace ; [ deny_ptrace ] EF allow staff_usertype git_session_t : process ptrace ; [ deny_ptrace ] EF allow staff_t crontab_t : process ptrace ; [ deny_ptrace ] EF allow staff_t polipo_session_t : process ptrace ; [ deny_ptrace ] EF allow staff_usertype staff_usertype : process ptrace ; [ deny_ptrace ] EF allow staff_t bluetooth_helper_t : process ptrace ; [ deny_ptrace ] EF allow staff_usertype staff_dbusd_t : process ptrace ; [ deny_ptrace ] Another Fedora user has told me that he has an 8th rule: allow staff_usertype staff_usertype : process ptrace ; I've not made any manual policy changes that I can recall, though this box has been preupgraded between several releases.
Hmm, the rule I thought was missing is in there on second scan. I'll reverify the symptom itself. I definitely couldn't seem to run strace as staff_u
If you want to make this working, you need to turn off "deny_ptrace" boolean.
[cdahlin@fearengine ~]$ sudo semanage boolean -l |grep ptrace deny_ptrace (off , off) Allow sysadm to debug or ptrace all processes.
On further investigation, this seems only to affect irssi, which also refuses to run. No audit message is generated, but switching to unconfined_t fixes the problem. [cdahlin@fearengine linus-tree (master)]$ irssi ** (irssi:22765): ERROR **: Couldn't create /home/rdu/cdahlin/.irssi directory Trace/breakpoint trap [cdahlin@fearengine linus-tree (master)]$ strace irssi execve("/usr/bin/irssi", ["irssi"], [/* 57 vars */]) = -1 EPERM (Operation not permitted) write(2, "strace: exec: Operation not perm"..., 38strace: exec: Operation not permitted ) = 38 exit_group(1) = ? +++ exited with 1 +++ [cdahlin@fearengine linus-tree (master)]$ ls -lZ `which irssi` -rwxr-xr-x. root root system_u:object_r:irssi_exec_t:s0 /usr/bin/irssi [cdahlin@fearengine linus-tree (master)]$ sudo audit2allow -laR [sudo] password for cdahlin: require { type ypbind_t; } #============= ypbind_t ============== files_read_etc_runtime_files(ypbind_t)
So the error here is that staff_t is not able to ptrace irssi_t. You need to run restorecon -R -v /home/ To fix the label of ~/.irssi What file is ypbind_t trying to read?
Now irssi runs but spouts this when trying to connect: 01:27 [redhat] -!- Irssi: Unable to connect server memochan.usersys.redhat.com port 6697 [Permission denied] As for ypbind: [cdahlin@fearengine ~]$ ls -lZ /etc/yp.conf -rw-r--r--. root root system_u:object_r:net_conf_t:s0 /etc/yp.conf [cdahlin@fearengine ~]$ sudo cat /var/log/audit/audit.log |grep AVC |tail type=AVC msg=audit(1323811720.314:26): avc: denied { read } for pid=1145 comm="ypbind" name="yp.conf" dev=dm-0 ino=595 scontext=system_u:system_r:ypbind_t:s0 tcontext=system_u:object_r:etc_runtime_t:s0 tclass=file Not sure how long that AVC has been sitting there. Could be stale. Restarting ypbind seems to clear it. Why wasn't the irssi issue generating AVCs? I'd tried disabling dontaudit rules and it was still quiet (not to mention why wouldn't we be auditing unauthorized uses of ptrace?)
Hmm. Looks like irssi can connect now. Can't write log files to my ~/irclogs folder anymore though. I think that's an app default since I can't seem to find it in my configs, but I can at least see why the labeling would prevent it. Relabeling temporarily until I can decide if I want a policy module for it.
At home, screen is the weird app. [sadmac@foucault ~]$ screen [screen is terminating] I can't figure out how to get anything else out of it. Again, no AVCs but works in unconfined_t or with setenforce off.
semodule -DB Will turn off dontaudit rules to get all AVC messages. semodule -B Will turn it back on. I added 6697 as an ircd_port_t in F18, which will allow this access. I also added labelling to ~/irclogs as irc_home_t. The screen problem is a different issue. Thanks for testing.
Created attachment 915495 [details] Comment (This comment was longer than 65,535 characters and has been moved to an attachment by Red Hat Bugzilla).
Wow, that was long. Here's a snipped version: [sadmac@foucault ~]$ sudo audit2allow -laR <Bunch of errors, no AVCs> [sadmac@foucault ~]$ sudo semodule -DB [sadmac@foucault ~]$ screen [screen is terminating] [sadmac@foucault ~]$ sudo audit2allow -laR <Bunch of errors, no AVCs> [sadmac@foucault ~]$ sudo setenforce 0 [sadmac@foucault ~]$ screen <screen runs>
It looks like you have a lot of avc's about unconfined_execmem_t which no longer exists. I think your machine might be mislabeled. I would attempt touch /.autorelabel; reboot
I relabeled. Things persist as they did before.
