SELinux is preventing key.dns_resolve from setattr access on the key labeled kernel_t.

2024-05-30 Thread Go Canes
I have been getting the following SElinux alert: SELinux is preventing key.dns_resolve from setattr access on the key labeled kernel_t. Is it safe to create a rule to ignore this? Known issue? -- ___ users mailing list -- users@lists.fedoraproject.org

Re: SELinux is preventing mktemp from using the dac_read_search capability.

2022-01-06 Thread Roger Heflin
dac_read_search says that linux permissions are denying access. and it says the file is /etc/shadow, and no one except root is supposed to be able to read that file. So whatever is trying to read /etc/shadow should not be trying to read it, and makes me wonder what is going on, and/or why some pr

Re: SELinux is preventing mktemp from using the dac_read_search capability.

2022-01-06 Thread Robert Moskowitz
On 1/6/22 11:53, George N. White III wrote: On Thu, 6 Jan 2022 at 11:13, Robert Moskowitz wrote: On 1/5/22 23:10, Samuel Sieb wrote: > On 1/5/22 18:18, Robert Moskowitz wrote: >> On 1/5/22 21:16, Ed Greshko wrote: >>> On 06/01/2022 09:25, Robert Moskowitz wrote:

Re: SELinux is preventing mktemp from using the dac_read_search capability.

2022-01-06 Thread George N. White III
On Thu, 6 Jan 2022 at 11:13, Robert Moskowitz wrote: > > > On 1/5/22 23:10, Samuel Sieb wrote: > > On 1/5/22 18:18, Robert Moskowitz wrote: > >> On 1/5/22 21:16, Ed Greshko wrote: > >>> On 06/01/2022 09:25, Robert Moskowitz wrote: > > > On 1/5/22 17:17, Ed Greshko wrote: > > On

Re: SELinux is preventing mktemp from using the dac_read_search capability.

2022-01-06 Thread Robert Moskowitz
On 1/5/22 23:10, Samuel Sieb wrote: On 1/5/22 18:18, Robert Moskowitz wrote: On 1/5/22 21:16, Ed Greshko wrote: On 06/01/2022 09:25, Robert Moskowitz wrote: On 1/5/22 17:17, Ed Greshko wrote: On 05/01/2022 21:02, Robert Moskowitz wrote: If you want to help identify if domain needs this

Re: SELinux is preventing mktemp from using the dac_read_search capability.

2022-01-05 Thread Samuel Sieb
On 1/5/22 18:18, Robert Moskowitz wrote: On 1/5/22 21:16, Ed Greshko wrote: On 06/01/2022 09:25, Robert Moskowitz wrote: On 1/5/22 17:17, Ed Greshko wrote: On 05/01/2022 21:02, Robert Moskowitz wrote: If you want to help identify if domain needs this access or you have a file with the wro

Re: SELinux is preventing mktemp from using the dac_read_search capability.

2022-01-05 Thread Robert Moskowitz
one seems to be home. Here is the full detail; it looks like it may be logwatch causing the problem.  What do I do to fix this? === SELinux is preventing mktemp from using the dac_read_search capability. *  Plugin dac_override (91.4 confidence) suggests

Re: SELinux is preventing mktemp from using the dac_read_search capability.

2022-01-05 Thread Ed Greshko
full detail; it looks like it may be logwatch causing the problem.  What do I do to fix this? === SELinux is preventing mktemp from using the dac_read_search capability. *  Plugin dac_override (91.4 confidence) suggests ** If you want to help identify if domain

Re: SELinux is preventing mktemp from using the dac_read_search capability.

2022-01-05 Thread Robert Moskowitz
causing the problem.  What do I do to fix this? === SELinux is preventing mktemp from using the dac_read_search capability. *  Plugin dac_override (91.4 confidence) suggests ** If you want to help identify if domain needs this access or you have a file with

Re: SELinux is preventing mktemp from using the dac_read_search capability.

2022-01-05 Thread Ed Greshko
fix this? === SELinux is preventing mktemp from using the dac_read_search capability. *  Plugin dac_override (91.4 confidence) suggests ** If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system Then

SELinux is preventing mktemp from using the dac_read_search capability.

2022-01-05 Thread Robert Moskowitz
I keep getting these errors. I got them back with F32 and Xfce, and now with F35 and Xfce. I asked on the SElinux list, but no one seems to be home. Here is the full detail; it looks like it may be logwatch causing the problem.  What do I do to fix this? === SELinux is

SELinux is preventing mktemp from using the dac_read_search capability.

