Aug 04 13:35:21 fedora audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=setroubleshootd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 04 13:35:21 fedora systemd[1]: setroubleshootd.service: Deactivated successfully. Aug 04 13:35:21 fedora audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=dbus-:1.3-org.fedoraproject.SetroubleshootPrivileged@1 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 04 13:35:21 fedora systemd[1]: dbus-:1.3-org.fedoraproject.SetroubleshootPrivileged@1.service: Deactivated successfully. Aug 04 13:35:19 fedora wpa_supplicant[2208]: wlp2s0: CTRL-EVENT-REGDOM-CHANGE init=DRIVER type=COUNTRY alpha2=DE Aug 04 13:35:18 fedora systemd[1]: Removed slice user-1002.slice - User Slice of UID 1002. Aug 04 13:35:18 fedora audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=user-runtime-dir@1002 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 04 13:35:18 fedora systemd[1]: Stopped user-runtime-dir@1002.service - User Runtime Directory /run/user/1002. Aug 04 13:35:18 fedora systemd[1]: user-runtime-dir@1002.service: Deactivated successfully. Aug 04 13:35:18 fedora systemd[1]: run-user-1002.mount: Deactivated successfully. Aug 04 13:35:18 fedora systemd[1]: Stopping user-runtime-dir@1002.service - User Runtime Directory /run/user/1002... Aug 04 13:35:18 fedora audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=user@1002 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 04 13:35:18 fedora systemd[1]: Stopped user@1002.service - User Manager for UID 1002. Aug 04 13:35:18 fedora systemd[1]: user@1002.service: Deactivated successfully. Aug 04 13:35:18 fedora systemd[7793]: Reached target exit.target - Exit the Session. Aug 04 13:35:18 fedora systemd[7793]: Finished systemd-exit.service - Exit the Session. Aug 04 13:35:18 fedora systemd[7793]: Reached target shutdown.target - Shutdown. Aug 04 13:35:18 fedora systemd[7793]: Removed slice app.slice - User Application Slice. Aug 04 13:35:18 fedora systemd[7793]: Closed pipewire.socket - PipeWire Multimedia System Socket. Aug 04 13:35:18 fedora systemd[7793]: Closed pipewire-pulse.socket - PipeWire PulseAudio. Aug 04 13:35:18 fedora systemd[7793]: Closed dbus.socket - D-Bus User Message Bus Socket. Aug 04 13:35:18 fedora systemd[7793]: Stopped systemd-tmpfiles-clean.timer - Daily Cleanup of User's Temporary Directories. Aug 04 13:35:18 fedora systemd[7793]: Stopped grub-boot-success.timer - Mark boot as successful after the user session has run 2 minutes. Aug 04 13:35:18 fedora systemd[7793]: Stopped target timers.target - Timers. Aug 04 13:35:18 fedora systemd[7793]: Stopped target sockets.target - Sockets. Aug 04 13:35:18 fedora systemd[7793]: Stopped target paths.target - Paths. Aug 04 13:35:18 fedora systemd[7793]: Stopped target basic.target - Basic System. Aug 04 13:35:18 fedora systemd[7793]: Stopped target default.target - Main User Target. Aug 04 13:35:18 fedora systemd[7793]: Activating special unit exit.target... Aug 04 13:35:18 fedora systemd[1]: Stopping user@1002.service - User Manager for UID 1002... Aug 04 13:35:11 fedora seapplet[5266]: seapplet: Can't show a notification: g-io-error-quark: GDBus.Error:org.freedesktop.Notifications.Error.ExcessNotificationGeneration: Created too many similar notifications in quick succession (36) Aug 04 13:35:11 fedora seapplet[5266]: seapplet: Can't show a notification: g-io-error-quark: GDBus.Error:org.freedesktop.Notifications.Error.ExcessNotificationGeneration: Created too many similar notifications in quick succession (36) Aug 04 13:35:11 fedora seapplet[5266]: seapplet: Can't show a notification: g-io-error-quark: GDBus.Error:org.freedesktop.Notifications.Error.ExcessNotificationGeneration: Created too many similar notifications in quick succession (36) Aug 04 13:35:11 fedora seapplet[5266]: seapplet: Can't show a notification: g-io-error-quark: GDBus.Error:org.freedesktop.Notifications.Error.ExcessNotificationGeneration: Created too many similar notifications in quick succession (36) Aug 04 13:35:11 fedora seapplet[5266]: seapplet: Can't show a notification: g-io-error-quark: GDBus.Error:org.freedesktop.Notifications.Error.ExcessNotificationGeneration: Created too many similar notifications in quick succession (36) Aug 04 13:35:11 fedora seapplet[5266]: seapplet: Can't show a notification: g-io-error-quark: GDBus.Error:org.freedesktop.Notifications.Error.ExcessNotificationGeneration: Created too many similar notifications in quick succession (36) Aug 04 13:35:11 fedora seapplet[5266]: seapplet: Can't show a notification: g-io-error-quark: GDBus.Error:org.freedesktop.Notifications.Error.ExcessNotificationGeneration: Created too many similar notifications in quick succession (36) Aug 04 13:35:11 fedora seapplet[5266]: seapplet: Can't show a notification: g-io-error-quark: GDBus.Error:org.freedesktop.Notifications.Error.ExcessNotificationGeneration: Created too many similar notifications in quick succession (36) Aug 04 13:35:11 fedora seapplet[5266]: seapplet: Can't show a notification: g-io-error-quark: GDBus.Error:org.freedesktop.Notifications.Error.ExcessNotificationGeneration: Created too many similar notifications in quick succession (36) Aug 04 13:35:11 fedora seapplet[5266]: seapplet: Can't show a notification: g-io-error-quark: GDBus.Error:org.freedesktop.Notifications.Error.ExcessNotificationGeneration: Created too many similar notifications in quick succession (36) Aug 04 13:35:11 fedora setroubleshoot[8232]: SELinux is preventing cockpit-bridge from execute access on the file /run/user/1002/#47 (deleted). ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow user to exec content Then you must tell SELinux about this by enabling the 'user_exec_content' boolean. Do setsebool -P user_exec_content 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that cockpit-bridge should be allowed execute access on the #47 (deleted) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'cockpit-bridge' --raw | audit2allow -M my-cockpitbridge # semodule -X 300 -i my-cockpitbridge.pp Aug 04 13:35:11 fedora setroubleshoot[8232]: SELinux is preventing cockpit-bridge from execute access on the file /run/user/1002/#47 (deleted). For complete SELinux messages run: sealert -l 23e5953f-7c79-4b04-8367-470ec578df3b Aug 04 13:35:11 fedora setroubleshoot[8232]: SELinux is preventing cockpit-bridge from execute access on the file /tmp/#137 (deleted). ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow user to exec content Then you must tell SELinux about this by enabling the 'user_exec_content' boolean. Do setsebool -P user_exec_content 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that cockpit-bridge should be allowed execute access on the #137 (deleted) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'cockpit-bridge' --raw | audit2allow -M my-cockpitbridge # semodule -X 300 -i my-cockpitbridge.pp Aug 04 13:35:11 fedora setroubleshoot[8232]: SELinux is preventing cockpit-bridge from execute access on the file /tmp/#137 (deleted). For complete SELinux messages run: sealert -l 23e5953f-7c79-4b04-8367-470ec578df3b Aug 04 13:35:11 fedora setroubleshoot[8232]: SELinux is preventing cockpit-bridge from execute access on the file /dev/shm/#4 (deleted). ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow user to exec content Then you must tell SELinux about this by enabling the 'user_exec_content' boolean. Do setsebool -P user_exec_content 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that cockpit-bridge should be allowed execute access on the #4 (deleted) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'cockpit-bridge' --raw | audit2allow -M my-cockpitbridge # semodule -X 300 -i my-cockpitbridge.pp Aug 04 13:35:11 fedora setroubleshoot[8232]: SELinux is preventing cockpit-bridge from execute access on the file /dev/shm/#4 (deleted). For complete SELinux messages run: sealert -l 23e5953f-7c79-4b04-8367-470ec578df3b Aug 04 13:35:11 fedora setroubleshoot[8232]: SELinux is preventing cockpit-bridge from execute access on the file /run/user/1002/#46 (deleted). ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow user to exec content Then you must tell SELinux about this by enabling the 'user_exec_content' boolean. Do setsebool -P user_exec_content 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that cockpit-bridge should be allowed execute access on the #46 (deleted) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'cockpit-bridge' --raw | audit2allow -M my-cockpitbridge # semodule -X 300 -i my-cockpitbridge.pp Aug 04 13:35:11 fedora setroubleshoot[8232]: SELinux is preventing cockpit-bridge from execute access on the file /run/user/1002/#46 (deleted). For complete SELinux messages run: sealert -l 23e5953f-7c79-4b04-8367-470ec578df3b Aug 04 13:35:11 fedora setroubleshoot[8232]: SELinux is preventing cockpit-bridge from execute access on the file /tmp/#136 (deleted). ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow user to exec content Then you must tell SELinux about this by enabling the 'user_exec_content' boolean. Do setsebool -P user_exec_content 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that cockpit-bridge should be allowed execute access on the #136 (deleted) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'cockpit-bridge' --raw | audit2allow -M my-cockpitbridge # semodule -X 300 -i my-cockpitbridge.pp Aug 04 13:35:11 fedora setroubleshoot[8232]: SELinux is preventing cockpit-bridge from execute access on the file /tmp/#136 (deleted). For complete SELinux messages run: sealert -l 23e5953f-7c79-4b04-8367-470ec578df3b Aug 04 13:35:11 fedora setroubleshoot[8232]: SELinux is preventing cockpit-bridge from execute access on the file /dev/shm/#3 (deleted). ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow user to exec content Then you must tell SELinux about this by enabling the 'user_exec_content' boolean. Do setsebool -P user_exec_content 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that cockpit-bridge should be allowed execute access on the #3 (deleted) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'cockpit-bridge' --raw | audit2allow -M my-cockpitbridge # semodule -X 300 -i my-cockpitbridge.pp Aug 04 13:35:11 fedora setroubleshoot[8232]: SELinux is preventing cockpit-bridge from execute access on the file /dev/shm/#3 (deleted). For complete SELinux messages run: sealert -l 23e5953f-7c79-4b04-8367-470ec578df3b Aug 04 13:35:11 fedora setroubleshoot[8232]: SELinux is preventing cockpit-bridge from map access on the file /home/virtual/#20738676 (deleted). ***** Plugin catchall_boolean (47.5 confidence) suggests ****************** If you want to allow domain to can mmap files Then you must tell SELinux about this by enabling the 'domain_can_mmap_files' boolean. Do setsebool -P domain_can_mmap_files 1 ***** Plugin catchall_boolean (47.5 confidence) suggests ****************** If you want to allow user to exec content Then you must tell SELinux about this by enabling the 'user_exec_content' boolean. Do setsebool -P user_exec_content 1 ***** Plugin catchall (6.38 confidence) suggests ************************** If you believe that cockpit-bridge should be allowed map access on the #20738676 (deleted) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'cockpit-bridge' --raw | audit2allow -M my-cockpitbridge # semodule -X 300 -i my-cockpitbridge.pp Aug 04 13:35:11 fedora setroubleshoot[8232]: SELinux is preventing cockpit-bridge from map access on the file /home/virtual/#20738676 (deleted). For complete SELinux messages run: sealert -l f68700d6-ac85-4a3e-981e-f5a57ed6f172 Aug 04 13:35:11 fedora setroubleshoot[8232]: SELinux is preventing cockpit-bridge from execute access on the file /dev/shm/#2 (deleted). ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow user to exec content Then you must tell SELinux about this by enabling the 'user_exec_content' boolean. Do setsebool -P user_exec_content 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that cockpit-bridge should be allowed execute access on the #2 (deleted) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'cockpit-bridge' --raw | audit2allow -M my-cockpitbridge # semodule -X 300 -i my-cockpitbridge.pp Aug 04 13:35:11 fedora setroubleshoot[8232]: SELinux is preventing cockpit-bridge from execute access on the file /dev/shm/#2 (deleted). For complete SELinux messages run: sealert -l 23e5953f-7c79-4b04-8367-470ec578df3b Aug 04 13:35:11 fedora setroubleshoot[8232]: SELinux is preventing cockpit-bridge from execute access on the file /var/tmp/#1479699 (deleted). ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow user to exec content Then you must tell SELinux about this by enabling the 'user_exec_content' boolean. Do setsebool -P user_exec_content 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that cockpit-bridge should be allowed execute access on the #1479699 (deleted) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'cockpit-bridge' --raw | audit2allow -M my-cockpitbridge # semodule -X 300 -i my-cockpitbridge.pp Aug 04 13:35:11 fedora setroubleshoot[8232]: SELinux is preventing cockpit-bridge from execute access on the file /var/tmp/#1479699 (deleted). For complete SELinux messages run: sealert -l 23e5953f-7c79-4b04-8367-470ec578df3b Aug 04 13:35:11 fedora plasmashell[4901]: Could not find the Plasmoid for Plasma::FrameSvgItem(0x7fcaf8008ef0) QQmlContext(0x561f17c281e0) QUrl("file:///usr/share/plasma/plasmoids/org.kde.plasma.notifications/contents/ui/global/Globals.qml") Aug 04 13:35:11 fedora plasmashell[4901]: Could not find the Plasmoid for Plasma::FrameSvgItem(0x7fcaf8008ef0) QQmlContext(0x561f17c281e0) QUrl("file:///usr/share/plasma/plasmoids/org.kde.plasma.notifications/contents/ui/global/Globals.qml") Aug 04 13:35:11 fedora setroubleshoot[8232]: SELinux is preventing cockpit-bridge from execute access on the file /tmp/#135 (deleted). ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow user to exec content Then you must tell SELinux about this by enabling the 'user_exec_content' boolean. Do setsebool -P user_exec_content 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that cockpit-bridge should be allowed execute access on the #135 (deleted) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'cockpit-bridge' --raw | audit2allow -M my-cockpitbridge # semodule -X 300 -i my-cockpitbridge.pp Aug 04 13:35:11 fedora setroubleshoot[8232]: SELinux is preventing cockpit-bridge from execute access on the file /tmp/#135 (deleted). For complete SELinux messages run: sealert -l 23e5953f-7c79-4b04-8367-470ec578df3b Aug 04 13:35:11 fedora setroubleshoot[8232]: SELinux is preventing cockpit-bridge from execute access on the file /memfd:libffi (deleted). ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow user to exec content Then you must tell SELinux about this by enabling the 'user_exec_content' boolean. Do setsebool -P user_exec_content 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that cockpit-bridge should be allowed execute access on the memfd:libffi (deleted) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'cockpit-bridge' --raw | audit2allow -M my-cockpitbridge # semodule -X 300 -i my-cockpitbridge.pp Aug 04 13:35:11 fedora setroubleshoot[8232]: SELinux is preventing cockpit-bridge from execute access on the file /memfd:libffi (deleted). For complete SELinux messages run: sealert -l 23e5953f-7c79-4b04-8367-470ec578df3b Aug 04 13:35:10 fedora audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=dbus-:1.3-org.fedoraproject.SetroubleshootPrivileged@1 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 04 13:35:10 fedora systemd[1]: Started dbus-:1.3-org.fedoraproject.SetroubleshootPrivileged@1.service. Aug 04 13:35:10 fedora audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=setroubleshootd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 04 13:35:10 fedora systemd[1]: Started setroubleshootd.service - SETroubleshoot daemon for processing new SELinux denial logs. Aug 04 13:35:10 fedora systemd[1]: Starting setroubleshootd.service - SETroubleshoot daemon for processing new SELinux denial logs... Aug 04 13:35:09 fedora uresourced[2138]: Setting resources on user@0.service (MemoryMin: 0, MemoryLow: 0, CPUWeight: 100, IOWeight: 100) Aug 04 13:35:09 fedora uresourced[2138]: Setting resources on user-0.slice (MemoryMin: 262144000, MemoryLow: 0, CPUWeight: 500, IOWeight: 500) Aug 04 13:35:09 fedora uresourced[2138]: Setting resources on user@1000.service (MemoryMin: 0, MemoryLow: 0, CPUWeight: 100, IOWeight: 100) Aug 04 13:35:09 fedora uresourced[2138]: Setting resources on user-1000.slice (MemoryMin: 0, MemoryLow: 0, CPUWeight: 100, IOWeight: 100) Aug 04 13:35:09 fedora plasmashell[4901]: org.kde.plasma.pulseaudio: No object for name "auto_null.monitor" Aug 04 13:35:09 fedora plasmashell[4901]: org.kde.plasma.pulseaudio: No object for name "auto_null.monitor" Aug 04 13:35:09 fedora plasmashell[4901]: org.kde.plasma.pulseaudio: No object for name "auto_null.monitor" Aug 04 13:35:09 fedora plasmashell[4901]: org.kde.plasma.pulseaudio: No object for name "auto_null" Aug 04 13:35:09 fedora plasmashell[4901]: org.kde.plasma.pulseaudio: No object for name "alsa_input.pci-0000_04_00.6.HiFi__hw_acp6x__source" Aug 04 13:35:09 fedora plasmashell[4901]: org.kde.plasma.pulseaudio: No object for name "alsa_output.usb-Creative_Technology_SB_X-Fi_Surround_5.1_000009Xx-00.analog-surround-51" Aug 04 13:35:09 fedora plasmashell[4901]: org.kde.plasma.pulseaudio: No object for name "alsa_input.pci-0000_04_00.6.HiFi__hw_acp6x__source" Aug 04 13:35:08 fedora abrt-notification[7924]: Process 4629 (cockpit-bridge) of user 1002 encountered an uncaught MemoryError exception Aug 04 13:35:08 fedora abrt-server[7880]: Deleting problem directory Python3-2023-08-04-13:35:08-7846 (dup of Python3-2023-08-03-23:05:29-4629) Aug 04 13:35:08 fedora systemd-logind[1732]: Removed session 12. Aug 04 13:35:08 fedora systemd-logind[1732]: Session 12 logged out. Waiting for processes to exit. Aug 04 13:35:08 fedora systemd[1]: session-12.scope: Deactivated successfully. Aug 04 13:35:08 fedora audit[7785]: USER_END pid=7785 uid=0 auid=1002 ses=12 subj=system_u:system_r:cockpit_session_t:s0 msg='op=PAM:session_close grantors=pam_selinux,pam_loginuid,pam_selinux,pam_keyinit,pam_ssh_add,pam_keyinit,pam_limits,pam_systemd,pam_unix,pam_umask,pam_lastlog acct="virtual" exe="/usr/libexec/cockpit-session" hostname=fe80::278f:3155:4884:44e3%enp1s0f0 addr=fe80::278f:3155:4884:44e3 terminal=? res=success' Aug 04 13:35:08 fedora cockpit-session[7785]: pam_unix(cockpit:session): session closed for user virtual Aug 04 13:35:08 fedora audit[7785]: CRED_DISP pid=7785 uid=0 auid=1002 ses=12 subj=system_u:system_r:cockpit_session_t:s0 msg='op=PAM:setcred grantors=pam_localuser,pam_unix,pam_listfile acct="virtual" exe="/usr/libexec/cockpit-session" hostname=fe80::278f:3155:4884:44e3%enp1s0f0 addr=fe80::278f:3155:4884:44e3 terminal=? res=success' Aug 04 13:35:08 fedora cockpit-ws[7846]: MemoryError Aug 04 13:35:08 fedora cockpit-ws[7846]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Aug 04 13:35:08 fedora cockpit-ws[7846]: self.callback = sd.bus_message_handler_t(handler) Aug 04 13:35:08 fedora cockpit-ws[7846]: File "/usr/lib/python3.11/site-packages/cockpit/_vendor/systemd_ctypes/bus.py", line 226, in __init__ Aug 04 13:35:08 fedora cockpit-ws[7846]: ^^^^^^^^^^^^^^^^^^^^^^^^^^ Aug 04 13:35:08 fedora cockpit-ws[7846]: slot = Slot(obj.message_received) Aug 04 13:35:08 fedora cockpit-ws[7846]: File "/usr/lib/python3.11/site-packages/cockpit/_vendor/systemd_ctypes/bus.py", line 345, in add_object Aug 04 13:35:08 fedora cockpit-ws[7846]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Aug 04 13:35:08 fedora cockpit-ws[7846]: self.exportees = [self.server.add_object(path, cls()) for path, cls in exports] Aug 04 13:35:08 fedora cockpit-ws[7846]: File "/usr/lib/python3.11/site-packages/cockpit/bridge.py", line 54, in Aug 04 13:35:08 fedora cockpit-ws[7846]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Aug 04 13:35:08 fedora cockpit-ws[7846]: self.exportees = [self.server.add_object(path, cls()) for path, cls in exports] Aug 04 13:35:08 fedora cockpit-ws[7846]: File "/usr/lib/python3.11/site-packages/cockpit/bridge.py", line 54, in __init__ Aug 04 13:35:08 fedora cockpit-ws[7846]: ^^^^^^^^^^^^^^^^^^^^ Aug 04 13:35:08 fedora cockpit-ws[7846]: self.internal_bus = InternalBus(EXPORTS) Aug 04 13:35:08 fedora cockpit-ws[7846]: File "/usr/lib/python3.11/site-packages/cockpit/bridge.py", line 67, in __init__ Aug 04 13:35:08 fedora cockpit-ws[7846]: ^^^^^^^^^^^^ Aug 04 13:35:08 fedora cockpit-ws[7846]: router = Bridge(args) Aug 04 13:35:08 fedora cockpit-ws[7846]: File "/usr/lib/python3.11/site-packages/cockpit/bridge.py", line 168, in run Aug 04 13:35:08 fedora cockpit-ws[7846]: ^^^^^^^^^^^^^^^ Aug 04 13:35:08 fedora cockpit-ws[7846]: return future.result() Aug 04 13:35:08 fedora cockpit-ws[7846]: File "/usr/lib64/python3.11/asyncio/base_events.py", line 653, in run_until_complete Aug 04 13:35:08 fedora cockpit-ws[7846]: ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Aug 04 13:35:08 fedora cockpit-ws[7846]: return self._loop.run_until_complete(task) Aug 04 13:35:08 fedora cockpit-ws[7846]: File "/usr/lib64/python3.11/asyncio/runners.py", line 118, in run Aug 04 13:35:08 fedora cockpit-ws[7846]: ^^^^^^^^^^^^^^^^ Aug 04 13:35:08 fedora cockpit-ws[7846]: return runner.run(main) Aug 04 13:35:08 fedora cockpit-ws[7846]: File "/usr/lib64/python3.11/asyncio/runners.py", line 190, in run Aug 04 13:35:08 fedora cockpit-ws[7846]: asyncio.run(main, debug=debug) Aug 04 13:35:08 fedora cockpit-ws[7846]: File "/usr/lib/python3.11/site-packages/cockpit/_vendor/systemd_ctypes/event.py", line 109, in run_async Aug 04 13:35:08 fedora cockpit-ws[7846]: run_async(run(args), debug=args.debug) Aug 04 13:35:08 fedora cockpit-ws[7846]: File "/usr/lib/python3.11/site-packages/cockpit/bridge.py", line 283, in main Aug 04 13:35:08 fedora cockpit-ws[7846]: ^^^^^^ Aug 04 13:35:08 fedora cockpit-ws[7846]: sys.exit(main()) Aug 04 13:35:08 fedora cockpit-ws[7846]: File "/usr/bin/cockpit-bridge", line 8, in Aug 04 13:35:08 fedora cockpit-ws[7846]: Traceback (most recent call last): Aug 04 13:35:08 fedora python3[7846]: detected unhandled Python exception in '/usr/bin/cockpit-bridge' Aug 04 13:35:08 fedora audit[7846]: AVC avc: denied { execute } for pid=7846 comm="cockpit-bridge" path=2F72756E2F757365722F313030322F233437202864656C6574656429 dev="tmpfs" ino=47 scontext=user_u:user_r:user_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=file permissive=0 Aug 04 13:35:08 fedora audit[7846]: AVC avc: denied { execute } for pid=7846 comm="cockpit-bridge" path=2F746D702F23313337202864656C6574656429 dev="tmpfs" ino=137 scontext=user_u:user_r:user_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=file permissive=0 Aug 04 13:35:08 fedora audit[7846]: AVC avc: denied { execute } for pid=7846 comm="cockpit-bridge" path=2F6465762F73686D2F2334202864656C6574656429 dev="tmpfs" ino=4 scontext=user_u:user_r:user_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=file permissive=0 Aug 04 13:35:08 fedora audit[7846]: AVC avc: denied { execute } for pid=7846 comm="cockpit-bridge" path=2F72756E2F757365722F313030322F233436202864656C6574656429 dev="tmpfs" ino=46 scontext=user_u:user_r:user_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=file permissive=0 Aug 04 13:35:08 fedora audit[7846]: AVC avc: denied { execute } for pid=7846 comm="cockpit-bridge" path=2F746D702F23313336202864656C6574656429 dev="tmpfs" ino=136 scontext=user_u:user_r:user_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=file permissive=0 Aug 04 13:35:08 fedora audit[7846]: AVC avc: denied { execute } for pid=7846 comm="cockpit-bridge" path=2F6465762F73686D2F2333202864656C6574656429 dev="tmpfs" ino=3 scontext=user_u:user_r:user_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=file permissive=0 Aug 04 13:35:08 fedora audit[7846]: AVC avc: denied { map } for pid=7846 comm="cockpit-bridge" path=2F686F6D652F7669727475616C2F233230373338363736202864656C6574656429 dev="dm-0" ino=20738676 scontext=user_u:user_r:user_t:s0 tcontext=user_u:object_r:user_home_t:s0 tclass=file permissive=0 Aug 04 13:35:08 fedora audit[7846]: AVC avc: denied { execute } for pid=7846 comm="cockpit-bridge" path=2F6465762F73686D2F2332202864656C6574656429 dev="tmpfs" ino=2 scontext=user_u:user_r:user_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=file permissive=0 Aug 04 13:35:08 fedora audit[7846]: AVC avc: denied { execute } for pid=7846 