Could you try to reinstall selinux-policy-targeted # yum reinstall selinux-policy-targeted # grep invalid /var/log/messages
None of this looks particularly relevant: [sadmac@foucault ~]$ sudo grep invalid /var/log/messages Sep 23 19:04:54 foucault udevd[413]: invalid rule '/etc/udev/rules.d/85-pcscd_egate.rules:3' Sep 23 19:04:54 foucault udevd[413]: invalid rule '/etc/udev/rules.d/85-pcscd_egate.rules:5' Sep 23 19:04:55 foucault udevd[413]: invalid rule '/etc/udev/rules.d/85-pcscd_egate.rules:3' Sep 23 19:04:55 foucault udevd[413]: invalid rule '/etc/udev/rules.d/85-pcscd_egate.rules:5' Sep 25 03:35:11 foucault udevd[413]: invalid rule '/etc/udev/rules.d/85-pcscd_egate.rules:3' Sep 25 03:35:11 foucault udevd[413]: invalid rule '/etc/udev/rules.d/85-pcscd_egate.rules:5' Sep 25 09:25:48 foucault udevd[413]: invalid rule '/etc/udev/rules.d/85-pcscd_egate.rules:3' Sep 25 09:25:48 foucault udevd[413]: invalid rule '/etc/udev/rules.d/85-pcscd_egate.rules:5' Sep 26 20:02:27 foucault udevd[410]: invalid rule '/etc/udev/rules.d/85-pcscd_egate.rules:3' Sep 26 20:02:27 foucault udevd[410]: invalid rule '/etc/udev/rules.d/85-pcscd_egate.rules:5' Sep 26 20:02:27 foucault kernel: [ 10.457364] ALSA sound/usb/stream.c:200 6:1:1 : no or invalid class specific endpoint descriptor Sep 26 20:02:27 foucault kernel: [ 10.458389] ALSA sound/usb/stream.c:200 6:2:1 : no or invalid class specific endpoint descriptor Sep 27 10:55:07 foucault udevd[402]: invalid rule '/etc/udev/rules.d/85-pcscd_egate.rules:3' Sep 27 10:55:07 foucault udevd[402]: invalid rule '/etc/udev/rules.d/85-pcscd_egate.rules:5' Sep 27 10:55:07 foucault kernel: [ 11.073112] ALSA sound/usb/stream.c:200 6:1:1 : no or invalid class specific endpoint descriptor Sep 27 10:55:07 foucault kernel: [ 11.074262] ALSA sound/usb/stream.c:200 6:2:1 : no or invalid class specific endpoint descriptor
Are you still getting this?
Tested again just now: [sadmac@foucault ~]$ screen [screen is terminating] [sadmac@foucault ~]$ strace screen execve("/usr/bin/screen", ["screen"], [/* 36 vars */]) = -1 EPERM (Operation not permitted) write(2, "strace: exec: Operation not perm"..., 38strace: exec: Operation not permitted ) = 38 exit_group(1) = ? +++ exited with 1 +++ [sadmac@foucault ~]$ id -Z staff_u:staff_r:staff_t:s0-s0:c0.c1023
What AVC did you get?
None. Logs are empty. But, setenforce 0 causes things to start working.
3a4c7f6c870ab812b290e98f168a745f18a10264 fixes this for F18.
commit 797c3a313b67114ddd85a5688782b0646b4fcf91 Author: Miroslav Grepl <mgrepl> Date: Thu Dec 20 22:48:35 2012 +0100 Allow confine users to ptrace screen
selinux-policy-3.10.0-166.fc17 has been submitted as an update for Fedora 17. https://admin.fedoraproject.org/updates/FEDORA-2012-20544/selinux-policy-3.10.0-166.fc17
Package selinux-policy-3.10.0-166.fc17: * should fix your issue, * was pushed to the Fedora 17 testing repository, * should be available at your local mirror within two days. Update it with: # su -c 'yum update --enablerepo=updates-testing selinux-policy-3.10.0-166.fc17' as soon as you are able to. Please go to the following url: https://admin.fedoraproject.org/updates/FEDORA-2012-20544/selinux-policy-3.10.0-166.fc17 then log in and leave karma (feedback).
Fixes the central issue. Screen still isn't working, but I can trace it now.
Does screen work in permissive mode?
It works with setenforce 0. I'll try permissive mode if you think that'll make a difference. strace seems to be pointing to trouble running /usr/libexec/pt_chown
Yes it works in permissive mode. Tested with echo 0 > /sys/fs/selinux/enforce
If you are not getting AVC's could you try with # semodule -DB Run screen tests in permissive mode # semodule -B # ausearch -m avc -ts recent
selinux-policy-3.10.0-166.fc17 has been pushed to the Fedora 17 stable repository. If problems still persist, please make note of it in this bug report.
Reopening for the screen issue. If you want to move to a new bug that's ok too.
[sadmac@foucault ~]$ sudo semodule -DB [sudo] password for sadmac: [sadmac@foucault ~]$ sudo su - [root@foucault ~]# echo 0 > /sys/fs/selinux/enforce [root@foucault ~]# exit logout [sadmac@foucault ~]$ screen [screen is terminating] <<<<<<<<<<<<< Screen ran correctly here [sadmac@foucault ~]$ sudo semodule -B [sudo] password for sadmac: [sadmac@foucault ~]$ sudo ausearch -m avc -ts recent <no matches> [sadmac@foucault ~]$ sudo su - [root@foucault ~]# echo 1 > /sys/fs/selinux/enforce [root@foucault ~]# exit logout [sadmac@foucault ~]$ screen [screen is terminating] <<<<<<<<<<<<< Screen did not run correctly here [sadmac@foucault ~]$ sudo ausearch -m avc -ts recent [sudo] password for sadmac: <no matches> [sadmac@foucault ~]$
Looks like audit is not running on your machine? systemctl start auditd As root what does id show? id -Z
[sadmac@foucault ~]$ id -Z staff_u:staff_r:staff_t:s0-s0:c0.c1023 [sadmac@foucault ~]$ sudo id -Z [sudo] password for sadmac: staff_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 Turned on auditd. Ran the test again: [sadmac@foucault ~]$ sudo semodule -DB [sadmac@foucault ~]$ sudo su - [root@foucault ~]# echo 0 > /sys/fs/selinux/enforce [root@foucault ~]# exit logout [sadmac@foucault ~]$ screen [screen is terminating] # Ran correctly [sadmac@foucault ~]$ sudo semodule -B [sudo] password for sadmac: [sadmac@foucault ~]$ sudo ausearch -m avc -ts recent ---- time->Tue Jan 8 10:45:22 2013 type=SYSCALL msg=audit(1357659922.645:6405): arch=c000003e syscall=47 success=yes exit=15 a0=3 a1=7fff91f783a0 a2=40000000 a3=4000 items=0 ppid=7639 pid=7861 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts7 ses=1722 comm="sudo" exe="/usr/bin/sudo" subj=staff_u:staff_r:staff_sudo_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1357659922.645:6405): avc: denied { read } for pid=7861 comm="sudo" path="/var/db/nscd/passwd" dev="dm-0" ino=371 scontext=staff_u:staff_r:staff_sudo_t:s0-s0:c0.c1023 tcontext=system_u:object_r:nscd_var_run_t:s0 tclass=file ---- time->Tue Jan 8 10:45:22 2013 type=SYSCALL msg=audit(1357659922.642:6404): arch=c000003e syscall=59 success=yes exit=0 a0=118d640 a1=10f43e0 a2=1189b10 a3=20 items=0 ppid=7639 pid=7861 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts7 ses=1722 comm="sudo" exe="/usr/bin/sudo" subj=staff_u:staff_r:staff_sudo_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1357659922.642:6404): avc: denied { noatsecure } for pid=7861 comm="sudo" scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=staff_u:staff_r:staff_sudo_t:s0-s0:c0.c1023 tclass=process type=AVC msg=audit(1357659922.642:6404): avc: denied { siginh } for pid=7861 comm="sudo" scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=staff_u:staff_r:staff_sudo_t:s0-s0:c0.c1023 tclass=process type=AVC msg=audit(1357659922.642:6404): avc: denied { rlimitinh } for pid=7861 comm="sudo" scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=staff_u:staff_r:staff_sudo_t:s0-s0:c0.c1023 tclass=process ---- time->Tue Jan 8 10:45:22 2013 type=SYSCALL msg=audit(1357659922.648:6406): arch=c000003e syscall=47 success=yes exit=14 a0=5 a1=7fff91f79200 a2=40000000 a3=4000 items=0 ppid=7639 pid=7861 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts7 ses=1722 comm="sudo" exe="/usr/bin/sudo" subj=staff_u:staff_r:staff_sudo_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1357659922.648:6406): avc: denied { read } for pid=7861 comm="sudo" path="/var/db/nscd/group" dev="dm-0" ino=968 scontext=staff_u:staff_r:staff_sudo_t:s0-s0:c0.c1023 tcontext=system_u:object_r:nscd_var_run_t:s0 tclass=file ---- time->Tue Jan 8 10:45:22 2013 type=SYSCALL