You are not logged in.
After entering correct password for root screen stucks with _ for ~15 seconds and give 'free():invalid pointer' error. Randomly. I may login as it should be for first try, but usually it take 2-5 tryes. : (
From journalctl:
Jul 21 22:21:05 t60 audit[358]: USER_AUTH pid=358 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:authentication grantors=pam_securetty,pam_shells,pam_faillock,pam_permit,pam_faillock acct="root" exe="/usr/bin/login" hostname=t60 addr=? terminal=/dev/tty1 res=success'
Jul 21 22:21:05 t60 kernel: kauditd_printk_skb: 13 callbacks suppressed
Jul 21 22:21:05 t60 kernel: audit: type=1100 audit(1689978065.063:25): pid=358 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:authentication grantors=pam_securetty,pam_shells,pam_faillock,pam_permit,pam_faillock acct="root" exe="/usr/bin/login" hostname=t60 addr=? terminal=/dev/tty1 res=success'
Jul 21 22:21:05 t60 audit[358]: USER_ACCT pid=358 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_permit,pam_time acct="root" exe="/usr/bin/login" hostname=t60 addr=? terminal=/dev/tty1 res=success'
Jul 21 22:21:05 t60 kernel: audit: type=1101 audit(1689978065.066:26): pid=358 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_permit,pam_time acct="root" exe="/usr/bin/login" hostname=t60 addr=? terminal=/dev/tty1 res=success'
Jul 21 22:21:05 t60 audit[358]: CRED_ACQ pid=358 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_securetty,pam_shells,pam_faillock,pam_permit,pam_faillock acct="root" exe="/usr/bin/login" hostname=t60 addr=? terminal=/dev/tty1 res=success'
Jul 21 22:21:05 t60 audit[358]: SYSCALL arch=40000003 syscall=4 success=yes exit=1 a0=4 a1=bff4f5ca a2=1 a3=b7ec2e54 items=0 ppid=1 pid=358 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=tty1 ses=1 comm="login" exe="/usr/bin/login" key=(null)
Jul 21 22:21:05 t60 audit: PROCTITLE proctitle=2F62696E2F6C6F67696E002D70002D2D
Jul 21 22:21:05 t60 login[358]: pam_unix(login:session): session opened for user root(uid=0) by LOGIN(uid=0)
Jul 21 22:21:05 t60 kernel: audit: type=1103 audit(1689978065.069:27): pid=358 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_securetty,pam_shells,pam_faillock,pam_permit,pam_faillock acct="root" exe="/usr/bin/login" hostname=t60 addr=? terminal=/dev/tty1 res=success'
Jul 21 22:21:05 t60 kernel: audit: type=1006 audit(1689978065.069:28): pid=358 uid=0 old-auid=4294967295 auid=0 tty=tty1 old-ses=4294967295 ses=1 res=1
Jul 21 22:21:05 t60 kernel: audit: type=1300 audit(1689978065.069:28): arch=40000003 syscall=4 success=yes exit=1 a0=4 a1=bff4f5ca a2=1 a3=b7ec2e54 items=0 ppid=1 pid=358 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=tty1 ses=1 comm="login" exe="/usr/bin/login" key=(null)
Jul 21 22:21:05 t60 kernel: audit: type=1327 audit(1689978065.069:28): proctitle=2F62696E2F6C6F67696E002D70002D2D
Jul 21 22:21:05 t60 login[358]: pam_systemd(login:session): Failed to create session: Input/output error
Jul 21 22:21:05 t60 iwd[252]: hardware_rekey not supported
Jul 21 22:21:05 t60 dhcpcd[256]: wlan0: carrier acquired
Jul 21 22:21:05 t60 dhcpcd[256]: wlan0: connected to Access Point:
Jul 21 22:21:05 t60 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
Jul 21 22:21:05 t60 dhcpcd[256]: wlan0:
Jul 21 22:21:05 t60 dhcpcd[256]: wlan0: IAID conflicts with one assigned to wlan1
Jul 21 22:21:05 t60 dhcpcd[256]: wlan0: adding address
Jul 21 22:21:06 t60 dhcpcd[256]: wlan0: rebinding lease of
Jul 21 22:21:06 t60 dhcpcd[256]: wlan0: probing address
Jul 21 22:21:06 t60 dhcpcd[256]: wlan0: soliciting an IPv6 router
Jul 21 22:21:08 t60 systemd[1]: systemd-rfkill.service: Deactivated successfully.
