How to use dvgrab.
Mike Chalmers
mikechalmers70 at gmail.com
Sun Apr 30 04:04:24 UTC 2006
On 4/28/06, Tony Nelson <tonynelson at georgeanelson.com> wrote:
> At 10:17 PM -0400 4/28/06, Mike Chalmers wrote:
> ...
> >I will try disabling SE Linux and let you know what happened. How do I
> >disable SE Linux?
>
> As root:
>
> [...]# setenforce 0
>
> To re-enable:
>
> [...]# setenforce 1
>
>
> >"There is an easy way to find out if SELinux is the culprit."
> >What exactly am I doing when I run the commands you listed. Am I
> >disabling SE Linux?
>
> No, it's just installing a (unneccesary) package that separates the AVC
> (SELinux complaint) messages into their own log. To see what's up without
> having it installed, just use, as root:
>
> [...]# tail -f /var/log/messages
>
> which shows the last few lines of the messages log, and then new lines as
> they are added (man tail). So, issue that command, do your thing in
> another terminal or whatever, and see what it says. Exit it with Control-C.
> ____________________________________________________________________
> TonyN.:' <mailto:tonynelson at georgeanelson.com>
> ' <http://www.georgeanelson.com/>
>
> --
> fedora-list mailing list
> fedora-list at redhat.com
> To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
>
Hi,
When I enter the command you gave me into the terminal it tells me
that there is no such command:
------------------------------------------------------------------------------------
# setenforce 0
bash: setenforce: command not found
-------------------------------------------------------------------------------------
Instead I ran the command "system-config-securitylevel" and disabled
SE Linux and rebooted. I then tried Kino and dvgrab and the same thing
happened. Kino shut down when I minimized it then maximized it. It
shut down when I tried to open a avi file captured with dvgrab.
This is what happened when I ran the "tail -f /var/log/messages"
command and then tried the things that were causing Kino to shut down.
This is what it said:
---------------------------------------------------------------------------------------------------------------------
Apr 29 23:39:12 dhcppc0 kernel: [drm] Initialized drm 1.0.1 20051102
Apr 29 23:41:58 dhcppc0 kernel: cdrom: hda: mrw address space DMA selected
Apr 29 23:41:58 dhcppc0 kernel: SELinux: initialized (dev hda, type
iso9660), uses genfs_contexts
Apr 29 23:42:00 dhcppc0 kernel: SELinux: initialized (dev hdb, type
iso9660), uses genfs_contexts
Apr 29 23:42:01 dhcppc0 kernel: UDF-fs INFO UDF 0.9.8.1 (2004/29/09)
Mounting volume 'REV 35', timestamp 2004/03/25 14:55 (1f10)
Apr 29 23:42:01 dhcppc0 kernel: SELinux: initialized (dev sr0, type
udf), uses genfs_contexts
Apr 29 23:42:01 dhcppc0 gconfd (user1-2968): starting (version
2.13.5), pid 2968 user 'user1'
Apr 29 23:42:01 dhcppc0 gconfd (user1-2968): Resolved address
"xml:readonly:/etc/gconf/gconf.xml.mandatory" to a read-only
configuration source at position 0
Apr 29 23:42:01 dhcppc0 gconfd (user1-2968): Resolved address
"xml:readwrite:/home/user1/.gconf" to a writable configuration source
at position 1
Apr 29 23:42:01 dhcppc0 gconfd (user1-2968): Resolved address
"xml:readonly:/etc/gconf/gconf.xml.defaults" to a read-only
configuration source at position 2
Apr 29 23:53:21 dhcppc0 kernel: audit(1146369201.431:78): avc:
granted { execstack } for pid=3135 comm="kino"
scontext=user_u:system_r:unconfined_t:s0
tcontext=user_u:system_r:unconfined_t:s0 tclass=process
Apr 29 23:53:21 dhcppc0 kernel: audit(1146369201.431:79): avc:
granted { execmem } for pid=3135 comm="kino"
scontext=user_u:system_r:unconfined_t:s0
tcontext=user_u:system_r:unconfined_t:s0 tclass=process
Apr 29 23:53:22 dhcppc0 kernel: audit(1146369202.347:80): avc:
granted { execstack } for pid=3143 comm="ffmpeg"
scontext=user_u:system_r:unconfined_t:s0
tcontext=user_u:system_r:unconfined_t:s0 tclass=process
Apr 29 23:53:22 dhcppc0 kernel: audit(1146369202.347:81): avc:
granted { execmem } for pid=3143 comm="ffmpeg"
scontext=user_u:system_r:unconfined_t:s0
tcontext=user_u:system_r:unconfined_t:s0 tclass=process
Apr 29 23:53:22 dhcppc0 kernel: audit(1146369202.531:82): avc:
granted { execstack } for pid=3160 comm="ffmpeg"
scontext=user_u:system_r:unconfined_t:s0
tcontext=user_u:system_r:unconfined_t:s0 tclass=process
Apr 29 23:53:22 dhcppc0 kernel: audit(1146369202.531:83): avc:
granted { execmem } for pid=3160 comm="ffmpeg"
scontext=user_u:system_r:unconfined_t:s0
tcontext=user_u:system_r:unconfined_t:s0 tclass=process
Apr 29 23:53:22 dhcppc0 kernel: audit(1146369202.595:84): avc:
granted { execstack } for pid=3178 comm="ffmpeg"
scontext=user_u:system_r:unconfined_t:s0
tcontext=user_u:system_r:unconfined_t:s0 tclass=process
Apr 29 23:53:22 dhcppc0 kernel: audit(1146369202.595:85): avc:
granted { execmem } for pid=3178 comm="ffmpeg"
scontext=user_u:system_r:unconfined_t:s0
tcontext=user_u:system_r:unconfined_t:s0 tclass=process
Apr 29 23:53:22 dhcppc0 kernel: audit(1146369202.639:86): avc:
granted { execstack } for pid=3185 comm="ffmpeg"
scontext=user_u:system_r:unconfined_t:s0
tcontext=user_u:system_r:unconfined_t:s0 tclass=process
Apr 29 23:53:22 dhcppc0 kernel: audit(1146369202.639:87): avc:
granted { execmem } for pid=3185 comm="ffmpeg"
scontext=user_u:system_r:unconfined_t:s0
tcontext=user_u:system_r:unconfined_t:s0 tclass=process
Apr 29 23:53:22 dhcppc0 kernel: audit(1146369202.691:88): avc:
granted { execstack } for pid=3197 comm="ffmpeg"
scontext=user_u:system_r:unconfined_t:s0
tcontext=user_u:system_r:unconfined_t:s0 tclass=process
Apr 29 23:53:22 dhcppc0 kernel: audit(1146369202.691:89): avc:
granted { execmem } for pid=3197 comm="ffmpeg"
scontext=user_u:system_r:unconfined_t:s0
tcontext=user_u:system_r:unconfined_t:s0 tclass=process
Apr 29 23:53:22 dhcppc0 kernel: audit(1146369202.743:90): avc:
granted { execstack } for pid=3209 comm="ffmpeg"
scontext=user_u:system_r:unconfined_t:s0
tcontext=user_u:system_r:unconfined_t:s0 tclass=process
Apr 29 23:53:22 dhcppc0 kernel: audit(1146369202.743:91): avc:
granted { execmem } for pid=3209 comm="ffmpeg"
scontext=user_u:system_r:unconfined_t:s0
tcontext=user_u:system_r:unconfined_t:s0 tclass=process
Apr 29 23:53:22 dhcppc0 kernel: audit(1146369202.991:92): avc:
granted { execmem } for pid=3135 comm="kino"
scontext=user_u:system_r:unconfined_t:s0
tcontext=user_u:system_r:unconfined_t:s0 tclass=process
Apr 29 23:53:32 dhcppc0 kernel: audit(1146369212.040:93): avc:
granted { execmem } for pid=3135 comm="kino"
scontext=user_u:system_r:unconfined_t:s0
tcontext=user_u:system_r:unconfined_t:s0 tclass=process
Apr 29 23:53:32 dhcppc0 kernel: audit(1146369212.040:94): avc:
granted { execmem } for pid=3135 comm="kino"
scontext=user_u:system_r:unconfined_t:s0
tcontext=user_u:system_r:unconfined_t:s0 tclass=process
Apr 29 23:53:32 dhcppc0 kernel: audit(1146369212.040:95): avc:
granted { execmem } for pid=3135 comm="kino"
scontext=user_u:system_r:unconfined_t:s0
tcontext=user_u:system_r:unconfined_t:s0 tclass=process
