---- max bianco <maximilianbianco@xxxxxxxxx> wrote: > On Mon, Jul 14, 2008 at 8:55 AM, Steve <zephod@xxxxxxxxxx> wrote: > > I went to start setroubleshoot, Applications->System Tools->SE Linux Troubleshooter and I get this message: > > > > connection failed at /var/run/setroubleshoot/setroubleshoo_tserver. Connection refused > > > > #ls -lZ /var/run/setroubleshoot/setroubleshoot_server > > srw-rw-rw- root root system_u:object_r:setroubleshoot_var_run_t /var/run/setroubleshoot/setroubleshoot_server > > > That looks right. Is it F8 or F9? Found some more interesting AVC messages in /var/log/dmesg, This doesn't mean anything to me. Where is the best place to go to get a little more educated about what all this is supposed to mean? Thanks, Steve ... SELinux:8192 avtab hash slots allocated. Num of rules:68341 SELinux:8192 avtab hash slots allocated. Num of rules:68341 security: 3 users, 6 roles, 1823 types, 80 bools, 1 sens, 1024 cats security: 61 classes, 68341 rules security: class peer not defined in policy security: class capability2 not defined in policy security: permission recvfrom in class node not defined in policy security: permission sendto in class node not defined in policy security: permission ingress in class netif not defined in policy security: permission egress in class netif not defined in policy security: permission setfcap in class capability not defined in policy security: permission forward_in in class packet not defined in policy security: permission forward_out in class packet not defined in policy SELinux: Completing initialization. SELinux: Setting up existing superblocks. SELinux: initialized (dev dm-0, type ext3), uses xattr SELinux: initialized (dev usbfs, type usbfs), uses genfs_contexts SELinux: initialized (dev tmpfs, type tmpfs), uses transition SIDs SELinux: initialized (dev selinuxfs, type selinuxfs), uses genfs_contexts SELinux: initialized (dev mqueue, type mqueue), uses transition SIDs SELinux: initialized (dev hugetlbfs, type hugetlbfs), uses genfs_contexts SELinux: initialized (dev devpts, type devpts), uses transition SIDs SELinux: initialized (dev inotifyfs, type inotifyfs), uses genfs_contexts SELinux: initialized (dev tmpfs, type tmpfs), uses transition SIDs SELinux: initialized (dev futexfs, type futexfs), uses genfs_contexts SELinux: initialized (dev anon_inodefs, type anon_inodefs), not configured for labeling SELinux: initialized (dev pipefs, type pipefs), uses task SIDs SELinux: initialized (dev debugfs, type debugfs), uses genfs_contexts SELinux: initialized (dev sockfs, type sockfs), uses task SIDs SELinux: initialized (dev proc, type proc), uses genfs_contexts SELinux: initialized (dev bdev, type bdev), uses genfs_contexts SELinux: initialized (dev rootfs, type rootfs), uses genfs_contexts SELinux: initialized (dev sysfs, type sysfs), uses genfs_contexts SELinux: policy loaded with handle_unknown=deny type=1403 audit(1216200106.325:2): policy loaded auid=4294967295 ses=4294967295 type=1400 audit(1216200107.996:3): avc: denied { read write } for pid=505 comm="restorecon" path="/dev/console" dev=tmpfs ino=233 scontext=system_u:system_r:setfiles_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=chr_file type=1400 audit(1216200109.580:4): avc: denied { create } for pid=731 comm="hwclock" scontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tcontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tclass=netlink_audit_socket type=1400 audit(1216200109.594:5): avc: denied { getattr } for pid=731 comm="hwclock" path="/etc/adjtime" dev=dm-0 ino=36569532 scontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tcontext=system_u:object_r:adjtime_t:s0 tclass=file type=1400 audit(1216200109.594:6): avc: denied { read } for pid=731 comm="hwclock" name="adjtime" dev=dm-0 ino=36569532 scontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tcontext=system_u:object_r:adjtime_t:s0 tclass=file type=1400 audit(1216200109.819:7): avc: denied { sys_time } for pid=731 comm="hwclock" capability=25 scontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tcontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tclass=capability type=1400 audit(1216214509.907:8): avc: denied { write } for pid=731 comm="hwclock" scontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tcontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tclass=netlink_audit_socket type=1400 audit(1216214510.000:9): avc: denied { nlmsg_relay } for pid=731 comm="hwclock" scontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tcontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tclass=netlink_audit_socket type=1400 audit(1216214510.000:10): avc: denied { audit_write } for pid=731 comm="hwclock" capability=29 scontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tcontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tclass=capability type=1400 audit(1216214510.000:11): avc: denied { read } for pid=731 comm="hwclock" scontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tcontext=system_u:system_r:udev_t:s0-s0:c0.c1023 tclass=netlink_audit_socket ... -- fedora-list mailing list fedora-list@xxxxxxxxxx To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list