Make a backup and set the security context:

[root@surrey policy]# mv /etc/selinux/targeted/policy/policy.18 /etc/selinux/targeted/policy/policy.18.orig
[root@surrey policy]# cp new/policy.18 /etc/selinux/targeted/policy/
[root@surrey policy]# chcon system_u:object_r:policy_config_t /etc/selinux/targeted/policy/policy.18
[root@surrey policy]# /usr/sbin/setfiles -q -c /etc/selinux/targeted/policy/policy.18
/etc/selinux/targeted/contexts/files/file_contexts
[root@surrey policy]# load_policy /etc/selinux/targeted/policy/policy.18

Check that the policy was uploaded:

[root@surrey policy]# tail -100 /var/log/messages |grep security
Dec� 6 11:39:49 surrey kernel: audit(1133887189.765:3): avc:� granted� { load_policy } for� pid=4407
comm="load_policy" scontext=root:system_r:unconfined_t tcontext=system_u:object_r:security_t
tclass=security
Dec� 6 11:39:49 surrey kernel: security:� 3 users, 4 roles, 349 types, 25 bools
Dec� 6 11:39:49 surrey kernel: security:� 55 classes, 18748 rules

Symptom:

[user@surrey ~]: gnome-volume-manager ** (gnome-volume-manager:10207): WARNING **: manager.c/912: failed to initialize HAL!

Generate policy rules using audit2allow

[root@surrey ~]# audit2allow -i /var/log/messages allow initrc_t unconfined_t:dbus send_msg; allow unconfined_t initrc_t:dbus { acquire_svc send_msg };

Install policy source rpm

[root@surrey ~]# yum install selinux-policy-targeted-sources

Add local rules to local.te

[root@surrey ~]# pushd /etc/selinux/targeted/src/policy/domains/misc/
/etc/selinux/targeted/src/policy/domains/misc ~
[root@surrey misc]# cat EOF>local.te
> allow initrc_t unconfined_t:dbus send_msg;
> allow unconfined_t initrc_t:dbus { acquire_svc send_msg };
> EOF
[root@surrey misc]# popd
~
[root@surrey ~]# pushd /etc/selinux/targeted/src/policy/
/etc/selinux/targeted/src/policy ~
[root@surrey policy]# make install
mkdir -p tmp
m4� -Imacros -s flask/security_classes flask/initial_sids flask/access_vectors tunables/distro.tun
tunables/tunable.tun attrib.te tmp/program_used_flags.te macros/program/apache_macros.te
... > policy.conf.tmp
mv policy.conf.tmp policy.conf
mkdir -p /etc/selinux/targeted/policy
/usr/bin/checkpolicy -o /etc/selinux/targeted/policy/policy.18 policy.conf
/usr/bin/checkpolicy:� loading policy configuration from policy.conf
security:� 3 users, 4 roles, 349 types, 25 bools
security:� 55 classes, 18748 rules
/usr/bin/checkpolicy:� policy configuration loaded
/usr/bin/checkpolicy:� writing binary representation (version 18) to /etc/selinux/targeted/policy/policy.18
Building file_contexts ...
install -m 644 file_contexts/file_contexts /etc/selinux/targeted/contexts/files/file_contexts
Validating file_contexts ...
/usr/sbin/setfiles -q -c /etc/selinux/targeted/policy/policy.18 /etc/selinux/targeted/contexts/files/file_contexts
[root@surrey policy]#

Start gnome-volume-manager manually

[user@surrey ~]: gnome-volume-manager
manager.c/978: mount_all: mounting /dev/sda1
manager.c/834: Mounted: /org/freedesktop/Hal/devices/block_7DC6-5886
Using unicode fonts is the easiest way to properly display hindi, arabic, hebrew and other non latin languages. We install the unicode fonts in a local directory and then tell fontconfig to look in that directory. Edit /etc/fonts/local.conf


/usr/ias/share/fonts/fc
Then tell fontconfig to rehash it's tables
[root@host] # fc-cache
Check that your new font is there
[root@host] # fc-list |grep
10-1   Signal weak                   10-8   In service
10-2   Signal good                   10-9   Repeat
10-3   Stop transmitting             10-10  Negative
10-4   Affirmative                   10-12  Stand by
10-6   Busy                          10-19  Return to station
10-7   Out of service                10-23  Arrived at scene
Alpha Bravo Charlie Delta Echo
Foxtrot Golf Hotel India Juliet
Kilo Lima Mike November Oscar
Papa Quebec Romeo Sierra Tango
Uniform Victor Whiskey X-Ray Yankee
Zulu
After modifying gdm.conf we noticed that Xnewt would not start properly on occassion. Xnewt was not ignoring the vt[0-9] command line option sent to X to specify a virtual console on which to run. We removed this from the command line sent to Xnewt and renamed Xnewt to Xnewt.sun
pushd /usr/X11R6/bin
mv Xnewt Xnewt.sun
echo Xnewt
#!/bin/sh

XFIX=`echo $@ |sed -e's/vt[0-9]*//'`
echo `date`: ARGS=$@ XFIX=$XFIX >>/var/log/Xnewt

exec Xnewt.sun $XFIX -fp unix/:7100
EOF
chmod 755 Xnewt
popd
IBM/Lenovo have a utility to remap the windows key, it's called
TpKmapAp.exe
(Keyboard Customizer Utility) It's in Program Files\ThinkPad\Utilities on our X41's.

https://t.co/AGeihMALAv configuring grub2 with EFI Fri Sep 13 05:20:01 +0000 2019

I published a Thing on @thingiverse! https://t.co/IYpRyEb7Hz #thingalert Tue Jul 23 19:27:57 +0000 2019

Nokogiri install on MacOSX https://t.co/v3An0miW9L Fri Jul 12 15:06:49 +0000 2019

HTML email with plain mailer plugin on Jenkins https://t.co/Z6FSDMDjy8 Thu Jul 11 21:07:25 +0000 2019

git sparse checkout within Jenkinsfile https://t.co/tcL7V8mzFK Thu Jul 11 20:40:53 +0000 2019