Displaying 4 results from an estimated 4 matches for "postfix_pipe_t".
2009 Oct 04
2
deliver stopped working
...c_t;
type proc_t;
type restorecond_t;
type etc_runtime_t;
type postfix_bounce_t;
type ntpd_t;
type kernel_t;
type postfix_master_t;
type rpcd_t;
type dovecot_t;
type klogd_t;
type udev_t;
type clamd_t;
type mysqld_port_t;
type initrc_var_run_t;
type var_t;
type postfix_qmgr_t;
type postfix_pipe_t;
type crond_t;
class process ptrace;
class unix_stream_socket connectto;
class tcp_socket { name_bind name_connect };
class file { rename execute read lock create ioctl execute_no_trans write getattr link
unlink };
class sock_file { setattr create write getattr unlink };
class lnk_file { rea...
2017 Apr 28
0
NOT Solved - Re: SELinux policy to allow Dovecot to connect to Mysql
...ot; scontext=system_u:system_r:dovecot_t:s0
tcontext=system_u:system_r:dovecot_auth_t:s0 tclass=process permissive=1
type=AVC msg=audit(1493361699.950:49210): avc: denied { rlimitinh }
for pid=3063 comm="pipe" scontext=system_u:system_r:postfix_master_t:s0
tcontext=system_u:system_r:postfix_pipe_t:s0 tclass=process permissive=1
type=AVC msg=audit(1493361699.950:49210): avc: denied { siginh } for
pid=3063 comm="pipe" scontext=system_u:system_r:postfix_master_t:s0
tcontext=system_u:system_r:postfix_pipe_t:s0 tclass=process permissive=1
type=AVC msg=audit(1493361699.950:49210): a...
2009 Apr 15
2
SELinux and "i_stream_read() failed: Permission denied"
...type home_root_t;
type httpd_config_t;
type httpd_t;
type initrc_t;
type postfix_etc_t;
type postfix_local_t;
type postfix_master_t;
type postfix_postdrop_t;
type postfix_postqueue_exec_t;
type postfix_public_t;
type postfix_pipe_t;
type sendmail_t;
type sendmail_exec_t;
type src_t;
type tmp_t;
type usr_t;
type user_home_dir_t;
type user_home_t;
type var_log_t;
class capability { sys_nice chown };
class file { append create execute execute_no_tran...
2017 Apr 26
3
NOT Solved - Re: SELinux policy to allow Dovecot to connect to Mysql
On 04/26/2017 12:29 AM, Robert Moskowitz wrote:
> But the policy generates errors. I will have to submit a bug report,
> it seems
A bug report would probably be helpful.
I'm looking back at the message you wrote describing errors in
ld-2.17.so. I think what's happening is that the policy on your system
includes a silent rule that somehow breaks your system. You'll need