j'ai trouvé ce rapport d'erreur si ca peut aider 😐
SELinux is preventing /usr/sbin/cupsd from 'execute' accesses on the fichier rastertosamsungsplc.
***** Plugin catchall (100. confidence) suggests ***************************
If you believe that cupsd should be allowed execute access on the rastertosamsungsplc file by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# grep cupsd /var/log/audit/audit.log | audit2allow -M mypol
# semodule -i mypol.pp
Additional Information:
Source Context system_u:system_r:cupsd_t:s0-s0:c0.c1023
Target Context unconfined_u:object_r:user_tmp_t:s0
Target Objects rastertosamsungsplc [ file ]
Source cupsd
Source Path /usr/sbin/cupsd
Port <Inconnu>
Host (removed)
Source RPM Packages cups-1.5.2-6.fc16.x86_64
Target RPM Packages
Policy RPM selinux-policy-3.10.0-80.fc16.noarch
Selinux Enabled True
Policy Type targeted
Enforcing Mode Enforcing
Host Name (removed)
Platform Linux (removed) 3.3.1-3.fc16.x86_64 #1 SMP Wed Apr 4
18:08:51 UTC 2012 x86_64 x86_64
Alert Count 2
First Seen sam. 14 avril 2012 19:17:02 CEST
Last Seen sam. 14 avril 2012 19:21:53 CEST
Local ID cd80f26a-55a3-4a81-a6c7-fe97b5338e3d
Raw Audit Messages
type=AVC msg=audit(1334424113.948:72): avc: denied { execute } for pid=2136 comm="cupsd" name="rastertosamsungsplc" dev="dm-1" ino=2505110 scontext=system_u:system_r:cupsd_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_tmp_t:s0 tclass=file
type=SYSCALL msg=audit(1334424113.948:72): arch=x86_64 syscall=execve success=no exit=EACCES a0=7fffb98d8d80 a1=7ffdd950e110 a2=7fffb98d8360 a3=7fffb98d77b0 items=0 ppid=1434 pid=2136 auid=4294967295 uid=4 gid=7 euid=4 suid=4 fsuid=4 egid=7 sgid=7 fsgid=7 tty=(none) ses=4294967295 comm=cupsd exe=/usr/sbin/cupsd subj=system_u:system_r:cupsd_t:s0-s0:c0.c1023 key=(null)
Hash: cupsd,cupsd_t,user_tmp_t,file,execute
audit2allow
#============= cupsd_t ==============
allow cupsd_t user_tmp_t:file execute;
audit2allow -R
#============= cupsd_t ==============
allow cupsd_t user_tmp_t:file execute;