Bonjour,
Today I wanted to activate the dictd service on my computer. This failed
and I received a selinux alert: mdadm wanted to access something... No
connection with dictd.
After a few researches, I was sure that selinux was blocking the dictd
start. But the selinux troobleshooter only refers
Le 14/03/2018 à 12:04, Kai Bojens a écrit :
> On 14/03/2018 –– 11:42:47AM +0100, François Patte wrote:
>> Le 14/03/2018 à 11:05, Kai Bojens a écrit :
>>> sealert -a /var/log/audit/audit.log
>
>> Thank you for this answer, but I don't know what to do with the alert
>> message: "I you think that md
On 14/03/2018 –– 11:42:47AM +0100, François Patte wrote:
> Le 14/03/2018 à 11:05, Kai Bojens a écrit :
> > sealert -a /var/log/audit/audit.log
> Thank you for this answer, but I don't know what to do with the alert
> message: "I you think that mdadm should be allowed to access getattr..."
There
Le 14/03/2018 à 11:05, Kai Bojens a écrit :
> sealert -a /var/log/audit/audit.log
Thank you for this answer, but I don't know what to do with the alert
message: "I you think that mdadm should be allowed to access getattr..."
How can I think that I have absolutely no idea!!!
Regards
--
Fran
On 14/03/2018 –– 10:47:19AM +0100, François Patte wrote:
> Why this alert? What should I do?
sealert -a /var/log/audit/audit.log
___
users mailing list -- users@lists.fedoraproject.org
To unsubscribe send an email to users-le...@lists.fedoraproject.org
Le 14/03/2018 à 10:53, Lukas Vrabec a écrit :
> ausearch -m AVC -m USER_AVC -ts today
time->Wed Mar 14 09:49:23 2018
type=AVC msg=audit(1521017363.092:103): avc: denied { unlink } for
pid=1 comm="systemd" name="request" dev="dm-6" ino=393224
scontext=system_u:system_r:init_t:s0 tcontext=system_u
On 03/14/2018 10:47 AM, François Patte wrote:
> Bonjour,
>
> I have some alerts from selinux, for instance:
>
> SELinux prevent mdadm to access getattr on file
> /dev/shm/lttng-ust-wait-7-972
>
> Why this alert? What should I do?
>
> This is not the only one, how to configure selinux to act in
Bonjour,
I have some alerts from selinux, for instance:
SELinux prevent mdadm to access getattr on file
/dev/shm/lttng-ust-wait-7-972
Why this alert? What should I do?
This is not the only one, how to configure selinux to act in a "normal"
way: leave regular processes to access what they need t
On 10/28/2015 03:56 PM, Paolo Galtieri wrote:
Note that on the failing system the selinux context shows the
directory has unlabeled_t context while on the working system it's
colord_var_lib_t. I set this at some point (I think), but I forget
how I did it
Possibly check the root user's shell
On 10/28/2015 03:56 PM, Paolo Galtieri wrote:
I have 2 systems running f22. On these 2 systems I have setup snort. On
both these systems snort logs to directory /var/log/snort. On both
these systems /var/log/snort is owned by user snort and group snort.
However, on one of the systems I cannot w
On 10/29/2015 06:56 AM, Paolo Galtieri wrote:
> On the system that fails
>
> /bin/ls -ldZ /var/log/snort
> lrwxrwxrwx. 1 root root unconfined_u:object_r:snort_log_t:s0 44 Oct 24
> 17:29 /var/log/snort -> /run/media/pgaltieri/NEWDATA2/NSM/logs/snort
>
> /bin/ls -ldZ /run/media/pgaltieri/NEWDATA2/N
I have 2 systems running f22. On these 2 systems I have setup snort.
On both these systems snort logs to directory /var/log/snort. On both
these systems /var/log/snort is owned by user snort and group snort.
However, on one of the systems I cannot write to /var/log/snort as user
snort.
On
On 06/23/2010 04:42 PM, Ken Smith wrote:
> Hi All,
>
> I'm setting up a cgi application (the Web part of the MythTV application).
>
> I'd like to try to run it with SELINUX enabled if possible. The perl
> script writes to STDOUT and it produces a SELINUX error that recommends
> executing this c
Hi All,
I'm setting up a cgi application (the Web part of the MythTV application).
I'd like to try to run it with SELINUX enabled if possible. The perl
script writes to STDOUT and it produces a SELINUX error that recommends
executing this command
chcon -t httpd_sys_content_t 'stdout'
How
14 matches
Mail list logo