Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- SELinux is preventing gnome-shell from write access on the sock_file dbus-XodxlWoUr5.
- ***** Plugin catchall (100. confidence) suggests **************************
- If you believe that gnome-shell should be allowed write access on the dbus-XodxlWoUr5 sock_file by default.
- Then you should report this as a bug.
- You can generate a local policy module to allow this access.
- Do
- allow this access for now by executing:
- # ausearch -c 'gnome-shell' --raw | audit2allow -M my-gnomeshell
- # semodule -X 300 -i my-gnomeshell.pp
- Additional Information:
- Source Context system_u:system_r:xdm_t:s0-s0:c0.c1023
- Target Context system_u:object_r:tmp_t:s0
- Target Objects dbus-XodxlWoUr5 [ sock_file ]
- Source gnome-shell
- Source Path gnome-shell
- Port <Unknown>
- Host fedora
- Source RPM Packages
- Target RPM Packages
- SELinux Policy RPM selinux-policy-targeted-34.7-1.fc34.noarch
- Local Policy RPM selinux-policy-targeted-34.7-1.fc34.noarch
- Selinux Enabled True
- Policy Type targeted
- Enforcing Mode Enforcing
- Host Name fedora
- Platform Linux fedora 5.12.6-300.fc34.x86_64 #1 SMP Sat May
- 22 20:42:55 UTC 2021 x86_64 x86_64
- Alert Count 198
- First Seen 2021-05-22 13:46:24 EDT
- Last Seen 2021-05-25 11:24:58 EDT
- Local ID 92e8abaf-acb7-4e98-9ff5-8c743cbc19e5
- Raw Audit Messages
- type=AVC msg=audit(1621956298.150:968): avc: denied { write } for pid=20802 comm="ibus-x11" name="dbus-XodxlWoUr5" dev="tmpfs" ino=152 scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:tmp_t:s0 tclass=sock_file permissive=0
- Hash: gnome-shell,xdm_t,tmp_t,sock_file,write
- SELinux is preventing gnome-shell from write access on the sock_file dbus-XodxlWoUr5.
- ***** Plugin catchall (100. confidence) suggests **************************
- If you believe that gnome-shell should be allowed write access on the dbus-XodxlWoUr5 sock_file by default.
- Then you should report this as a bug.
- You can generate a local policy module to allow this access.
- Do
- allow this access for now by executing:
- # ausearch -c 'gnome-shell' --raw | audit2allow -M my-gnomeshell
- # semodule -X 300 -i my-gnomeshell.pp
- Additional Information:
- Source Context system_u:system_r:xdm_t:s0-s0:c0.c1023
- Target Context system_u:object_r:tmp_t:s0
- Target Objects dbus-XodxlWoUr5 [ sock_file ]
- Source gnome-shell
- Source Path gnome-shell
- Port <Unknown>
- Host fedora
- Source RPM Packages
- Target RPM Packages
- SELinux Policy RPM selinux-policy-targeted-34.7-1.fc34.noarch
- Local Policy RPM selinux-policy-targeted-34.7-1.fc34.noarch
- Selinux Enabled True
- Policy Type targeted
- Enforcing Mode Enforcing
- Host Name fedora
- Platform Linux fedora 5.12.6-300.fc34.x86_64 #1 SMP Sat May
- 22 20:42:55 UTC 2021 x86_64 x86_64
- Alert Count 198
- First Seen 2021-05-22 13:46:24 EDT
- Last Seen 2021-05-25 11:24:58 EDT
- Local ID 92e8abaf-acb7-4e98-9ff5-8c743cbc19e5
- Raw Audit Messages
- type=AVC msg=audit(1621956298.150:968): avc: denied { write } for pid=20802 comm="ibus-x11" name="dbus-XodxlWoUr5" dev="tmpfs" ino=152 scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:tmp_t:s0 tclass=sock_file permissive=0
- Hash: gnome-shell,xdm_t,tmp_t,sock_file,write
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement