On 5/4/06, Gene Heskett <gene.heskett@xxxxxxxxxxx> wrote:
Greetings; These do not appear to be effecting gdm, but they are startling when the screen fills with them just before its cleared and the init=3 login is presented. ======================= May 4 02:49:10 diablo kernel: audit(1146728943.423:302): avc: denied { read } for pid=2195 comm="gpm" name="localtime" dev=hda5 ino=1289803 0 scontext=system_u:system_r:gpm_t:s0 tcontext=root:object_r:etc_t:s0 tclass=file May 4 02:49:10 diablo kernel: audit(1146728943.423:303): avc: denied { read } for pid=2195 comm="gpm" name="localtime" dev=hda5 ino=1289803 0 scontext=system_u:system_r:gpm_t:s0 tcontext=root:object_r:etc_t:s0 tclass=file May 4 02:49:10 diablo kernel: audit(1146728943.423:304): avc: denied { read } for pid=2195 comm="gpm" name="localtime" dev=hda5 ino=1289803 0 scontext=system_u:system_r:gpm_t:s0 tcontext=root:object_r:etc_t:s0 tclass=file May 4 02:49:10 diablo kernel: audit(1146728943.423:305): avc: denied { read } for pid=2195 comm="gpm" name="localtime" dev=hda5 ino=1289803 0 scontext=system_u:system_r:gpm_t:s0 tcontext=root:object_r:etc_t:s0 tclass=file May 4 02:49:10 diablo kernel: audit(1146728943.439:306): avc: denied { read } for pid=2195 comm="gpm" name="localtime" dev=hda5 ino=1289803 0 scontext=system_u:system_r:gpm_t:s0 tcontext=root:object_r:etc_t:s0 tclass=file May 4 02:49:10 diablo kernel: audit(1146728943.443:307): avc: denied { read } for pid=2195 comm="gpm" name="localtime" dev=hda5 ino=1289803 0 scontext=system_u:system_r:gpm_t:s0 tcontext=root:object_r:etc_t:s0 tclass=file May 4 02:49:10 diablo kernel: audit(1146728943.443:308): avc: denied { read } for pid=2195 comm="gpm" name="localtime" dev=hda5 ino=1289803 0 scontext=system_u:system_r:gpm_t:s0 tcontext=root:object_r:etc_t:s0 tclass=file ================================== This is with: root@diablo ~]# uname -a Linux diablo.coyote.den 2.6.16-1.2096_FC5 #1 Wed Apr 19 05:14:36 EDT 2006 i686 athlon i386 GNU/Linux I note also that earlier in the login: =================== May 4 02:49:09 diablo kernel: md: Autodetecting RAID arrays. May 4 02:49:09 diablo kernel: md: autorun ... May 4 02:49:10 diablo kernel: md: ... autorun DONE. May 4 02:49:10 diablo kernel: audit(1146728910.033:292): avc: denied { search } for pid=1173 comm="pam_console_app" name="var" dev=hda5 ino =3208129 scontext=system_u:system_r:pam_console_t:s0-s0:c0.c255 tcontext=system_u:object_r:file_t:s0 tclass=dir May 4 02:49:10 diablo kernel: audit(1146728910.033:293): avc: denied { search } for pid=1173 comm="pam_console_app" name="var" dev=hda5 ino =3208129 scontext=system_u:system_r:pam_console_t:s0-s0:c0.c255 tcontext=system_u:object_r:file_t:s0 tclass=dir May 4 02:49:10 diablo kernel: audit(1146728910.033:294): avc: denied { search } for pid=1173 comm="pam_console_app" name="var" dev=hda5 ino =3208129 scontext=system_u:system_r:pam_console_t:s0-s0:c0.c255 tcontext=system_u:object_r:file_t:s0 tclass=dir May 4 02:49:10 diablo kernel: audit(1146728910.033:295): avc: denied { search } for pid=1173 comm="pam_console_app" name="var" dev=hda5 ino =3208129 scontext=system_u:system_r:pam_console_t:s0-s0:c0.c255 tcontext=system_u:object_r:file_t:s0 tclass=dir May 4 02:49:10 diablo kernel: audit(1146728910.033:296): avc: denied { search } for pid=1173 comm="pam_console_app" name="var" dev=hda5 ino =3208129 scontext=system_u:system_r:pam_console_t:s0-s0:c0.c255 tcontext=system_u:object_r:file_t:s0 tclass=dir May 4 02:49:10 diablo kernel: device-mapper: 4.5.0-ioctl (2005-10-04) initialised: dm-devel@xxxxxxxxxx May 4 02:49:10 diablo kernel: audit(1146728910.109:297): avc: denied { search } for pid=1181 comm="pam_console_app" name="var" dev=hda5 ino =3208129 scontext=system_u:system_r:pam_console_t:s0-s0:c0.c255 tcontext=system_u:object_r:file_t:s0 tclass=dir May 4 02:49:10 diablo kernel: audit(1146728910.113:298): avc: denied { search } for pid=1181 comm="pam_console_app" name="var" dev=hda5 ino =3208129 scontext=system_u:system_r:pam_console_t:s0-s0:c0.c255 tcontext=system_u:object_r:file_t:s0 tclass=dir May 4 02:49:10 diablo kernel: audit(1146728910.113:299): avc: denied { search } for pid=1181 comm="pam_console_app" name="var" dev=hda5 ino =3208129 scontext=system_u:system_r:pam_console_t:s0-s0:c0.c255 tcontext=system_u:object_r:file_t:s0 tclass=dir May 4 02:49:10 diablo kernel: audit(1146728910.113:300): avc: denied { search } for pid=1181 comm="pam_console_app" name="var" dev=hda5 ino =3208129 scontext=system_u:system_r:pam_console_t:s0-s0:c0.c255 tcontext=system_u:object_r:file_t:s0 tclass=dir May 4 02:49:10 diablo kernel: audit(1146728910.113:301): avc: denied { search } for pid=1181 comm="pam_console_app" name="var" dev=hda5 ino =3208129 scontext=system_u:system_r:pam_console_t:s0-s0:c0.c255 tcontext=system_u:object_r:file_t:s0 tclass=dir May 4 02:49:10 diablo kernel: EXT3 FS on hda5, internal journal May 4 02:49:10 diablo kernel: kjournald starting. Commit interval 5 seconds ============================== But the md related stuff has been turned off with chkconfig, so why am I getting these messages at all? -- Cheers, Gene
Install the policycoreutils package and pipe the errors to audit2why to find out.