Bug 984377
Summary: | SELinux is preventing /opt/teamviewer8/tv_bin/wine/bin/wineserver from 'create' accesses on the sock_file socket. | ||
---|---|---|---|
Product: | [Fedora] Fedora | Reporter: | Moez Roy <moez.roy> |
Component: | selinux-policy | Assignee: | Miroslav Grepl <mgrepl> |
Status: | CLOSED NOTABUG | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
Severity: | unspecified | Docs Contact: | |
Priority: | unspecified | ||
Version: | 18 | CC: | dominick.grift, dwalsh, lvrabec, mgrepl |
Target Milestone: | --- | ||
Target Release: | --- | ||
Hardware: | x86_64 | ||
OS: | Unspecified | ||
Whiteboard: | abrt_hash:3d4765c3c6c01e8b45308af463b7fc5f5fa25828c87dbcc584811228737c8910 | ||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2013-07-15 21:14:36 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Moez Roy
2013-07-15 06:08:05 UTC
*** Bug 984378 has been marked as a duplicate of this bug. *** *** Bug 984380 has been marked as a duplicate of this bug. *** *** Bug 984379 has been marked as a duplicate of this bug. *** *** Bug 984381 has been marked as a duplicate of this bug. *** *** Bug 984383 has been marked as a duplicate of this bug. *** *** Bug 984384 has been marked as a duplicate of this bug. *** *** Bug 984385 has been marked as a duplicate of this bug. *** *** Bug 984386 has been marked as a duplicate of this bug. *** *** Bug 984389 has been marked as a duplicate of this bug. *** *** Bug 984387 has been marked as a duplicate of this bug. *** *** Bug 984390 has been marked as a duplicate of this bug. *** *** Bug 984391 has been marked as a duplicate of this bug. *** Since we do not ship teamviewer you or someone else needs to write policy for it, or turn back on unconfined domains. If you want to run with disabled unconfined module then I would make the local policy # cat myunconfined.te policy_module(myunconfined, 1.0) require{ type initrc_t; } unconfined_domain(initrc_t) # make -f /usr/share/selinux/devel/Makefile myunconfined.pp # semodule -i myunconfined.pp That will not work. unconfined_domain_noaudit(initrc_t) WIll Ah yes, meant this. # cat myunconfined.te policy_module(myunconfined, 1.0) require{ type initrc_t; } unconfined_domain_noaudit(initrc_t) # make -f /usr/share/selinux/devel/Makefile myunconfined.pp # semodule -i myunconfined.pp |