Apr 29 23:53:32 dhcppc0 kernel: audit(1146369212.044:96): avc:
granted { execmem } for pid=3219 comm="kino"
scontext=user_u:system_r:unconfined_t:s0
tcontext=user_u:system_r:unconfined_t:s0 tclass=process
Apr 29 23:54:07 dhcppc0 kernel: audit(1146369247.962:97): avc:
granted { execstack } for pid=3227 comm="kino"
scontext=user_u:system_r:unconfined_t:s0
tcontext=user_u:system_r:unconfined_t:s0 tclass=process
Apr 29 23:54:07 dhcppc0 kernel: audit(1146369247.962:98): avc:
granted { execmem } for pid=3227 comm="kino"
scontext=user_u:system_r:unconfined_t:s0
tcontext=user_u:system_r:unconfined_t:s0 tclass=process
Apr 29 23:54:08 dhcppc0 kernel: audit(1146369248.358:99): avc:
granted { execstack } for pid=3235 comm="ffmpeg"
scontext=user_u:system_r:unconfined_t:s0
tcontext=user_u:system_r:unconfined_t:s0 tclass=process
Apr 29 23:54:08 dhcppc0 kernel: audit(1146369248.358:100): avc:
granted { execmem } for pid=3235 comm="ffmpeg"
scontext=user_u:system_r:unconfined_t:s0
tcontext=user_u:system_r:unconfined_t:s0 tclass=process
Apr 29 23:54:08 dhcppc0 kernel: audit(1146369248.426:101): avc:
granted { execstack } for pid=3252 comm="ffmpeg"
scontext=user_u:system_r:unconfined_t:s0
tcontext=user_u:system_r:unconfined_t:s0 tclass=process
Apr 29 23:54:08 dhcppc0 kernel: audit(1146369248.426:102): avc:
granted { execmem } for pid=3252 comm="ffmpeg"
scontext=user_u:system_r:unconfined_t:s0
tcontext=user_u:system_r:unconfined_t:s0 tclass=process
Apr 29 23:54:08 dhcppc0 kernel: audit(1146369248.494:103): avc:
granted { execstack } for pid=3270 comm="ffmpeg"
scontext=user_u:system_r:unconfined_t:s0
tcontext=user_u:system_r:unconfined_t:s0 tclass=process
Apr 29 23:54:08 dhcppc0 kernel: audit(1146369248.494:104): avc:
granted { execmem } for pid=3270 comm="ffmpeg"
scontext=user_u:system_r:unconfined_t:s0
tcontext=user_u:system_r:unconfined_t:s0 tclass=process
Apr 29 23:54:08 dhcppc0 kernel: audit(1146369248.538:105): avc:
granted { execstack } for pid=3277 comm="ffmpeg"
scontext=user_u:system_r:unconfined_t:s0
tcontext=user_u:system_r:unconfined_t:s0 tclass=process
Apr 29 23:54:08 dhcppc0 kernel: audit(1146369248.538:106): avc:
granted { execmem } for pid=3277 comm="ffmpeg"
scontext=user_u:system_r:unconfined_t:s0
tcontext=user_u:system_r:unconfined_t:s0 tclass=process
Apr 29 23:54:08 dhcppc0 kernel: audit(1146369248.590:107): avc:
granted { execstack } for pid=3289 comm="ffmpeg"
scontext=user_u:system_r:unconfined_t:s0
tcontext=user_u:system_r:unconfined_t:s0 tclass=process
Apr 29 23:54:08 dhcppc0 kernel: audit(1146369248.590:108): avc:
granted { execmem } for pid=3289 comm="ffmpeg"
scontext=user_u:system_r:unconfined_t:s0
tcontext=user_u:system_r:unconfined_t:s0 tclass=process
Apr 29 23:54:08 dhcppc0 kernel: audit(1146369248.642:109): avc:
granted { execstack } for pid=3301 comm="ffmpeg"
scontext=user_u:system_r:unconfined_t:s0
tcontext=user_u:system_r:unconfined_t:s0 tclass=process
Apr 29 23:54:08 dhcppc0 kernel: audit(1146369248.642:110): avc:
granted { execmem } for pid=3301 comm="ffmpeg"
scontext=user_u:system_r:unconfined_t:s0
tcontext=user_u:system_r:unconfined_t:s0 tclass=process
Apr 29 23:54:08 dhcppc0 kernel: audit(1146369248.814:111): avc:
granted { execmem } for pid=3227 comm="kino"
scontext=user_u:system_r:unconfined_t:s0
tcontext=user_u:system_r:unconfined_t:s0 tclass=process
--------------------------------------------------------------------------------------------------------------------------------
From,
Mike
More information about the fedora-list
mailing list