2020-05-06 Thread Robert Moskowitz
I had this on F30 and pretty much ignored it.  Now I am getting it on this new F32 install: What daily process is causing this? SELinux is preventing mktemp from using the dac_read_search capability. *  Plugin dac_override (91.4 confidence) suggests ** If you want to

Re: SELinux is preventing rsyslogd from getattr access on the file

2015-10-22 Thread Daniel J Walsh
Looks like it wants you to fix your labels on /var/log restorecon -R -v /var/log On 10/22/2015 11:00 AM, Neal Becker wrote: > Oct 22 10:59:22 nbecker2 setroubleshoot: Plugin Exception restorecon_source > Oct 22 10:59:22 nbecker2 setroubleshoot: SELinux is preventing rsyslogd from >

SELinux is preventing rsyslogd from getattr access on the file

2015-10-22 Thread Neal Becker
Oct 22 10:59:22 nbecker2 setroubleshoot: Plugin Exception restorecon_source Oct 22 10:59:22 nbecker2 setroubleshoot: SELinux is preventing rsyslogd from getattr access on the file /var/log/journal/fccec5c8cc894bf498ba8ffed7383cd0/user-1000@000522048e0844a5- c0bb6e169852fd4d.journal~. For

Re: doing docker build, "SELinux is preventing /usr/libexec/abrt-hook-ccpp from using the sigchld access on a process.", kills wireless

2015-08-20 Thread Daniel J Walsh
gt;>>>MAINTAINER Robert P. J. Day >>>>>>>>ENV REFRESHED_AT 2015-08-18 >>>>>>>> >>>>>>>>RUN apt-get -y -q update && apt-get -y -q install nginx >>>>>>>>... snip ... >>

Re: doing docker build, "SELinux is preventing /usr/libexec/abrt-hook-ccpp from using the sigchld access on a process.", kills wireless

2015-08-19 Thread Robert P. J. Day
R Robert P. J. Day > >>>>>>ENV REFRESHED_AT 2015-08-18 > >>>>>> > >>>>>>RUN apt-get -y -q update && apt-get -y -q install nginx > >>>>>>... snip ... > >>>>>> > >&

Re: doing docker build, "SELinux is preventing /usr/libexec/abrt-hook-ccpp from using the sigchld access on a process.", kills wireless

2015-08-19 Thread Rick Stevens
-y -q install nginx ... snip ... and it was *entirely* reproducible that the instant docker started to process that "RUN apt-get" command, the wireless connection on my Fedora 22 laptop was blown away. grabbed this from SELinux: ===== start = SELinux is preventing /usr/libexec/ab

Re: doing docker build, "SELinux is preventing /usr/libexec/abrt-hook-ccpp from using the sigchld access on a process.", kills wireless

2015-08-19 Thread Daniel J Walsh
On 08/19/2015 08:03 AM, Robert P. J. Day wrote: > On Wed, 19 Aug 2015, Daniel J Walsh wrote: > >> With SELinux disabled you should not be getting any AVC's >> >> If you turn SELInux back on and do a full relabel, I think the problem >> will go away. >> >> Something is crashing though which is cau

Re: doing docker build, "SELinux is preventing /usr/libexec/abrt-hook-ccpp from using the sigchld access on a process.", kills wireless

2015-08-19 Thread Robert P. J. Day
>>>> > >>>> and it was *entirely* reproducible that the instant docker started to > >>>> process that "RUN apt-get" command, the wireless connection on my > >>>> Fedora 22 laptop was blown away. grabbed this from SELinux: > >>>> > &

Re: doing docker build, "SELinux is preventing /usr/libexec/abrt-hook-ccpp from using the sigchld access on a process.", kills wireless

2015-08-19 Thread Robert P. J. Day
On Wed, 19 Aug 2015, Daniel J Walsh wrote: > With SELinux disabled you should not be getting any AVC's > > If you turn SELInux back on and do a full relabel, I think the problem > will go away. > > Something is crashing though which is causing the AVC as in, enabled and not just permissive? rd

Re: doing docker build, "SELinux is preventing /usr/libexec/abrt-hook-ccpp from using the sigchld access on a process.", kills wireless

2015-08-19 Thread Daniel J Walsh
2015-08-18 >>>> >>>> RUN apt-get -y -q update && apt-get -y -q install nginx >>>> ... snip ... >>>> >>>> and it was *entirely* reproducible that the instant docker started to >>>> process that "RUN apt-get&quo

