Description of problem: SELinux is preventing bumblebeed from 'execute' accesses on the file /usr/bin/Xorg. ***** Plugin catchall (100. confidence) suggests ************************** If 您确定应默认允许 bumblebeed execute 访问 Xorg file。 Then 您应该将这个情况作为 bug 报告。 您可以生成本地策略模块允许这个访问。 Do 请执行以下命令此时允许这个访问: # grep bumblebeed /var/log/audit/audit.log | audit2allow -M mypol # semodule -i mypol.pp Additional Information: Source Context system_u:system_r:bumblebee_t:s0 Target Context system_u:object_r:xserver_exec_t:s0 Target Objects /usr/bin/Xorg [ file ] Source bumblebeed Source Path bumblebeed Port <Unknown> Host (removed) Source RPM Packages Target RPM Packages xorg-x11-server-Xorg-1.14.4-5.fc20.x86_64 Policy RPM selinux-policy-3.12.1-106.fc20.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name (removed) Platform Linux (removed) 3.12.5-302.fc20.x86_64 #1 SMP Tue Dec 17 20:42:32 UTC 2013 x86_64 x86_64 Alert Count 1 First Seen 2013-12-24 21:34:58 CST Last Seen 2013-12-24 21:34:58 CST Local ID 31c97338-8693-4965-ad2e-8893cc35de7d Raw Audit Messages type=AVC msg=audit(1387892098.295:2402): avc: denied { execute } for pid=24121 comm="bumblebeed" name="Xorg" dev="sda6" ino=794002 scontext=system_u:system_r:bumblebee_t:s0 tcontext=system_u:object_r:xserver_exec_t:s0 tclass=file Hash: bumblebeed,bumblebee_t,xserver_exec_t,file,execute Additional info: reporter: libreport-2.1.10 hashmarkername: setroubleshoot kernel: 3.12.5-302.fc20.x86_64 type: libreport
*** This bug has been marked as a duplicate of bug 1045801 ***