Jul 21 22:21:08 t60 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-rfkill comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 21 22:21:08 t60 kernel: audit: type=1131 audit(1689978068.069:29): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-rfkill comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 21 22:21:11 t60 dhcpcd[256]: wlan0: for 3600 seconds
Jul 21 22:21:11 t60 dhcpcd[256]: wlan0: adding route to
Jul 21 22:21:11 t60 dhcpcd[256]: wlan0: adding default route via
Jul 21 22:21:18 t60 dhcpcd[256]: wlan0: no IPv6 Routers available
Jul 21 22:21:30 t60 audit[358]: USER_START pid=358 uid=0 auid=0 ses=1 msg='op=PAM:session_open grantors=pam_loginuid,pam_keyinit,pam_systemd_home,pam_limits,pam_unix,pam_permit,pam_mail,pam_env acct="root" exe="/usr/bin/login" hostname=t60 addr=? terminal=/dev/tty1 res=success'
Jul 21 22:21:30 t60 audit[358]: CRED_REFR pid=358 uid=0 auid=0 ses=1 msg='op=PAM:setcred grantors=pam_securetty,pam_shells,pam_faillock,pam_permit,pam_faillock acct="root" exe="/usr/bin/login" hostname=t60 addr=? terminal=/dev/tty1 res=success'
Jul 21 22:21:30 t60 kernel: audit: type=1105 audit(1689978090.079:30): pid=358 uid=0 auid=0 ses=1 msg='op=PAM:session_open grantors=pam_loginuid,pam_keyinit,pam_systemd_home,pam_limits,pam_unix,pam_permit,pam_mail,pam_env acct="root" exe="/usr/bin/login" hostname=t60 addr=? terminal=/dev/tty1 res=success'
Jul 21 22:21:30 t60 kernel: audit: type=1110 audit(1689978090.079:31): pid=358 uid=0 auid=0 ses=1 msg='op=PAM:setcred grantors=pam_securetty,pam_shells,pam_faillock,pam_permit,pam_faillock acct="root" exe="/usr/bin/login" hostname=t60 addr=? terminal=/dev/tty1 res=success'
Jul 21 22:21:30 t60 login[358]: ROOT LOGIN ON tty1
Jul 21 22:21:30 t60 audit[422]: ANOM_ABEND auid=0 uid=0 gid=0 ses=1 pid=422 comm="login" exe="/usr/bin/login" sig=6 res=1
Jul 21 22:21:30 t60 kernel: audit: type=1701 audit(1689978090.086:32): auid=0 uid=0 gid=0 ses=1 pid=422 comm="login" exe="/usr/bin/login" sig=6 res=1
Jul 21 22:21:30 t60 systemd[1]: Created slice Slice /system/systemd-coredump.
Jul 21 22:21:30 t60 systemd[1]: Started Process Core Dump (PID 423/UID 0).
Jul 21 22:21:30 t60 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-coredump@0-423-0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 21 22:21:30 t60 kernel: audit: type=1130 audit(1689978090.149:33): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-coredump@0-423-0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 21 22:21:30 t60 systemd-coredump[424]: Process 422 (login) of user 0 dumped core.