comm="cockpit-bridge" path=2F7661722F746D702F2331343739363939202864656C6574656429 dev="dm-0" ino=1479699 scontext=user_u:user_r:user_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=file permissive=0 Aug 04 13:35:08 fedora audit[7846]: AVC avc: denied { execute } for pid=7846 comm="cockpit-bridge" path=2F746D702F23313335202864656C6574656429 dev="tmpfs" ino=135 scontext=user_u:user_r:user_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=file permissive=0 Aug 04 13:35:08 fedora audit[7846]: AVC avc: denied { execute } for pid=7846 comm="cockpit-bridge" path=2F6D656D66643A6C6962666669202864656C6574656429 dev="tmpfs" ino=9259 scontext=user_u:user_r:user_t:s0 tcontext=user_u:object_r:user_tmp_t:s0 tclass=file permissive=0 Aug 04 13:35:07 fedora audit[7785]: CRED_REFR pid=7785 uid=0 auid=1002 ses=12 subj=system_u:system_r:cockpit_session_t:s0 msg='op=PAM:setcred grantors=pam_localuser,pam_unix,pam_listfile acct="virtual" exe="/usr/libexec/cockpit-session" hostname=fe80::278f:3155:4884:44e3%enp1s0f0 addr=fe80::278f:3155:4884:44e3 terminal=? res=success' Aug 04 13:35:07 fedora audit[7785]: USER_START pid=7785 uid=0 auid=1002 ses=12 subj=system_u:system_r:cockpit_session_t:s0 msg='op=PAM:session_open grantors=pam_selinux,pam_loginuid,pam_selinux,pam_keyinit,pam_ssh_add,pam_keyinit,pam_limits,pam_systemd,pam_unix,pam_umask,pam_lastlog acct="virtual" exe="/usr/libexec/cockpit-session" hostname=fe80::278f:3155:4884:44e3%enp1s0f0 addr=fe80::278f:3155:4884:44e3 terminal=? res=success' Aug 04 13:35:07 fedora cockpit-session[7785]: pam_unix(cockpit:session): session opened for user virtual(uid=1002) by (uid=0) Aug 04 13:35:07 fedora systemd[1]: Started session-12.scope - Session 12 of User virtual. Aug 04 13:35:07 fedora audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=user@1002 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 04 13:35:07 fedora systemd[1]: Started user@1002.service - User Manager for UID 1002. Aug 04 13:35:07 fedora systemd[7793]: Startup finished in 184ms. Aug 04 13:35:07 fedora systemd[7793]: Reached target default.target - Main User Target. Aug 04 13:35:07 fedora systemd[7793]: Reached target basic.target - Basic System. Aug 04 13:35:07 fedora systemd[7793]: Reached target sockets.target - Sockets. Aug 04 13:35:07 fedora systemd[7793]: Listening on dbus.socket - D-Bus User Message Bus Socket. Aug 04 13:35:07 fedora systemd[7793]: Failed to start systemd-tmpfiles-setup.service - Create User's Volatile Files and Directories. Aug 04 13:35:07 fedora systemd[7793]: systemd-tmpfiles-setup.service: Failed with result 'exit-code'. Aug 04 13:35:07 fedora systemd[7793]: systemd-tmpfiles-setup.service: Main process exited, code=exited, status=203/EXEC Aug 04 13:35:07 fedora (tmpfiles)[7841]: systemd-tmpfiles-setup.service: Failed at step EXEC spawning systemd-tmpfiles: No such file or directory Aug 04 13:35:07 fedora (tmpfiles)[7841]: systemd-tmpfiles-setup.service: Failed to locate executable systemd-tmpfiles: No such file or directory Aug 04 13:35:07 fedora systemd[7793]: Starting systemd-tmpfiles-setup.service - Create User's Volatile Files and Directories... Aug 04 13:35:07 fedora systemd[7793]: Listening on pipewire.socket - PipeWire Multimedia System Socket. Aug 04 13:35:07 fedora systemd[7793]: Listening on pipewire-pulse.socket - PipeWire PulseAudio. Aug 04 13:35:07 fedora systemd[7793]: Starting dbus.socket - D-Bus User Message Bus Socket... Aug 04 13:35:07 fedora systemd[7793]: Reached target timers.target - Timers. Aug 04 13:35:07 fedora systemd[7793]: Reached target paths.target - Paths. Aug 04 13:35:07 fedora systemd[7793]: Started systemd-tmpfiles-clean.timer - Daily Cleanup of User's Temporary Directories. Aug 04 13:35:07 fedora systemd[7793]: Started grub-boot-success.timer - Mark boot as successful after the user session has run 2 minutes. Aug 04 13:35:07 fedora systemd[7793]: Created slice app.slice - User Application Slice. Aug 04 13:35:07 fedora systemd[7793]: Queued start job for default target default.target. Aug 04 13:35:07 fedora systemd-xdg-autostart-generator[7818]: /etc/xdg/autostart/at-spi-dbus-bus.desktop: not generating unit, error parsing Exec= line: Permission denied Aug 04 13:35:07 fedora systemd-xdg-autostart-generator[7818]: Exec binary '/usr/libexec/at-spi-bus-launcher' does not exist: Permission denied Aug 04 13:35:07 fedora uresourced[2138]: Setting resources on user@1002.service (MemoryMin: 0, MemoryLow: 0, CPUWeight: 100, IOWeight: 100) Aug 04 13:35:07 fedora uresourced[2138]: Setting resources on user-1002.slice (MemoryMin: 0, MemoryLow: 0, CPUWeight: 100, IOWeight: 100) Aug 04 13:35:07 fedora audit[7793]: USER_START pid=7793 uid=0 auid=1002 ses=13 subj=system_u:system_r:init_t:s0 msg='op=PAM:session_open grantors=pam_selinux,pam_selinux,pam_loginuid,pam_keyinit,pam_namespace,pam_systemd_home,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="virtual" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 04 13:35:07 fedora (systemd)[7793]: pam_unix(systemd-user:session): session opened for user virtual(uid=1002) by (uid=0) Aug 04 13:35:07 fedora audit[7793]: USER_ROLE_CHANGE pid=7793 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='pam: default-context=user_u:user_r:user_t:s0 selected-context=user_u:user_r:user_t:s0 exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 04 13:35:07 fedora audit[7793]: CRED_ACQ pid=7793 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='op=PAM:setcred grantors=? acct="virtual" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Aug 04 13:35:07 fedora audit[7793]: USER_ACCT pid=7793 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='op=PAM:accounting grantors=pam_unix acct="virtual" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 04 13:35:07 fedora systemd[1]: Starting user@1002.service - User Manager for UID 1002... Aug 04 13:35:07 fedora audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=user-runtime-dir@1002 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 04 13:35:07 fedora systemd[1]: Finished user-runtime-dir@1002.service - User Runtime Directory /run/user/1002. Aug 04 13:35:07 fedora systemd-logind[1732]: New session 12 of user virtual. Aug 04 13:35:07 fedora systemd[1]: Starting user-runtime-dir@1002.service - User Runtime Directory /run/user/1002... Aug 04 13:35:07 fedora systemd[1]: Created slice user-1002.slice - User Slice of UID 1002. Aug 04 13:35:07 fedora cockpit-session[7785]: pam_ssh_add: Failed adding some keys Aug 04 13:35:07 fedora audit[7785]: USER_ROLE_CHANGE pid=7785 uid=0 auid=1002 ses=12 subj=system_u:system_r:cockpit_session_t:s0 msg='pam: default-context=user_u:user_r:user_t:s0 selected-context=user_u:user_r:user_t:s0 exe="/usr/libexec/cockpit-session" hostname=fe80::278f:3155:4884:44e3%enp1s0f0 addr=fe80::278f:3155:4884:44e3 terminal=? res=success' Aug 04 13:35:07 fedora audit[7785]: CRED_ACQ pid=7785 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:cockpit_session_t:s0 msg='op=PAM:setcred grantors=pam_localuser,pam_unix,pam_listfile acct="virtual" exe="/usr/libexec/cockpit-session" hostname=fe80::278f:3155:4884:44e3%enp1s0f0 addr=fe80::278f:3155:4884:44e3 terminal=? res=success' Aug 04 13:35:07 fedora audit[7785]: USER_ACCT pid=7785 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:cockpit_session_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_localuser acct="virtual" exe="/usr/libexec/cockpit-session" hostname=fe80::278f:3155:4884:44e3%enp1s0f0 addr=fe80::278f:3155:4884:44e3 terminal=? res=success' Aug 04 13:35:07 fedora audit[7785]: USER_AUTH pid=7785 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:cockpit_session_t:s0 msg='op=PAM:authentication grantors=pam_usertype,pam_localuser,pam_unix,pam_listfile acct="virtual" exe="/usr/libexec/cockpit-session" hostname=fe80::278f:3155:4884:44e3%enp1s0f0 addr=fe80::278f:3155:4884:44e3 terminal=? res=success' Aug 04 13:35:05 fedora audit: BPF prog-id=111 op=UNLOAD Aug 04 13:35:05 fedora audit: BPF prog-id=112 op=UNLOAD Aug 04 13:35:05 fedora audit: BPF prog-id=113 op=UNLOAD Aug 04 13:35:05 fedora audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Aug 04 13:35:05 fedora systemd[1]: systemd-hostnamed.service: Deactivated successfully.