A whole lot of these shot out:

type=AVC msg=audit(1750984177.433:5387): avc:  denied  { create } for  pid=370849 comm="local" name="Mailbox.lock" scontext=system_u:system_r:postfix_local_t:s0 tcontext=system_u:object_r:admin_home_t:s0 tclass=file permissive=0
    Was caused by:
        Missing type enforcement (TE) allow rule.

        You can use audit2allow to generate a loadable module to allow this access.




On 6/26/25 9:53 PM, Brian Truter wrote:
This looks like SELinux is blocking some things on your system.

audit2allow -w -a

On Thu, Jun 26, 2025 at 5:36 PM Robert Moskowitz via users <[email protected]> wrote:

    I was thinking of avoiding installing logwatch for this crontab
    reporting, but it seems I installed it.

    I see /etc/cron.dayly/0logwatch

    but in /var/logs/messages I am seeing:

    '''
    Jun 26 03:07:19 LX140e-3 audit[295067]: AVC avc:  denied  {
    dac_read_search } for  pid=295067 comm="sendmail" capability=2
    scontext=system_u:system_r:logwatch_mail_t:s0-s0:c0.c1023
    tcontext=system_u:system_r:logwatch_mail_t:s0-s0:c0.c1023
    tclass=capability permissive=0
    Jun 26 03:07:19 LX140e-3 audit[295067]: AVC avc:  denied  {
    dac_read_search } for  pid=295067 comm="sendmail" capability=2
    scontext=system_u:system_r:logwatch_mail_t:s0-s0:c0.c1023
    tcontext=system_u:system_r:logwatch_mail_t:s0-s0:c0.c1023
    tclass=capability permissive=0
    Jun 26 03:07:19 LX140e-3 audit[295069]: AVC avc:  denied  {
    dac_read_search } for  pid=295069 comm="dotlockfile" capability=2
    scontext=system_u:system_r:logwatch_mail_t:s0-s0:c0.c1023
    tcontext=system_u:system_r:logwatch_mail_t:s0-s0:c0.c1023
    tclass=capability permissive=0
    Jun 26 03:07:19 LX140e-3 audit[295069]: AVC avc:  denied  {
    dac_read_search } for  pid=295069 comm="dotlockfile" capability=2
    scontext=system_u:system_r:logwatch_mail_t:s0-s0:c0.c1023
    tcontext=system_u:system_r:logwatch_mail_t:s0-s0:c0.c1023
    tclass=capability permissive=0
    ...

    what is going on here?:

    thanks


-- _______________________________________________
    users mailing list -- [email protected]
    To unsubscribe send an email to [email protected]
    Fedora Code of Conduct:
    https://docs.fedoraproject.org/en-US/project/code-of-conduct/
    List Guidelines:
    https://fedoraproject.org/wiki/Mailing_list_guidelines
    List Archives:
    https://lists.fedoraproject.org/archives/list/[email protected]
    Do not reply to spam, report it:
    https://pagure.io/fedora-infrastructure/new_issue


-- 
_______________________________________________
users mailing list -- [email protected]
To unsubscribe send an email to [email protected]
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/[email protected]
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue

Reply via email to