Description of problem: This happened when I try to test bumblebeed on Fedora 21 with the command: optirun glxgears -info | grep "GL_VENDOR" SELinux is preventing Xorg.bin from 'add_name' accesses on the directory .tX8-lock. ***** Plugin catchall (100. confidence) suggests ************************** If cree que de manera predeterminada, Xorg.bin debería permitir acceso add_name sobre .tX8-lock directory. Then debería reportar esto como un error. Puede generar un módulo de política local para permitir este acceso. Do permita el acceso momentáneamente executando: # grep Xorg.bin /var/log/audit/audit.log | audit2allow -M mypol # semodule -i mypol.pp Additional Information: Source Context system_u:system_r:bumblebee_t:s0 Target Context system_u:object_r:tmp_t:s0 Target Objects .tX8-lock [ dir ] Source Xorg.bin Source Path Xorg.bin Port <Unknown> Host (removed) Source RPM Packages Target RPM Packages Policy RPM selinux-policy-3.13.1-103.fc21.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name (removed) Platform Linux (removed) 3.17.7-300.fc21.x86_64 #1 SMP Wed Dec 17 03:08:44 UTC 2014 x86_64 x86_64 Alert Count 32 First Seen 2014-12-22 23:32:42 CST Last Seen 2014-12-23 01:20:18 CST Local ID 3dc0b3f5-9d91-4b66-a87e-c27834c01168 Raw Audit Messages type=AVC msg=audit(1419319218.971:986): avc: denied { add_name } for pid=31008 comm="Xorg.bin" name=".tX8-lock" scontext=system_u:system_r:bumblebee_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=dir permissive=0 Hash: Xorg.bin,bumblebee_t,tmp_t,dir,add_name Version-Release number of selected component: selinux-policy-3.13.1-103.fc21.noarch Additional info: reporter: libreport-2.3.0 hashmarkername: setroubleshoot kernel: 3.17.7-300.fc21.x86_64 type: libreport
*** This bug has been marked as a duplicate of bug 1176327 ***