Stack trace of thread 422:
#0 0x00000000b7efb549 __kernel_vsyscall (linux-gate.so.1 + 0x549)
#1 0x00000000b7d5dbb7 n/a (libc.so.6 + 0x89bb7)
#2 0x00000000b7d09e07 raise (libc.so.6 + 0x35e07)
#3 0x00000000b7cf2126 abort (libc.so.6 + 0x1e126)
#4 0x00000000b7cf3040 n/a (libc.so.6 + 0x1f040)
#5 0x00000000b7d6951d n/a (libc.so.6 + 0x9551d)
#6 0x00000000b7d6b473 n/a (libc.so.6 + 0x97473)
#7 0x00000000b7d6ddf7 __libc_free (libc.so.6 + 0x99df7)
#8 0x00000000b7c72b8b n/a (pam_systemd_home.so + 0x44b8b)
#9 0x00000000b7c72c49 n/a (pam_systemd_home.so + 0x44c49)
#10 0x00000000b7c3d148 n/a (pam_systemd_home.so + 0xf148)
#11 0x00000000b7ed5511 n/a (libpam.so.0 + 0x2511)
#12 0x00000000b7ed6092 pam_end (libpam.so.0 + 0x3092)
#13 0x00000000004d5108 n/a (login + 0x4108)
#14 0x00000000b7cf3629 n/a (libc.so.6 + 0x1f629)
#15 0x00000000b7cf36ed __libc_start_main (libc.so.6 + 0x1f6ed)
#16 0x00000000004d5beb n/a (login + 0x4beb)
ELF object binary architecture: Intel 80386
Jul 21 22:21:30 t60 login[358]: pam_unix(login:session): session closed for user root
Jul 21 22:21:30 t60 kernel: audit: type=1104 audit(1689978090.379:34): pid=358 uid=0 auid=0 ses=1 msg='op=PAM:setcred grantors=pam_securetty,pam_shells,pam_faillock,pam_permit,pam_faillock acct="root" exe="/usr/bin/login" hostname=t60 addr=? terminal=/dev/tty1 res=success'
Jul 21 22:21:30 t60 kernel: audit: type=1106 audit(1689978090.379:35): pid=358 uid=0 auid=0 ses=1 msg='op=PAM:session_close grantors=pam_loginuid,pam_keyinit,pam_systemd_home,pam_limits,pam_unix,pam_permit,pam_mail,pam_env acct="root" exe="/usr/bin/login" hostname=t60 addr=? terminal=/dev/tty1 res=success'
Jul 21 22:21:30 t60 kernel: audit: type=1701 audit(1689978090.383:36): auid=0 uid=0 gid=0 ses=1 pid=358 comm="login" exe="/usr/bin/login" sig=6 res=1
Jul 21 22:21:30 t60 kernel: audit: type=1131 audit(1689978090.386:37): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-coredump@0-423-0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 21 22:21:30 t60 audit[358]: CRED_DISP pid=358 uid=0 auid=0 ses=1 msg='op=PAM:setcred grantors=pam_securetty,pam_shells,pam_faillock,pam_permit,pam_faillock acct="root" exe="/usr/bin/login" hostname=t60 addr=? terminal=/dev/tty1 res=success'
Jul 21 22:21:30 t60 audit[358]: USER_END pid=358 uid=0 auid=0 ses=1 msg='op=PAM:session_close grantors=pam_loginuid,pam_keyinit,pam_systemd_home,pam_limits,pam_unix,pam_permit,pam_mail,pam_env acct="root" exe="/usr/bin/login" hostname=t60 addr=? terminal=/dev/tty1 res=success'
Jul 21 22:21:30 t60 audit[358]: ANOM_ABEND auid=0 uid=0 gid=0 ses=1 pid=358 comm="login" exe="/usr/bin/login" sig=6 res=1
Jul 21 22:21:30 t60 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-coredump@0-423-0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 21 22:21:30 t60 systemd[1]: systemd-coredump@0-423-0.service: Deactivated successfully.
Jul 21 22:21:30 t60 systemd[1]: Started Process Core Dump (PID 427/UID 0).
Jul 21 22:21:30 t60 kernel: audit: type=1130 audit(1689978090.419:38): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-coredump@1-427-0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 21 22:21:30 t60 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-coredump@1-427-0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 21 22:21:30 t60 systemd-coredump[431]: Process 358 (login) of user 0 dumped core.