Re: doing docker build, "SELinux is preventing /usr/libexec/abrt-hook-ccpp from using the sigchld access on a process.", kills wireless

2015-08-19 Thread Robert P. J. Day
nstall nginx > >> ... snip ... > >> > >> and it was *entirely* reproducible that the instant docker started to > >> process that "RUN apt-get" command, the wireless connection on my > >> Fedora 22 laptop was blown away. grabbed this from SELinu

Re: doing docker build, "SELinux is preventing /usr/libexec/abrt-hook-ccpp from using the sigchld access on a process.", kills wireless

2015-08-19 Thread Daniel J Walsh
tant docker started to >> process that "RUN apt-get" command, the wireless connection on my >> Fedora 22 laptop was blown away. grabbed this from SELinux: >> >> = start = >> >> SELinux is preventing /usr/libexec/abrt-hook-ccpp from using the sigch

Re: doing docker build, "SELinux is preventing /usr/libexec/abrt-hook-ccpp from using the sigchld access on a process.", kills wireless

2015-08-19 Thread Robert P. J. Day
n my > Fedora 22 laptop was blown away. grabbed this from SELinux: > > = start = > > SELinux is preventing /usr/libexec/abrt-hook-ccpp from using the sigchld > access on a process. > > * Plugin catchall (100. confidence) suggests ** > &

doing docker build, "SELinux is preventing /usr/libexec/abrt-hook-ccpp from using the sigchld access on a process.", kills wireless

2015-08-18 Thread Robert P. J. Day
apt-get -y -q install nginx ... snip ... and it was *entirely* reproducible that the instant docker started to process that "RUN apt-get" command, the wireless connection on my Fedora 22 laptop was blown away. grabbed this from SELinux: ===== start = SELinux is preventing /usr/libe

Re: SELinux is preventing sh from getattr access on the file /usr/sbin/ldconfig.

2015-07-01 Thread Andras Simon
n wrote: > >>> 2015-06-27 15:11 GMT+02:00, Andras Simon : > >>>> Should I be worried about the $subject? > >>> And there's also a "SELinux is preventing sh from execute access on > >>> the file /usr/sbin/ldconfig" which I've onl

Re: SELinux is preventing sh from getattr access on the file /usr/sbin/ldconfig.

2015-07-01 Thread Daniel J Walsh
t;>> On 06/27/15 21:15, Andras Simon wrote: >>>>> 2015-06-27 15:11 GMT+02:00, Andras Simon : >>>>>> Should I be worried about the $subject? >>>>> And there's also a "SELinux is preventing sh from execute access on >>>>> the fil

Re: SELinux is preventing sh from getattr access on the file /usr/sbin/ldconfig.

2015-06-30 Thread Ed Greshko
> 2015-06-27 15:11 GMT+02:00, Andras Simon : >>>>> Should I be worried about the $subject? >>>> And there's also a "SELinux is preventing sh from execute access on >>>> the file /usr/sbin/ldconfig" which I've only just noticed. It sound

Re: SELinux is preventing sh from getattr access on the file /usr/sbin/ldconfig.

2015-06-30 Thread Daniel J Walsh
worried about the $subject? >>> And there's also a "SELinux is preventing sh from execute access on >>> the file /usr/sbin/ldconfig" which I've only just noticed. It sounds >>> even scarier. >>> >> Does your output match these? >> >&

Re: SELinux is preventing sh from getattr access on the file /usr/sbin/ldconfig.

2015-06-29 Thread Andras Simon
[Sorry for the late answer, I was away from this machine.] 2015-06-28 1:01 GMT+02:00, Ed Greshko : > On 06/27/15 21:15, Andras Simon wrote: >> 2015-06-27 15:11 GMT+02:00, Andras Simon : >>> Should I be worried about the $subject? >> And there's also a "SELinux is

Re: SELinux is preventing sh from getattr access on the file /usr/sbin/ldconfig.

2015-06-29 Thread Suvayu Ali
Hi Dan, On Mon, Jun 29, 2015 at 06:09:29AM -0400, Daniel J Walsh wrote: > On 06/28/2015 07:53 AM, Suvayu Ali wrote: > > > > time->Thu Jun 25 17:56:49 2015 I looked up dnf history for that time, the summary is attached. > This is very strange. Doing ldconfig during a package update is > expected

Re: SELinux is preventing sh from getattr access on the file /usr/sbin/ldconfig.

2015-06-29 Thread Ed Greshko
On 06/29/15 18:18, Daniel J Walsh wrote: > Ok well I am stumped, one possible thing would be if firewalld somehow > caused an rpm/yum/dnf transaction to happen. Well, my ausearch -m avc gave me entries for only time->Sun Jun 21 08:20:44 2015. I checked my dnf.rpm.logs and this was happening at th

Re: SELinux is preventing sh from getattr access on the file /usr/sbin/ldconfig.

2015-06-29 Thread Daniel J Walsh
gt;> On 06/27/15 21:15, Andras Simon wrote: >>>>>> 2015-06-27 15:11 GMT+02:00, Andras Simon : >>>>>>> Should I be worried about the $subject? >>>>>> And there's also a "SELinux is preventing sh from execute access on >>>>>

Re: SELinux is preventing sh from getattr access on the file /usr/sbin/ldconfig.

2015-06-29 Thread Ed Greshko
gt;> 2015-06-27 15:11 GMT+02:00, Andras Simon : >>>>>> Should I be worried about the $subject? >>>>> And there's also a "SELinux is preventing sh from execute access on >>>>> the file /usr/sbin/ldconfig" which I've only just noticed. I

Re: SELinux is preventing sh from getattr access on the file /usr/sbin/ldconfig.

2015-06-29 Thread Daniel J Walsh
>>> Should I be worried about the $subject? >>>> And there's also a "SELinux is preventing sh from execute access on >>>> the file /usr/sbin/ldconfig" which I've only just noticed. It sounds >>>> even scarier. >>>> >>

Re: SELinux is preventing sh from getattr access on the file /usr/sbin/ldconfig.

2015-06-28 Thread Suvayu Ali
On Sun, Jun 28, 2015 at 06:04:38AM -0400, Daniel J Walsh wrote: > > > On 06/27/2015 07:01 PM, Ed Greshko wrote: > > On 06/27/15 21:15, Andras Simon wrote: > >> 2015-06-27 15:11 GMT+02:00, Andras Simon : > >>> Should I be worried about the $subject? > >&

Re: SELinux is preventing sh from getattr access on the file /usr/sbin/ldconfig.

2015-06-28 Thread Ed Greshko
On 06/28/15 18:04, Daniel J Walsh wrote: > > On 06/27/2015 07:01 PM, Ed Greshko wrote: >> On 06/27/15 21:15, Andras Simon wrote: >>> 2015-06-27 15:11 GMT+02:00, Andras Simon : >>>> Should I be worried about the $subject? >>> And there's also a &

Re: SELinux is preventing sh from getattr access on the file /usr/sbin/ldconfig.

2015-06-28 Thread Daniel J Walsh
On 06/27/2015 07:01 PM, Ed Greshko wrote: > On 06/27/15 21:15, Andras Simon wrote: >> 2015-06-27 15:11 GMT+02:00, Andras Simon : >>> Should I be worried about the $subject? >> And there's also a "SELinux is preventing sh from execute access on >> the file

Re: SELinux is preventing sh from getattr access on the file /usr/sbin/ldconfig.

2015-06-27 Thread Ed Greshko
On 06/27/15 21:15, Andras Simon wrote: > 2015-06-27 15:11 GMT+02:00, Andras Simon : >> Should I be worried about the $subject? > And there's also a "SELinux is preventing sh from execute access on > the file /usr/sbin/ldconfig" which I've only just noticed. It

Re: SELinux is preventing sh from getattr access on the file /usr/sbin/ldconfig.

2015-06-27 Thread Andras Simon
2015-06-27 15:11 GMT+02:00, Andras Simon : > Should I be worried about the $subject? And there's also a "SELinux is preventing sh from execute access on the file /usr/sbin/ldconfig" which I've only just noticed. It sounds even scarier. Andras -- users mailing list users@

SELinux is preventing sh from getattr access on the file /usr/sbin/ldconfig.

2015-06-27 Thread Andras Simon
Should I be worried about the $subject? Andras -- users mailing list users@lists.fedoraproject.org To unsubscribe or change subscription options: https://admin.fedoraproject.org/mailman/listinfo/users Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct Guidelines: http://fedoraprojec

Re: SELinux is preventing chrome-sandbox from write access on the file oom_score_adj.

