---- max bianco <[EMAIL PROTECTED]> wrote:
> On Mon, Jul 14, 2008 at 8:55 AM, Steve <[EMAIL PROTECTED]> wrote:
> > I went to start setroubleshoot, Applications->System Tools->SE Linux
> > Troubleshooter and I get this message:
> >
> > connection failed at /var/run/setroubleshoot/setroubleshoo_tserver.
> > Connection refused
> >
> > #ls -lZ /var/run/setroubleshoot/setroubleshoot_server
> > srw-rw-rw- root root system_u:object_r:setroubleshoot_var_run_t
> > /var/run/setroubleshoot/setroubleshoot_server
> >
> That looks right. Is it F8 or F9?
Found some more interesting AVC messages in /var/log/dmesg, This doesn't mean
anything to me. Where is the best place to go to get a little more educated
about what all this is supposed to mean?
Thanks,
Steve
...
SELinux:8192 avtab hash slots allocated. Num of rules:68341
SELinux:8192 avtab hash slots allocated. Num of rules:68341
security: 3 users, 6 roles, 1823 types, 80 bools, 1 sens, 1024 cats
security: 61 classes, 68341 rules
security: class peer not defined in policy
security: class capability2 not defined in policy
security: permission recvfrom in class node not defined in policy
security: permission sendto in class node not defined in policy
security: permission ingress in class netif not defined in policy
security: permission egress in class netif not defined in policy
security: permission setfcap in class capability not defined in policy
security: permission forward_in in class packet not defined in policy
security: permission forward_out in class packet not defined in policy
SELinux: Completing initialization.
SELinux: Setting up existing superblocks.
SELinux: initialized (dev dm-0, type ext3), uses xattr
SELinux: initialized (dev usbfs, type usbfs), uses genfs_contexts
SELinux: initialized (dev tmpfs, type tmpfs), uses transition SIDs
SELinux: initialized (dev selinuxfs, type selinuxfs), uses genfs_contexts
SELinux: initialized (dev mqueue, type mqueue), uses transition SIDs
SELinux: initialized (dev hugetlbfs, type hugetlbfs), uses genfs_contexts
SELinux: initialized (dev devpts, type devpts), uses transition SIDs
SELinux: initialized (dev inotifyfs, type inotifyfs), uses genfs_contexts
SELinux: initialized (dev tmpfs, type tmpfs), uses transition SIDs
SELinux: initialized (dev futexfs, type futexfs), uses genfs_contexts
SELinux: initialized (dev anon_inodefs, type anon_inodefs), not configured for
labeling
SELinux: initialized (dev pipefs, type pipefs), uses task SIDs
SELinux: initialized (dev debugfs, type debugfs), uses genfs_contexts
SELinux: initialized (dev sockfs, type sockfs), uses task SIDs
SELinux: initialized (dev proc, type proc), uses genfs_contexts
SELinux: initialized (dev bdev, type bdev), uses genfs_contexts
SELinux: initialized (dev rootfs, type rootfs), uses genfs_contexts
SELinux: initialized (dev sysfs, type sysfs), uses genfs_contexts
SELinux: policy loaded with handle_unknown=deny
type=1403 audit(1216200106.325:2): policy loaded auid=4294967295 ses=4294967295
type=1400 audit(1216200107.996:3): avc: denied { read write } for pid=505
comm="restorecon" path="/dev/console" dev=tmpfs ino=233
scontext=system_u:system_r:setfiles_t:s0 tcontext=system_u:object_r:tmpfs_t:s0
tclass=chr_file
type=1400 audit(1216200109.580:4): avc: denied { create } for pid=731
comm="hwclock" scontext=system_u:system_r:udev_t:s0-s0:c0.c1023
tcontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tclass=netlink_audit_socket
type=1400 audit(1216200109.594:5): avc: denied { getattr } for pid=731
comm="hwclock" path="/etc/adjtime" dev=dm-0 ino=36569532
scontext=system_u:system_r:udev_t:s0-s0:c0.c1023
tcontext=system_u:object_r:adjtime_t:s0 tclass=file
type=1400 audit(1216200109.594:6): avc: denied { read } for pid=731
comm="hwclock" name="adjtime" dev=dm-0 ino=36569532
scontext=system_u:system_r:udev_t:s0-s0:c0.c1023
tcontext=system_u:object_r:adjtime_t:s0 tclass=file
type=1400 audit(1216200109.819:7): avc: denied { sys_time } for pid=731
comm="hwclock" capability=25 scontext=system_u:system_r:udev_t:s0-s0:c0.c1023
tcontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tclass=capability
type=1400 audit(1216214509.907:8): avc: denied { write } for pid=731
comm="hwclock" scontext=system_u:system_r:udev_t:s0-s0:c0.c1023
tcontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tclass=netlink_audit_socket
type=1400 audit(1216214510.000:9): avc: denied { nlmsg_relay } for pid=731
comm="hwclock" scontext=system_u:system_r:udev_t:s0-s0:c0.c1023
tcontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tclass=netlink_audit_socket
type=1400 audit(1216214510.000:10): avc: denied { audit_write } for pid=731
comm="hwclock" capability=29 scontext=system_u:system_r:udev_t:s0-s0:c0.c1023
tcontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tclass=capability
type=1400 audit(1216214510.000:11): avc: denied { read } for pid=731
comm="hwclock" scontext=system_u:system_r:udev_t:s0-s0:c0.c1023
tcontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tclass=netlink_audit_socket
...
--
fedora-list mailing list
[email protected]
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list