Stack trace of thread 358:
#0 0x00000000b7efb549 __kernel_vsyscall (linux-gate.so.1 + 0x549)
#1 0x00000000b7d5dbb7 n/a (libc.so.6 + 0x89bb7)
#2 0x00000000b7d09e07 raise (libc.so.6 + 0x35e07)
#3 0x00000000b7cf2126 abort (libc.so.6 + 0x1e126)
#4 0x00000000b7cf3040 n/a (libc.so.6 + 0x1f040)
#5 0x00000000b7d6951d n/a (libc.so.6 + 0x9551d)
#6 0x00000000b7d6b473 n/a (libc.so.6 + 0x97473)
#7 0x00000000b7d6ddf7 __libc_free (libc.so.6 + 0x99df7)
#8 0x00000000b7c72b8b n/a (pam_systemd_home.so + 0x44b8b)
#9 0x00000000b7c72c49 n/a (pam_systemd_home.so + 0x44c49)
#10 0x00000000b7c3d148 n/a (pam_systemd_home.so + 0xf148)
#11 0x00000000b7ed5511 n/a (libpam.so.0 + 0x2511)
#12 0x00000000b7ed6092 pam_end (libpam.so.0 + 0x3092)
#13 0x00000000004d4c4e n/a (login + 0x3c4e)
#14 0x00000000b7cf3629 n/a (libc.so.6 + 0x1f629)
#15 0x00000000b7cf36ed __libc_start_main (libc.so.6 + 0x1f6ed)
#16 0x00000000004d5beb n/a (login + 0x4beb)
ELF object binary architecture: Intel 80386
Jul 21 22:21:30 t60 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=getty@tty1 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 21 22:21:30 t60 kernel: audit: type=1131 audit(1689978090.586:39): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=getty@tty1 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 21 22:21:30 t60 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=systemd-coredump@1-427-0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 21 22:21:30 t60 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=getty@tty1 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 21 22:21:30 t60 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=getty@tty1 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 21 22:21:30 t60 systemd[1]: getty@tty1.service: Deactivated successfully.
Jul 21 22:21:30 t60 systemd[1]: systemd-coredump@1-427-0.service: Deactivated successfully.
Jul 21 22:21:30 t60 systemd[1]: getty@tty1.service: Scheduled restart job, restart counter is at 1.
Jul 21 22:21:30 t60 systemd[1]: Stopped Getty on tty1.
Jul 21 22:21:30 t60 systemd[1]: Started Getty on tty1.
Jul 21 22:21:30 t60 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=getty@tty1 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 21 22:21:37 t60 audit[437]: USER_AUTH pid=437 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:authentication grantors=pam_securetty,pam_shells,pam_faillock,pam_permit,pam_faillock acct="root" exe="/usr/bin/login" hostname=t60 addr=? terminal=/dev/tty1 res=success'
Jul 21 22:21:37 t60 audit[437]: USER_ACCT pid=437 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_permit,pam_time acct="root" exe="/usr/bin/login" hostname=t60 addr=? terminal=/dev/tty1 res=success'
Jul 21 22:21:37 t60 audit[437]: CRED_ACQ pid=437 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_securetty,pam_shells,pam_faillock,pam_permit,pam_faillock acct="root" exe="/usr/bin/login" hostname=t60 addr=? terminal=/dev/tty1 res=success'
Jul 21 22:21:37 t60 kernel: kauditd_printk_skb: 4 callbacks suppressed
Jul 21 22:21:37 t60 kernel: audit: type=1100 audit(1689978097.863:44): pid=437 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:authentication grantors=pam_securetty,pam_shells,pam_faillock,pam_permit,pam_faillock acct="root" exe="/usr/bin/login" hostname=t60 addr=? terminal=/dev/tty1 res=success'
Jul 21 22:21:37 t60 kernel: audit: type=1101 audit(1689978097.863:45): pid=437 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_permit,pam_time acct="root" exe="/usr/bin/login" hostname=t60 addr=? terminal=/dev/tty1 res=success'
Jul 21 22:21:37 t60 kernel: audit: type=1103 audit(1689978097.863:46): pid=437 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_securetty,pam_shells,pam_faillock,pam_permit,pam_faillock acct="root" exe="/usr/bin/login" hostname=t60 addr=? terminal=/dev/tty1 res=success'
Jul 21 22:21:37 t60 kernel: audit: type=1006 audit(1689978097.863:47): pid=437 uid=0 old-auid=4294967295 auid=0 tty=tty1 old-ses=4294967295 ses=2 res=1
Jul 21 22:21:37 t60 kernel: audit: type=1300 audit(1689978097.863:47): arch=40000003 syscall=4 success=yes exit=1 a0=4 a1=bfc35f3a a2=1 a3=b7f3ae54 items=0 ppid=1 pid=437 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=tty1 ses=2 comm="login" exe="/usr/bin/login" key=(null)
Jul 21 22:21:37 t60 kernel: audit: type=1327 audit(1689978097.863:47): proctitle=2F62696E2F6C6F67696E002D70002D2D
Jul 21 22:21:37 t60 audit[437]: SYSCALL arch=40000003 syscall=4 success=yes exit=1 a0=4 a1=bfc35f3a a2=1 a3=b7f3ae54 items=0 ppid=1 pid=437 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=tty1 ses=2 comm="login" exe="/usr/bin/login" key=(null)
Jul 21 22:21:37 t60 audit: PROCTITLE proctitle=2F62696E2F6C6F67696E002D70002D2D
Jul 21 22:21:37 t60 login[437]: pam_unix(login:session): session opened for user root(uid=0) by LOGIN(uid=0)
Jul 21 22:21:37 t60 systemd[1]: Created slice User Slice of UID 0.
Jul 21 22:21:37 t60 systemd[1]: Starting User Runtime Directory /run/user/0...
Jul 21 22:21:37 t60 systemd-logind[253]: New session 2 of user root.
Jul 21 22:21:37 t60 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 21 22:21:37 t60 kernel: audit: type=1130 audit(1689978097.923:48): pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user-runtime-dir@0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 21 22:21:37 t60 systemd[1]: Finished User Runtime Directory /run/user/0.
Jul 21 22:21:37 t60 systemd[1]: Starting User Manager for UID 0...
Jul 21 22:21:37 t60 audit[441]: USER_ACCT pid=441 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_permit,pam_time acct="root" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 21 22:21:37 t60 systemd[441]: pam_warn(systemd-user:setcred): function=[pam_sm_setcred] flags=0x8002 service=[systemd-user] terminal=[] user=[root] ruser=[<unknown>] rhost=[<unknown>]
Jul 21 22:21:37 t60 audit[441]: CRED_ACQ pid=441 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=? acct="root" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
Jul 21 22:21:37 t60 kernel: audit: type=1101 audit(1689978097.939:49): pid=441 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_permit,pam_time acct="root" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 21 22:21:37 t60 kernel: audit: type=1103 audit(1689978097.939:50): pid=441 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=? acct="root" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed'
Jul 21 22:21:37 t60 audit[441]: SYSCALL arch=40000003 syscall=4 success=yes exit=1 a0=9 a1=bff6dcba a2=1 a3=b7963e54 items=0 ppid=1 pid=441 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=3 comm="(systemd)" exe="/usr/lib/systemd/systemd" key=(null)
Jul 21 22:21:37 t60 audit: PROCTITLE proctitle="(systemd)"
Jul 21 22:21:37 t60 systemd[441]: pam_unix(systemd-user:session): session opened for user root(uid=0) by (uid=0)
Jul 21 22:21:37 t60 kernel: audit: type=1006 audit(1689978097.943:51): pid=441 uid=0 old-auid=4294967295 auid=0 tty=(none) old-ses=4294967295 ses=3 res=1
Jul 21 22:21:37 t60 audit[441]: USER_START pid=441 uid=0 auid=0 ses=3 msg='op=PAM:session_open grantors=pam_loginuid,pam_loginuid,pam_keyinit,pam_systemd_home,pam_limits,pam_unix,pam_permit,pam_mail,pam_systemd,pam_env acct="root" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 21 22:21:37 t60 audit: BPF prog-id=2 op=LOAD
Jul 21 22:21:37 t60 audit[441]: SYSCALL arch=40000003 syscall=357 success=yes exit=8 a0=5 a1=bfc4e3a8 a2=74 a3=0 items=0 ppid=1 pid=441 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=3 comm="systemd" exe="/usr/lib/systemd/systemd" key=(null)
Jul 21 22:21:37 t60 audit: PROCTITLE proctitle="(systemd)"
Jul 21 22:21:37 t60 audit: BPF prog-id=2 op=UNLOAD
Jul 21 22:21:38 t60 systemd[441]: Queued start job for default target Main User Target.