2015-04-16 Thread Joe Zeff
On 04/16/2015 12:58 PM, Patrick O'Callaghan wrote: On Thu, 2015-04-16 at 09:32 -0600, Lawrence E Graves wrote: If you believe that chrome-sandbox should be allowed write access on the oom_score_adj file by default. Then you should report this as a bug. Did you? My thoughts exactly. Putting

Re: SELinux is preventing chrome-sandbox from write access on the file oom_score_adj.

2015-04-16 Thread Patrick O'Callaghan
On Thu, 2015-04-16 at 09:32 -0600, Lawrence E Graves wrote: > If you believe that chrome-sandbox should be allowed write access on > the oom_score_adj file by default. > Then you should report this as a bug. Did you? poc -- users mailing list users@lists.fedoraproject.org To unsubscribe or chan

SELinux is preventing chrome-sandbox from write access on the file oom_score_adj.

2015-04-16 Thread Lawrence E Graves
SELinux is preventing chrome-sandbox from write access on the file oom_score_adj. * Plugin chrome (98.5 confidence) suggests If you want to use the plugin package Then you must turn off SELinux controls on the Chrome plugins. Do # setsebool -P

Re: SELinux is preventing abrt-dump-journ from read access on the file /usr/lib64/libreport.so.0.

2015-03-22 Thread Daniel J Walsh
On 03/21/2015 02:03 PM, Lawrence E Graves wrote: > SELinux is preventing abrt-dump-journ from read access on the file > /usr/lib64/libreport.so.0. > > * Plugin restorecon (82.4 confidence) suggests > > > If you want to fix the label. > /

Re: SELinux is preventing mkdir from write access on the directory root.

2015-03-21 Thread Chris Murphy
# ls -lZ / root should have label dr-xr-x---. 3 root root system_u:object_r:admin_home_t:s0 4096 Mar 21 11:44 root If it doesn't. restorecon -rv / Chris Murphy -- users mailing list users@lists.fedoraproject.org To unsubscribe or change subscription options: https://admin.fedoraproject.org/

SELinux is preventing abrt-dump-journ from read access on the file /usr/lib64/libreport.so.0.

2015-03-21 Thread Lawrence E Graves
SELinux is preventing abrt-dump-journ from read access on the file /usr/lib64/libreport.so.0. * Plugin restorecon (82.4 confidence) suggests If you want to fix the label. /usr/lib64/libreport.so.0 default label should be lib_t. Then you can run restorecon. Do

SELinux is preventing mkdir from write access on the directory root.

2015-03-21 Thread Lawrence E Graves
SELinux is preventing mkdir from write access on the directory root. * Plugin catchall (100. confidence) suggests ** If you believe that mkdir should be allowed write access on the root directory by default. Then you should report this as a bug. You can generate a

Re: SELinux is preventing......

2013-02-21 Thread Eddie O'Connor
ing I need to do to get > these alerts and warnings to cease? Any help would be appreciated! > > Thanx! > > > EGO II > > > SELinux is preventing /usr/lib/systemd/systemd-**hostnamed from open > access on the file /sys/devices/virtual/dmi/id/**chass

Re: SELinux is preventing......

2013-02-21 Thread Daniel J Walsh
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 02/21/2013 07:23 AM, Roger wrote: That is a permissive domain so actually nothing was being blocked by the access. It should be fixed in the next update. -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.13 (GNU/Linux) Comment: Using GnuPG with Th

Re: SELinux is preventing......

2013-02-20 Thread Roger
On 02/21/2013 03:12 PM, Shane wrote: On 02/20/2013 09:50 PM, Eddie G. O'Connor Jr. wrote: I kep receiving messages like this every now and thenI'm just wondering.should I be concerned? Is there something I need to do to get these alerts and warnings to cease? Any help would be apprecia

Re: SELinux is preventing......

2013-02-20 Thread Shane
same issue today. It's a bug: https://bugzilla.redhat.com/show_bug.cgi?id=912616 . A fix was pushed yesterday. I'm waiting on the fix. Shane Thanx! EGO II SELinux is preventing /usr/lib/systemd/systemd-hostnamed from open access on the file /sys/devices/virtual

SELinux is preventing......

2013-02-20 Thread Eddie G. O'Connor Jr.
I kep receiving messages like this every now and thenI'm just wondering.should I be concerned? Is there something I need to do to get these alerts and warnings to cease? Any help would be appreciated! Thanx! EGO II SELinux is preventing /usr/lib/systemd/systemd-hostnamed from

Re: SELinux is preventing /usr/bin/totem-video-thumbnailer from create access on the directory .gstreamer-0.10

2012-08-27 Thread Daniel J Walsh
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 08/24/2012 12:51 PM, SES wrote: > I keep getting this security warning- anyone have any ideas?: > > SELinux is preventing /usr/bin/totem-video-thumbnailer from create access > on the directory .gstreamer-0.10 > > > Thanks!

Re: SELinux is preventing /usr/bin/totem-video-thumbnailer from create access on the directory .gstreamer-0.10

2012-08-24 Thread Michael Cronenworth
SES wrote: > I keep getting this security warning- anyone have any ideas?: > > SELinux is preventing /usr/bin/totem-video-thumbnailer from create > access on the directory .gstreamer-0.10 Please run this command and reply with the output: $ restorecon -Rv ~/.gstreamer-0.10 See if

SELinux is preventing /usr/bin/totem-video-thumbnailer from create access on the directory .gstreamer-0.10

2012-08-24 Thread SES
I keep getting this security warning- anyone have any ideas?: SELinux is preventing /usr/bin/totem-video-thumbnailer from create access on the directory .gstreamer-0.10 Thanks! SES -- "mysterium fide" THIS MESSAGE IS INTENDED ONLY FOR THE USE OF THE INDIVIDUAL OR ENTITY TO W

Re: help: SELinux is preventing /usr/libexec/accounts-daemon....

2012-02-17 Thread T.C. Hollingsworth
On Fri, Feb 17, 2012 at 1:26 PM, SES wrote: > What's up with these errors...they are persistant? see below... > > Thanks for your patience...I love Fedora! > > SES > > SELinux is preventing /usr/libexec/accounts-daemon from read access on > the file cpuinfo. Are yo

help: SELinux is preventing /usr/libexec/accounts-daemon....

2012-02-17 Thread SES
What's up with these errors...they are persistant? see below... Thanks for your patience...I love Fedora! SES SELinux is preventing /usr/libexec/accounts-daemon from read access on the file cpuinfo. * Plugin catchall (100. confidence) suggests *** If you be

Re: SELinux is preventing /bin/bash from execute_no_trans access on the None /opt/brother/Printers/mfcj615w/lpd/filtermfcj615w.

2012-01-27 Thread Joe Zeff
On 01/27/2012 11:37 AM, Lawrence Graves wrote: SELinux is preventing /bin/bash from execute_no_trans access on the None /opt/brother/Printers/mfcj615w/lpd/filtermfcj615w. I'm not sure what you want from us; are you asking for advice, or just reporting the issue? If the former, I'

Re: SELinux is preventing /usr/bin/brprintconf_mfcj615w from write access on the None /opt/brother/Printers/mfcj615w/inf.

2012-01-27 Thread Daniel J Walsh
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 01/27/2012 02:41 PM, Lawrence Graves wrote: > SELinux is preventing /usr/bin/brprintconf_mfcj615w from write > access on the None /opt/brother/Printers/mfcj615w/inf. > > * Plugin catchall (100. confiden

SELinux is preventing /usr/bin/brprintconf_mfcj615w from write access on the None /opt/brother/Printers/mfcj615w/inf.

2012-01-27 Thread Lawrence Graves
SELinux is preventing /usr/bin/brprintconf_mfcj615w from write access on the None /opt/brother/Printers/mfcj615w/inf. * Plugin catchall (100. confidence) suggests *** If you believe that brprintconf_mfcj615w should be allowed write access on the inf by default

SELinux is preventing /bin/bash from execute_no_trans access on the None /opt/brother/Printers/mfcj615w/lpd/filtermfcj615w.

2012-01-27 Thread Lawrence Graves
SELinux is preventing /bin/bash from execute_no_trans access on the None /opt/brother/Printers/mfcj615w/lpd/filtermfcj615w. * Plugin catchall (100. confidence) suggests *** If you believe that bash should be allowed execute_no_trans access on the filtermfcj615w

SELinux is preventing /bin/bash from execute access on the None /opt/brother/Printers/mfcj615w/cupswrapper/brcupsconfpt1.

