Advertisement
Guest User

Untitled

a guest
Mar 20th, 2019
99
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.73 KB | None | 0 0
  1. cat /var/log/audit/audit.log | audit2why
  2.  
  3. audit2allow -M altermime < /var/log/audit/audit.log
  4. semodule -i altermime.pp
  5.  
  6. type=AVC msg=audit(1409231063.712:263024): avc: denied { add_name } for pid=21280 comm="disclaimer" name="in.21279" scontext=unconfined_u:system_r:postfix_pipe_t:s0 tcontext=unconfined_u:object_r:var_spool_t:s0 tclass=dir
  7. Was caused by:
  8. Missing type enforcement (TE) allow rule.
  9. You can use audit2allow to generate a loadable module to allow this access.
  10.  
  11. type=AVC msg=audit(1409231065.905:263025): avc: denied { add_name } for pid=21285 comm="disclaimer" name="in.21284" scontext=unconfined_u:system_r:postfix_pipe_t:s0 tcontext=unconfined_u:object_r:var_spool_t:s0 tclass=dir
  12. Was caused by:
  13. Missing type enforcement (TE) allow rule.
  14. You can use audit2allow to generate a loadable module to allow this access.
  15.  
  16. type=AVC msg=audit(1409231067.380:263026): avc: denied { add_name } for pid=21289 comm="disclaimer" name="in.21288" scontext=unconfined_u:system_r:postfix_pipe_t:s0 tcontext=unconfined_u:object_r:var_spool_t:s0 tclass=dir
  17. Was caused by:
  18. Missing type enforcement (TE) allow rule.
  19. You can use audit2allow to generate a loadable module to allow this access.
  20.  
  21. semodule -l | grep mymodulename
  22.  
  23. semodule -r names_of_modules_returned_from_prior_command
  24.  
  25. setenforce 0
  26.  
  27. echo "" >/var/log/audit.log
  28.  
  29. cat /var/log/audit/audit.log | audit2allow -m yourname >yourname.te
  30.  
  31. checkmodule -M -m -o yourname.mod yourname.te
  32.  
  33. semodule_package -m yourname.mod -o yourname.pp
  34.  
  35. semodule -i yourname.pp
  36.  
  37. cat /var/log/audit/audit.log | audit2why
  38.  
  39. setenforce 1
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement