Control: tag -1 - moreinfo
Control: retitle -1 Default configuration is incompatible with a non-SELinux
active LSM
Control: severity -1 important
Anthony DeRobertis:
> Seems your hypothesis is correct.
> [...]
> I then went ahead and edited cachefilesd.conf and commented out the
> secctx line.
On Sun, Oct 21, 2018 at 10:24:46AM +0200, intrigeri wrote:
>
> Can you please retry with AppArmor enabled, after commenting out the
> "secctx" directive in /etc/cachefilesd.conf? If this works, then my
> hypothesis will be confirmed and my recommendation will be:
Seems your hypothesis is
Control: user pkg-apparmor-t...@lists.alioth.debian.org
Control: usertags -1 help-needed
Control: tag -1 + moreinfo
Hi,
Anthony DeRobertis:
> I rebooted after enabling Apparmor, and cachefilesd wouldn't start:
> Sep 24 13:53:17 Zia cachefilesd[1105]: About to bind cache
> Sep 24 13:53:17 Zia
I can confirm both the issue and the workaround.
Online sources seem to indicate that one can write an AppArmor profile
for any daemon... I'm more than happy to contribute by testing and get
this one solved.
Kr,
Vincent
Package: cachefilesd
Version: 0.10.10-0.1
Severity: important
Important since Apparmor is on by default now.
I rebooted after enabling Apparmor, and cachefilesd wouldn't start:
Sep 24 13:53:17 Zia cachefilesd[1105]: About to bind cache
Sep 24 13:53:17 Zia kernel: CacheFiles: Security denies
5 matches
Mail list logo