2012-01-27 Thread Lawrence Graves
SELinux is preventing /bin/bash from execute access on the None /opt/brother/Printers/mfcj615w/cupswrapper/brcupsconfpt1. * Plugin catchall (100. confidence) suggests *** If you believe that bash should be allowed execute access on the brcupsconfpt1 by default

Re: SELinux is preventing /bin/login...access on the file /bin/bash

2011-12-12 Thread jackson byers
some of the SELinux messages seeing now in /mnt/sdc7/var/log/messages on the enforcing=0 relabel attempt: Dec 12 09:21:45 f14 setroubleshoot: SELinux is preventing /usr/bin/gnome-keyring-daemon from execute access on the file /usr/lib/libgp11.so.0.0.0. For complete SELinux messages. run sealert -l 002

Re: SELinux is preventing /bin/login...access on the file /bin/bash

2011-12-12 Thread Alan Stern
On Mon, 12 Dec 2011, Daniel J Walsh wrote: > > Suppose one makes a backup using rsync. What is the proper way to > > back up the security labels along with the data? > > > > I tried using rsync's -X option, which is supposed to preserve > > extended attributes. All that happened was I got a hu

Re: SELinux is preventing /bin/login...access on the file /bin/bash

2011-12-12 Thread Daniel J Walsh
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 12/12/2011 12:38 PM, Alan Stern wrote: > On Mon, 12 Dec 2011, David Quigley wrote: > >> It looks like your backup didn't backup the security labels. How >> did you make the back up? > > Suppose one makes a backup using rsync. What is the proper w

Re: SELinux is preventing /bin/login...access on the file /bin/bash

2011-12-12 Thread Alan Stern
On Mon, 12 Dec 2011, David Quigley wrote: > It looks like your backup didn't backup the security labels. How did > you make the back up? Suppose one makes a backup using rsync. What is the proper way to back up the security labels along with the data? I tried using rsync's -X option, which is

Re: SELinux is preventing /bin/login...access on the file /bin/bash

2011-12-12 Thread David Quigley
4 kernel: [ 99.305929] Xorg:1655 freeing invalid > memtype f88e8000-f88f8000 > Dec 10 10:49:45 f14 kernel: [ 99.305954] Xorg:1655 freeing invalid > memtype f88f8000-f8908000 > > Dec 10 10:49:47 f14 setroubleshoot: SELinux is preventing /bin/login > from entrypoint access on the

SELinux is preventing /bin/login...access on the file /bin/bash

2011-12-11 Thread jackson byers
e f88f8000-f8908000 Dec 10 10:49:47 f14 setroubleshoot: SELinux is preventing /bin/login from entrypoint access on the file /usr/bin/gnome-keyring-da emon. For complete SELinux messages. run sealert -l 78e20e61-45c0-47c7-a7e5-760752d2ae93 Dec 10 10:49:50 f14 setroubleshoot: SELinux is preventing /bin/

Re: SELinux is preventing /usr/libexec/gnome-session-check-accelerated-helper from 'read, write' accesses on the chr_file nvidiactl.

2011-06-07 Thread Mark Eggers
On Tue, 07 Jun 2011 12:28:03 -0700, Joe Zeff wrote: > On 06/07/2011 06:46 AM, Lawrence E Graves wrote: >> SELinux is preventing >> /usr/libexec/gnome-session-check-accelerated-helper from 'read, write' >> accesses on the chr_file nvidiactl. > > Have you tri

Re: SELinux is preventing /usr/libexec/gnome-session-check-accelerated-helper from 'read, write' accesses on the chr_file nvidiactl.

2011-06-07 Thread Joe Zeff
On 06/07/2011 06:46 AM, Lawrence E Graves wrote: > SELinux is preventing /usr/libexec/gnome-session-check-accelerated-helper > from 'read, write' accesses on the chr_file nvidiactl. Have you tried following the instructions SELinux gives you? If so, what happens; if not, wh

Re: SELinux is preventing /usr/libexec/colord from getattr access on the file /usr/local/Brother/sane/models3/ext4.ini.

2011-06-07 Thread Ed Greshko
On 06/07/2011 09:54 PM, Daniel J Walsh wrote: > There is an open bug for this with a fix moving through the process. > Please do not spam the list with these alerts. You may also want to consider trimming your responses to remove the spam :-) -- users mailing list users@lists.fedoraproject.o

Re: SELinux is preventing /usr/libexec/colord from getattr access on the file /usr/local/Brother/sane/models3/ext4.ini.

2011-06-07 Thread Clyde E. Kunkel
On 06/07/2011 09:47 AM, Lawrence E Graves wrote: > SELinux is preventing /usr/libexec/colord from getattr access on the file > /usr/local/Brother/sane/models3/ext4.ini. > > * Plugin catchall (100. confidence) suggests *** > > If you believe tha

Re: SELinux is preventing /usr/libexec/colord from getattr access on the file /usr/local/Brother/sane/models3/ext4.ini.

2011-06-07 Thread Daniel J Walsh
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 06/07/2011 09:47 AM, Lawrence E Graves wrote: > SELinux is preventing /usr/libexec/colord from getattr access on the file > /usr/local/Brother/sane/models3/ext4.ini. > > * Plugin catchall (100. confiden

Re: SELinux is preventing /usr/libexec/gnome-session-check-accelerated-helper from 'read, write' accesses on the chr_file nvidiactl.

2011-06-07 Thread Daniel J Walsh
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 06/07/2011 09:46 AM, Lawrence E Graves wrote: > SELinux is preventing /usr/libexec/gnome-session-check-accelerated-helper > from 'read, write' accesses on the chr_file nvidiactl. > > * Plugin device (91.

SELinux is preventing /usr/libexec/colord from getattr access on the file /usr/local/Brother/sane/models3/ext4.ini.

2011-06-07 Thread Lawrence E Graves
SELinux is preventing /usr/libexec/colord from getattr access on the file /usr/local/Brother/sane/models3/ext4.ini. * Plugin catchall (100. confidence) suggests *** If you believe that colord should be allowed getattr access on the ext4.ini file by default. Then

SELinux is preventing /usr/libexec/gnome-session-check-accelerated-helper from 'read, write' accesses on the chr_file nvidiactl.

2011-06-07 Thread Lawrence E Graves
SELinux is preventing /usr/libexec/gnome-session-check-accelerated-helper from 'read, write' accesses on the chr_file nvidiactl. * Plugin device (91.4 confidence) suggests * If you want to allow gnome-session-check-accelerated-helper to have read wri

SELinux is preventing /usr/libexec/colord from getattr access on the file /usr/local/Brother/sane/models3/ext1.ini.

2011-06-06 Thread Lawrence E Graves
This is what I got when using the command you given me. chcon command SELinux is preventing /usr/libexec/colord from getattr access on the file /usr/local/Brother/sane/models3/ext1.ini. * Plugin catchall (100. confidence) suggests *** If you believe that colord

Re: SELinux is preventing /usr/libexec/colord from getattr access on the file /usr/local/Brother/sane/models3/ext4.ini.

2011-06-06 Thread Daniel J Walsh
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 06/06/2011 08:41 AM, Ed Greshko wrote: > On 06/06/2011 08:19 PM, Lawrence E Graves wrote: >> SELinux is preventing /usr/libexec/colord from getattr access on the file >> /usr/local/Brother/sane/models3/ext4.ini. > > So, you&#

Re: SELinux is preventing /usr/libexec/colord from getattr access on the file /usr/local/Brother/sane/models3/ext4.ini.

2011-06-06 Thread Ed Greshko
On 06/06/2011 08:19 PM, Lawrence E Graves wrote: > SELinux is preventing /usr/libexec/colord from getattr access on the file > /usr/local/Brother/sane/models3/ext4.ini. So, you've installed a package supplied by Brother...and not from the Fedora repository. So, it is certain

SELinux is preventing /usr/libexec/colord from getattr access on the file /usr/local/Brother/sane/models3/ext4.ini.

2011-06-06 Thread Lawrence E Graves
SELinux is preventing /usr/libexec/colord from getattr access on the file /usr/local/Brother/sane/models3/ext4.ini. * Plugin catchall (100. confidence) suggests *** If you believe that colord should be allowed getattr access on the ext4.ini file by default. Then

Re: SELinux is preventing khidpd_0d620558 from write access on the socket Unknown.

2011-04-25 Thread Daniel J Walsh
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 04/23/2011 03:12 PM, Lawrence E Graves wrote: > SELinux is preventing khidpd_0d620558 from write access on the socket Unknown. > > * Plugin catchall (100. confidence) suggests *** > > If y

SELinux is preventing khidpd_0d620558 from write access on the socket Unknown.

2011-04-23 Thread Lawrence E Graves
SELinux is preventing khidpd_0d620558 from write access on the socket Unknown. * Plugin catchall (100. confidence) suggests *** If you believe that khidpd_0d620558 should be allowed write access on the Unknown socket by default. Then you should report this as a bug