Skip to content

Instantly share code, notes, and snippets.

SELinux is preventing systemd from read access on the file libselinux.so.1.
***** Plugin catchall_labels (83.8 confidence) suggests *******************
If you want to allow systemd to have read access on the libselinux.so.1 file
Then you need to change the label on libselinux.so.1
Do
# semanage fcontext -a -t FILE_TYPE 'libselinux.so.1'
where FILE_TYPE is one of the following: NetworkManager_etc_rw_t, NetworkManager_etc_t, NetworkManager_exec_t, NetworkManager_initrc_exec_t, NetworkManager_tmp_t, NetworkManager_unit_file_t, abrt_dump_oops_exec_t, abrt_etc_t, abrt_exec_t, abrt_handle_event_exec_t, abrt_helper_exec_t, abrt_initrc_exec_t, abrt_retrace_coredump_exec_t, abrt_retrace_worker_exec_t, abrt_tmp_t, abrt_unit_file_t, abrt_upload_watch_exec_t, abrt_upload_watch_tmp_t, abrt_var_cache_t, abrt_var_run_t, abrt_watch_log_exec_t, accountsd_exec_t, accountsd_unit_file_t, acct_exec_t, acct_initrc_exec_t, adjtime_t, admin_crontab_tmp_t, admin_passwd_exec_t, afs_bosserver_exec_t, afs_cache_t, afs_exec_t, afs_f
package main
import (
"encoding/json"
"io"
"io/ioutil"
"strings"
"testing"
)
$ sudo tail -f -n 0 /var/log/audit/audit.log
type=USER_CMD msg=audit(1447866797.682:2012): pid=11801 uid=1000 auid=1000 ses=1 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='cwd="/home/eric/drafts" cmd=726B742072756E202D2D696E7365637572652D736B69702D766572696679207368613531322D336632353036376663363966 terminal=pts/2 res=success'
type=CRED_REFR msg=audit(1447866797.683:2013): pid=11801 uid=0 auid=1000 ses=1 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:setcred grantors=pam_env,pam_fprintd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/2 res=success'
type=USER_START msg=audit(1447866797.686:2014): pid=11801 uid=0 auid=1000 ses=1 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/2 res=success'
type=NETFILTER_CFG msg=audit(1447866807.325:2015): table=filter family=2 entries=0
t
package tree
type BinaryTree struct {
Val interface{}
LeftChild, RightChild *BinaryTree
}
func (b *BinaryTree) Invert() {
if b == nil {
return
package main
import (
"fmt"
"log"
"os"
"os/exec"
"path/filepath"
"time"
)
package main
import (
"flag"
"fmt"
"os"
)
func cmd1(args []string) {
fs := flag.NewFlagSet("cmd1", flag.ExitOnError)
package main
import (
"fmt"
"log"
"net/http"
"strconv"
"time"
"golang.org/x/net/websocket"
package main
import (
"flag"
"fmt"
"net/http"
"os"
"os/exec"
"golang.org/x/net/websocket"
$ sudo docker run b5fe16f2ccba -i /bin/bash
WARNING: Local (127.0.0.1) DNS resolver found in resolv.conf and containers can't use it. Using default external servers : [8.8.8.8 8.8.4.4]
package main
import (
"log"
"os"
"strings"
"golang.org/x/net/html"
)