Jul 21 22:21:38 t60 systemd[441]: Created slice User Application Slice.
Jul 21 22:21:38 t60 systemd[441]: Reached target Paths.
Jul 21 22:21:38 t60 systemd[441]: Reached target Timers.
Jul 21 22:21:38 t60 systemd[441]: Starting D-Bus User Message Bus Socket...
Jul 21 22:21:38 t60 systemd[441]: Listening on GnuPG network certificate management daemon.
Jul 21 22:21:38 t60 systemd[441]: Listening on GnuPG cryptographic agent and passphrase cache (access for web browsers).
Jul 21 22:21:38 t60 systemd[441]: Listening on GnuPG cryptographic agent and passphrase cache (restricted).
Jul 21 22:21:38 t60 systemd[441]: Listening on GnuPG cryptographic agent (ssh-agent emulation).
Jul 21 22:21:38 t60 systemd[441]: Listening on GnuPG cryptographic agent and passphrase cache.
Jul 21 22:21:38 t60 systemd[441]: Listening on p11-kit server.
Jul 21 22:21:38 t60 systemd[441]: Sound System was skipped because of an unmet condition check (ConditionUser=!root).
Jul 21 22:21:38 t60 systemd[441]: Listening on D-Bus User Message Bus Socket.
Jul 21 22:21:38 t60 systemd[441]: Reached target Sockets.
Jul 21 22:21:38 t60 systemd[441]: Reached target Basic System.
Jul 21 22:21:38 t60 systemd[1]: Started User Manager for UID 0.
Jul 21 22:21:38 t60 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 msg='unit=user@0 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul 21 22:21:38 t60 systemd[441]: Reached target Main User Target.
Jul 21 22:21:38 t60 systemd[441]: Startup finished in 484ms.
Jul 21 22:21:38 t60 systemd[1]: Started Session 2 of User root.
Jul 21 22:21:38 t60 audit[437]: USER_START pid=437 uid=0 auid=0 ses=2 msg='op=PAM:session_open grantors=pam_loginuid,pam_keyinit,pam_systemd_home,pam_limits,pam_unix,pam_permit,pam_mail,pam_systemd,pam_env acct="root" exe="/usr/bin/login" hostname=t60 addr=? terminal=/dev/tty1 res=success'
Jul 21 22:21:38 t60 audit[437]: CRED_REFR pid=437 uid=0 auid=0 ses=2 msg='op=PAM:setcred grantors=pam_securetty,pam_shells,pam_faillock,pam_permit,pam_faillock acct="root" exe="/usr/bin/login" hostname=t60 addr=? terminal=/dev/tty1 res=success'
Jul 21 22:21:38 t60 login[437]: ROOT LOGIN ON tty1
What i can do with that? Is there is a way to at least disable pam_auth somehow?
Last edited by uwuster (2023-07-24 00:38:47)
Offline
It does not affect users or sudo. Is this kind of system limitations?
Offline
I rather suspect a bug in pam_systemd. :->
This can be disabled in /etc/pam.d/system-auth and /etc/pam.d/system-login.
Per default they are prefixed with a '-' (ignore PAM result), just try to comment them out (all of them!)
Offline
just try to comment them out (all of them!)
Well, now it works, thank you!
Offline
Well...
It didnt change anything. How annoying... ;(
Because i did it wrong, lol.
So i change all -auth and -login to #-auth and #-login and problem is gone, but now i unable to startxfce4 under user profile 'Cannot open /dev/tty0 (Permission denied)' and if i use sudo or su xfce load my root session. Is it because of me who installed xfce under root?
Last edited by uwuster (2023-07-24 01:46:29)
Offline