msg=audit(1357659922.650:6407): arch=c000003e syscall=59 success=yes exit=0 a0=189a9a0 a1=189a8c0 a2=189a010 a3=1 items=0 ppid=7862 pid=7863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="setroubleshootd" exe="/usr/bin/python2.7" subj=system_u:system_r:setroubleshootd_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1357659922.650:6407): avc: denied { noatsecure } for pid=7863 comm="setroubleshootd" scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:system_r:setroubleshootd_t:s0-s0:c0.c1023 tclass=process type=AVC msg=audit(1357659922.650:6407): avc: denied { siginh } for pid=7863 comm="setroubleshootd" scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:system_r:setroubleshootd_t:s0-s0:c0.c1023 tclass=process type=AVC msg=audit(1357659922.650:6407): avc: denied { rlimitinh } for pid=7863 comm="setroubleshootd" scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:system_r:setroubleshootd_t:s0-s0:c0.c1023 tclass=process ---- time->Tue Jan 8 10:45:22 2013 type=SYSCALL msg=audit(1357659922.864:6412): arch=c000003e syscall=59 success=yes exit=0 a0=7f73a9a06a33 a1=7f73aaf83950 a2=7f73aaf8a3e0 a3=20 items=0 ppid=7861 pid=7864 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 ses=1722 comm="sesh" exe="/usr/libexec/sesh" subj=staff_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1357659922.864:6412): avc: denied { noatsecure } for pid=7864 comm="sesh" scontext=staff_u:staff_r:staff_sudo_t:s0-s0:c0.c1023 tcontext=staff_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tclass=process type=AVC msg=audit(1357659922.864:6412): avc: denied { siginh } for pid=7864 comm="sesh" scontext=staff_u:staff_r:staff_sudo_t:s0-s0:c0.c1023 tcontext=staff_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tclass=process type=AVC msg=audit(1357659922.864:6412): avc: denied { rlimitinh } for pid=7864 comm="sesh" scontext=staff_u:staff_r:staff_sudo_t:s0-s0:c0.c1023 tcontext=staff_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tclass=process ---- time->Tue Jan 8 10:45:22 2013 type=SYSCALL msg=audit(1357659922.938:6413): arch=c000003e syscall=47 success=yes exit=15 a0=4 a1=7fffefe33170 a2=40000000 a3=4000 items=0 ppid=7862 pid=7863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="setroubleshootd" exe="/usr/bin/python2.7" subj=system_u:system_r:setroubleshootd_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1357659922.938:6413): avc: denied { read } for pid=7863 comm="setroubleshootd" path="/var/db/nscd/passwd" dev="dm-0" ino=371 scontext=system_u:system_r:setroubleshootd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:nscd_var_run_t:s0 tclass=file ---- time->Tue Jan 8 10:45:24 2013 type=SYSCALL msg=audit(1357659924.122:6418): arch=c000003e syscall=47 success=yes exit=14 a0=9 a1=7fffefe23260 a2=40000000 a3=4000 items=0 ppid=7862 pid=7863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="setroubleshootd" exe="/usr/bin/python2.7" subj=system_u:system_r:setroubleshootd_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1357659924.122:6418): avc: denied { read } for pid=7863 comm="setroubleshootd" path="/var/db/nscd/hosts" dev="dm-0" ino=1088 scontext=system_u:system_r:setroubleshootd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:nscd_var_run_t:s0 tclass=file ---- time->Tue Jan 8 10:45:24 2013 type=SYSCALL msg=audit(1357659924.523:6419): arch=c000003e syscall=2 success=no exit=-13 a0=24c1b60 a1=2 a2=0 a3=16 items=0 ppid=7862 pid=7863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="setroubleshootd" exe="/usr/bin/python2.7" subj=system_u:system_r:setroubleshootd_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1357659924.523:6419): avc: denied { write } for pid=7863 comm="setroubleshootd" name="__db.001" dev="dm-0" ino=1154 scontext=system_u:system_r:setroubleshootd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:rpm_var_lib_t:s0 tclass=file ---- time->Tue Jan 8 10:45:25 2013 type=SYSCALL msg=audit(1357659925.562:6420): arch=c000003e syscall=47 success=yes exit=14 a0=3 a1=7fffefe37360 a2=40000000 a3=4000 items=0 ppid=1 pid=7863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="setroubleshootd" exe="/usr/bin/python2.7" subj=system_u:system_r:setroubleshootd_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1357659925.562:6420): avc: denied { read } for pid=7863 comm="setroubleshootd" path="/var/db/nscd/group" dev="dm-0" ino=968 scontext=system_u:system_r:setroubleshootd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:nscd_var_run_t:s0 tclass=file ---- time->Tue Jan 8 10:45:40 2013 type=SYSCALL msg=audit(1357659940.891:6427): arch=c000003e syscall=47 success=yes exit=15 a0=3 a1=7fffc5185020 a2=40000000 a3=4000 items=0 ppid=7639 pid=7892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=84 sgid=84 fsgid=84 tty=pts7 ses=1722 comm="screen" exe="/usr/bin/screen" subj=staff_u:staff_r:staff_screen_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1357659940.891:6427): avc: denied { read } for pid=7892 comm="screen" path="/var/db/nscd/passwd" dev="dm-0" ino=371 scontext=staff_u:staff_r:staff_screen_t:s0-s0:c0.c1023 tcontext=system_u:object_r:nscd_var_run_t:s0 tclass=file ---- time->Tue Jan 8 10:45:40 2013 type=SYSCALL msg=audit(1357659940.887:6426): arch=c000003e syscall=59 success=yes exit=0 a0=117a6f0 a1=118d1a0 a2=1189b10 a3=10 items=0 ppid=7639 pid=7892 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=84 sgid=84 fsgid=84 tty=pts7 ses=1722 comm="screen" exe="/usr/bin/screen" subj=staff_u:staff_r:staff_screen_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1357659940.887:6426): avc: denied { noatsecure } for pid=7892 comm="screen" scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=staff_u:staff_r:staff_screen_t:s0-s0:c0.c1023 tclass=process type=AVC msg=audit(1357659940.887:6426): avc: denied { siginh } for pid=7892 comm="screen" scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=staff_u:staff_r:staff_screen_t:s0-s0:c0.c1023 tclass=process type=AVC msg=audit(1357659940.887:6426): avc: denied { rlimitinh } for pid=7892 comm="screen" scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=staff_u:staff_r:staff_screen_t:s0-s0:c0.c1023 tclass=process ---- time->Tue Jan 8 10:45:40 2013 type=SYSCALL msg=audit(1357659940.894:6428): arch=c000003e syscall=160 success=yes exit=0 a0=4 a1=7fffc5183c60 a2=3f501b2b80 a3=7fdf8709ba10 items=0 ppid=7893 pid=7894 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=84 sgid=84 fsgid=84 tty=(none) ses=1722 comm="screen" exe="/usr/bin/screen" subj=staff_u:staff_r:staff_screen_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1357659940.894:6428): avc: denied { setrlimit } for pid=7894 comm="screen" scontext=staff_u:staff_r:staff_screen_t:s0-s0:c0.c1023 tcontext=staff_u:staff_r:staff_screen_t:s0-s0:c0.c1023 tclass=process ---- time->Tue Jan 8 10:45:40 2013 type=SYSCALL msg=audit(1357659940.895:6429): arch=c000003e syscall=59 success=yes exit=0 a0=3f4ff77c8e a1=7fffc51817b0 a2=0 a3=6 items=0 ppid=7893 pid=7894 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=84 sgid=84 fsgid=84 tty=(none) ses=1722 comm="pt_chown" exe="/usr/libexec/pt_chown" subj=staff_u:staff_r:staff_screen_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1357659940.895:6429): avc: denied { execute_no_trans } for pid=7894 comm="screen" path="/usr/libexec/pt_chown" dev="dm-0" ino=4596 scontext=staff_u:staff_r:staff_screen_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ptchown_exec_t:s0 tclass=file type=AVC msg=audit(1357659940.895:6429): avc: denied { read open } for pid=7894 comm="screen" path="/usr/libexec/pt_chown" dev="dm-0" ino=4596 scontext=staff_u:staff_r:staff_screen_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ptchown_exec_t:s0 tclass=file type=AVC msg=audit(1357659940.895:6429): avc: denied { execute } for pid=7894 comm="screen" name="pt_chown" dev="dm-0" ino=4596 scontext=staff_u:staff_r:staff_screen_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ptchown_exec_t:s0 tclass=file ---- time->Tue Jan 8 10:45:40 2013 type=SYSCALL msg=audit(1357659940.914:6430): arch=c000003e syscall=92 success=yes exit=0 a0=7f11aa5d2c80 a1=1f4 a2=5 a3=7f11aa995656 items=0 ppid=7893 pid=7894 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=84 sgid=84 fsgid=84 tty=(none) ses=1722 comm="pt_chown" exe="/usr/libexec/pt_chown" subj=staff_u:staff_r:staff_screen_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1357659940.914:6430): avc: denied { chown } for pid=7894 comm="pt_chown" capability=0 scontext=staff_u:staff_r:staff_screen_t:s0-s0:c0.c1023 