DescriptionAdam Williamson
2021-03-24 23:46:56 UTC
Description of problem:
Happened on boot of F34 after update to GNOME 40 final release update.
SELinux is preventing gnome-shell from 'write' accesses on the sock_file dbus-UjghVJFa5E.
***** Plugin catchall (100. confidence) suggests **************************
If you believe that gnome-shell should be allowed write access on the dbus-UjghVJFa5E sock_file by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# ausearch -c 'gnome-shell' --raw | audit2allow -M my-gnomeshell
# semodule -X 300 -i my-gnomeshell.pp
Additional Information:
Source Context system_u:system_r:xdm_t:s0-s0:c0.c1023
Target Context system_u:object_r:tmp_t:s0
Target Objects dbus-UjghVJFa5E [ sock_file ]
Source gnome-shell
Source Path gnome-shell
Port <Unknown>
Host (removed)
Source RPM Packages
Target RPM Packages
SELinux Policy RPM selinux-policy-targeted-3.14.7-26.fc34.noarch
Local Policy RPM selinux-policy-targeted-3.14.7-26.fc34.noarch
Selinux Enabled True
Policy Type targeted
Enforcing Mode Enforcing
Host Name (removed)
Platform Linux (removed) 5.11.8-300.fc34.x86_64 #1 SMP Mon
Mar 22 01:33:25 UTC 2021 x86_64 x86_64
Alert Count 7
First Seen 2021-03-24 16:44:35 PDT
Last Seen 2021-03-24 16:44:38 PDT
Local ID 122c0c88-7ad6-40a0-b483-57ebdf1ffb48
Raw Audit Messages
type=AVC msg=audit(1616629478.333:783): avc: denied { write } for pid=1724 comm="ibus-x11" name="dbus-UjghVJFa5E" dev="tmpfs" ino=49 scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:tmp_t:s0 tclass=sock_file permissive=0
Hash: gnome-shell,xdm_t,tmp_t,sock_file,write
Version-Release number of selected component:
selinux-policy-targeted-3.14.7-26.fc34.noarch
Additional info:
component: selinux-policy
reporter: libreport-2.14.0
hashmarkername: setroubleshoot
kernel: 5.11.8-300.fc34.x86_64
type: libreport
Potential duplicate: bug 1941853