frbelotto
(usa Outra)
Enviado em 07/09/2021 - 13:18h
Galera,
Me da uma ajuda.
Sou totalmente novato em linux. Uso por curiosidade e para atividades básicas (navegar na internet, email, etc).
Um dos usos é acessar bancos e o bendito do Warsaw me persegue até no linux!
Instalei o RPM dele (CENT OS stream) e na primeira vez que acesso ele funciona normal, porém nas próximas tentativas o SElinux está bloqueando. Entendo que seja algo simples de ajustar mas eu não sei onde eu mexo e tals.
******************************************************************************************************************************************
"SELinux is preventing /usr/lib/systemd/systemd from 'execute' accesses on the file core.
***** Plugin catchall (100. confidence) suggests **************************
If you believe that systemd should be allowed execute access on the core file by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# ausearch -c '(core)' --raw | audit2allow -M my-core
# semodule -X 300 -i my-core.pp
Additional Information:
Source Context system_u:system_r:init_t:s0
Target Context system_u:object_r:tmp_t:s0
Target Objects core [ file ]
Source (core)
Source Path /usr/lib/systemd/systemd
Port <Unknown>
Host (removed)
Source RPM Packages systemd-239-50.el8.x86_64
Target RPM Packages
SELinux Policy RPM selinux-policy-targeted-3.14.3-79.el8.noarch
Local Policy RPM selinux-policy-targeted-3.14.3-79.el8.noarch
Selinux Enabled True
Policy Type targeted
Enforcing Mode Enforcing
Host Name (removed)
Platform Linux (removed) 4.18.0-338.el8.x86_64 #1 SMP Fri
Aug 27 17:32:14 UTC 2021 x86_64 x86_64
Alert Count 463
First Seen 2021-09-06 20:59:46 -03
Last Seen 2021-09-06 21:42:15 -03
Local ID f0c14293-ab67-4e3b-bb94-6949f26099f4
Raw Audit Messages
type=AVC msg=audit(1630975335.929:2091): avc: denied { execute } for pid=17338 comm="(core)" name="core" dev="dm-0" ino=20513730 scontext=system_u:system_r:init_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=file permissive=0
type=SYSCALL msg=audit(1630975335.929:2091): arch=x86_64 syscall=execve success=no exit=EACCES a0=557fc67d6440 a1=557fc69402e0 a2=557fc69945d0 a3=1 items=0 ppid=1 pid=17338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm=(core) exe=/usr/lib/systemd/systemd subj=system_u:system_r:init_t:s0 key=(null)
Hash: (core),init_t,tmp_t,file,execute
"