tcontext=staff_u:staff_r:staff_screen_t:s0-s0:c0.c1023 tclass=capability ---- time->Tue Jan 8 10:45:40 2013 type=SYSCALL msg=audit(1357659940.916:6431): arch=c000003e syscall=59 success=yes exit=0 a0=1bfa1f0 a1=66f210 a2=1c0ab80 a3=6c616e696d726574 items=0 ppid=7893 pid=7895 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 ses=1722 comm="bash" exe="/usr/bin/bash" subj=staff_u:staff_r:staff_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1357659940.916:6431): avc: denied { noatsecure } for pid=7895 comm="bash" scontext=staff_u:staff_r:staff_screen_t:s0-s0:c0.c1023 tcontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tclass=process type=AVC msg=audit(1357659940.916:6431): avc: denied { siginh } for pid=7895 comm="bash" scontext=staff_u:staff_r:staff_screen_t:s0-s0:c0.c1023 tcontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tclass=process type=AVC msg=audit(1357659940.916:6431): avc: denied { rlimitinh } for pid=7895 comm="bash" scontext=staff_u:staff_r:staff_screen_t:s0-s0:c0.c1023 tcontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tclass=process ---- time->Tue Jan 8 10:45:40 2013 type=SYSCALL msg=audit(1357659940.918:6432): arch=c000003e syscall=47 success=yes exit=15 a0=3 a1=7fffc8229aa0 a2=40000000 a3=4000 items=0 ppid=7893 pid=7895 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=pts8 ses=1722 comm="bash" exe="/usr/bin/bash" subj=staff_u:staff_r:staff_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1357659940.918:6432): avc: denied { read } for pid=7895 comm="bash" path="/var/db/nscd/passwd" dev="dm-0" ino=371 scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=system_u:object_r:nscd_var_run_t:s0 tclass=file ---- time->Tue Jan 8 10:45:40 2013 type=SYSCALL msg=audit(1357659940.915:6433): arch=c000003e syscall=59 success=yes exit=0 a0=3f50200cf8 a1=7fffc5184b20 a2=7fffc5186658 a3=7fdf8709ba10 items=0 ppid=7893 pid=7896 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=22 sgid=22 fsgid=22 tty=(none) ses=1722 comm="utempter" exe="/usr/libexec/utempter/utempter" subj=staff_u:staff_r:staff_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1357659940.915:6433): avc: denied { read write } for pid=7896 comm="utempter" path="socket:[309528677]" dev="sockfs" ino=309528677 scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=staff_u:staff_r:staff_screen_t:s0-s0:c0.c1023 tclass=unix_stream_socket ---- time->Tue Jan 8 10:45:40 2013 type=SYSCALL msg=audit(1357659940.935:6434): arch=c000003e syscall=2 success=yes exit=7 a0=3f4ff77c62 a1=80002 a2=3f4ff77c62 a3=d items=0 ppid=7893 pid=7896 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=22 sgid=22 fsgid=22 tty=(none) ses=1722 comm="utempter" exe="/usr/libexec/utempter/utempter" subj=staff_u:staff_r:staff_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1357659940.935:6434): avc: denied { write } for pid=7896 comm="utempter" name="utmp" dev="tmpfs" ino=12747 scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file ---- time->Tue Jan 8 10:45:40 2013 type=SYSCALL msg=audit(1357659940.935:6435): arch=c000003e syscall=2 success=yes exit=6 a0=400c96 a1=1 a2=2 a3=8 items=0 ppid=7893 pid=7896 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=22 sgid=22 fsgid=22 tty=(none) ses=1722 comm="utempter" exe="/usr/libexec/utempter/utempter" subj=staff_u:staff_r:staff_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1357659940.935:6435): avc: denied { write } for pid=7896 comm="utempter" name="wtmp" dev="dm-0" ino=18404 scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=system_u:object_r:wtmp_t:s0 tclass=file ---- time->Tue Jan 8 10:45:40 2013 type=SYSCALL msg=audit(1357659940.966:6436): arch=c000003e syscall=47 success=yes exit=15 a0=3 a1=7fff645d1980 a2=40000000 a3=4000 items=0 ppid=7863 pid=7915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="sh" exe="/usr/bin/bash" subj=system_u:system_r:setroubleshootd_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1357659940.966:6436): avc: denied { read } for pid=7915 comm="sh" path="/var/db/nscd/passwd" dev="dm-0" ino=371 scontext=system_u:system_r:setroubleshootd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:nscd_var_run_t:s0 tclass=file ---- time->Tue Jan 8 10:45:44 2013 type=SYSCALL msg=audit(1357659944.098:6438): arch=c000003e syscall=2 success=yes exit=6 a0=400c96 a1=1 a2=2 a3=8 items=0 ppid=7893 pid=7933 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=22 sgid=22 fsgid=22 tty=(none) ses=1722 comm="utempter" exe="/usr/libexec/utempter/utempter" subj=staff_u:staff_r:staff_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1357659944.098:6438): avc: denied { write } for pid=7933 comm="utempter" name="wtmp" dev="dm-0" ino=18404 scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=system_u:object_r:wtmp_t:s0 tclass=file ---- time->Tue Jan 8 10:45:44 2013 type=SYSCALL msg=audit(1357659944.098:6437): arch=c000003e syscall=2 success=yes exit=7 a0=3f4ff77c62 a1=80002 a2=3f4ff77c62 a3=d items=0 ppid=7893 pid=7933 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=22 sgid=22 fsgid=22 tty=(none) ses=1722 comm="utempter" exe="/usr/libexec/utempter/utempter" subj=staff_u:staff_r:staff_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1357659944.098:6437): avc: denied { write } for pid=7933 comm="utempter" name="utmp" dev="tmpfs" ino=12747 scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file ---- time->Tue Jan 8 10:46:34 2013 type=SYSCALL msg=audit(1357659994.468:6440): arch=c000003e syscall=47 success=yes exit=15 a0=3 a1=7fffb1919520 a2=40000000 a3=4000 items=0 ppid=7639 pid=7945 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts7 ses=1722 comm="sudo" exe="/usr/bin/sudo" subj=staff_u:staff_r:staff_sudo_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1357659994.468:6440): avc: denied { read } for pid=7945 comm="sudo" path="/var/db/nscd/passwd" dev="dm-0" ino=371 scontext=staff_u:staff_r:staff_sudo_t:s0-s0:c0.c1023 tcontext=system_u:object_r:nscd_var_run_t:s0 tclass=file ---- time->Tue Jan 8 10:46:34 2013 type=SYSCALL msg=audit(1357659994.466:6439): arch=c000003e syscall=59 success=yes exit=0 a0=10f83c0 a1=10ed3f0 a2=1189b10 a3=20 items=0 ppid=7639 pid=7945 auid=500 uid=500 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts7 ses=1722 comm="sudo" exe="/usr/bin/sudo" subj=staff_u:staff_r:staff_sudo_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1357659994.466:6439): avc: denied { noatsecure } for pid=7945 comm="sudo" scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=staff_u:staff_r:staff_sudo_t:s0-s0:c0.c1023 tclass=process type=AVC msg=audit(1357659994.466:6439): avc: denied { siginh } for pid=7945 comm="sudo" scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=staff_u:staff_r:staff_sudo_t:s0-s0:c0.c1023 tclass=process type=AVC msg=audit(1357659994.466:6439): avc: denied { rlimitinh } for pid=7945 comm="sudo" scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=staff_u:staff_r:staff_sudo_t:s0-s0:c0.c1023 tclass=process ---- time->Tue Jan 8 10:46:34 2013 type=SYSCALL msg=audit(1357659994.483:6441): arch=c000003e syscall=59 success=yes exit=0 a0=1d85870 a1=1d85800 a2=1d85010 a3=15 items=0 ppid=7946 pid=7947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="fprintd" exe="/usr/libexec/fprintd" subj=system_u:system_r:fprintd_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1357659994.483:6441): avc: denied { noatsecure } for pid=7947 comm="fprintd" scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:system_r:fprintd_t:s0-s0:c0.c1023 tclass=process type=AVC msg=audit(1357659994.483:6441): avc: denied { siginh } for pid=7947 comm="fprintd" scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:system_r:fprintd_t:s0-s0:c0.c1023 tclass=process type=AVC msg=audit(1357659994.483:6441): avc: denied { rlimitinh } for pid=7947 comm="fprintd" scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:system_r:fprintd_t:s0-s0:c0.c1023 tclass=process ---- time->Tue Jan 8 10:46:34 2013 type=SYSCALL msg=audit(1357659994.496:6442): arch=c000003e syscall=59 success=yes exit=0 a0=7f2a99b9bc78 a1=7fffb191a210 a2=7f2a99da2368 a3=7 items=0 ppid=7945 pid=7948 auid=500 uid=0 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts7 ses=1722 comm="unix_chkpwd" exe="/usr/sbin/unix_chkpwd" subj=staff_u:staff_r:chkpwd_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1357659994.496:6442): avc: denied { noatsecure } for pid=7948 comm="unix_chkpwd" scontext=staff_u:staff_r:staff_sudo_t:s0-s0:c0.c1023 tcontext=staff_u:staff_r:chkpwd_t:s0-s0:c0.c1023 tclass=process type=AVC msg=audit(1357659994.496:6442): avc: denied { siginh } for pid=7948 comm="unix_chkpwd" scontext=staff_u:staff_r:staff_sudo_t:s0-s0:c0.c1023 tcontext=staff_u:staff_r:chkpwd_t:s0-s0:c0.c1023 tclass=process type=AVC msg=audit(1357659994.496:6442): avc: denied { rlimitinh } for pid=7948 comm="unix_chkpwd" scontext=staff_u:staff_r:staff_sudo_t:s0-s0:c0.c1023 tcontext=staff_u:staff_r:chkpwd_t:s0-s0:c0.c1023 tclass=process type=AVC msg=audit(1357659994.496:6442): avc: denied { read write } for pid=7948 comm="unix_chkpwd" path="/dev/pts/7" dev="devpts" ino=10 scontext=staff_u:staff_r:chkpwd_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:user_devpts_t:s0 tclass=chr_file ---- time->Tue Jan 8 10:46:34 2013 type=SYSCALL msg=audit(1357659994.513:6443): arch=c000003e syscall=47 success=yes exit=15 a0=3 a1=7fff849853a0 a2=40000000 a3=4000 items=0 ppid=7945 pid=7948 auid=500 uid=0 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts7 ses=1722 comm="unix_chkpwd" exe="/usr/sbin/unix_chkpwd" subj=staff_u:staff_r:chkpwd_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1357659994.513:6443): avc: denied { read } for pid=7948 comm="unix_chkpwd" path="/var/db/nscd/passwd" dev="dm-0" ino=371 scontext=staff_u:staff_r:chkpwd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:nscd_var_run_t:s0 tclass=file ---- time->Tue Jan 8 10:46:42 2013 type=SYSCALL msg=audit(1357660002.722:6445): arch=c000003e syscall=59 success=yes exit=0 a0=7f2a99b9bc78 a1=7fffb191a1a0 a2=7f2a99da2368 a3=7 items=0 ppid=7945 pid=7957 auid=500 uid=0 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=pts7 ses=1722 comm="unix_chkpwd" exe="/usr/sbin/unix_chkpwd" subj=staff_u:staff_r:chkpwd_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1357660002.722:6445): avc: denied { read write } for pid=7957 comm="unix_chkpwd" path="/dev/pts/7" dev="devpts" ino=10 scontext=staff_u:staff_r:chkpwd_t:s0-s0:c0.c1023 tcontext=staff_u:object_r:user_devpts_t:s0 tclass=chr_file ---- time->Tue Jan 8 10:46:42 2013 type=SYSCALL msg=audit(1357660002.743:6452): arch=c000003e syscall=59 success=yes exit=0 a0=7f2aa533ba33 a1=7f2aa5c09b80 a2=7f2aa5bed440 a3=20 items=0 ppid=7945 pid=7959 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts7 ses=1722 comm="sesh" exe="/usr/libexec/sesh" subj=staff_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1357660002.743:6452): avc: denied { noatsecure } for pid=7959 comm="sesh" scontext=staff_u:staff_r:staff_sudo_t:s0-s0:c0.c1023 tcontext=staff_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tclass=process type=AVC msg=audit(1357660002.743:6452): avc: denied { siginh } for pid=7959 comm="sesh" scontext=staff_u:staff_r:staff_sudo_t:s0-s0:c0.c1023 tcontext=staff_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tclass=process type=AVC msg=audit(1357660002.743:6452): avc: denied { rlimitinh } for pid=7959 comm="sesh" scontext=staff_u:staff_r:staff_sudo_t:s0-s0:c0.c1023 tcontext=staff_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tclass=process
This message is a reminder that Fedora 17 is nearing its end of life. Approximately 4 (four) weeks from now Fedora will stop maintaining and issuing updates for Fedora 17. It is Fedora's policy to close all bug reports from releases that are no longer maintained. At that time this bug will be closed as WONTFIX if it remains open with a Fedora 'version' of '17'. Package Maintainer: If you wish for this bug to remain open because you plan to fix it in a currently maintained version, simply change the 'version' to a later Fedora version prior to Fedora 17's end of life. Bug Reporter: Thank you for reporting this issue and we are sorry that we may not be able to fix it before Fedora 17 is end of life. If you would still like to see this bug fixed and are able to reproduce it against a later version of Fedora, you are encouraged change the 'version' to a later Fedora version prior to Fedora 17's end of life. Although we aim to fix as many bugs as possible during every release's lifetime, sometimes those efforts are overtaken by events. Often a more recent Fedora release includes newer upstream software that fixes bugs or makes them obsolete.
We have a lot of fixes in F18+. Closing this bug as NEXTRELEASE. Please re-open if you see this also on newer releases. Thank you.