Description of problem: SELinux is preventing gst-plugin-scan from 'write' accesses on the sock_file bus. ***** Plugin catchall (100. confidence) suggests ************************** Se você acredita nisso gst-plugin-scan deve ser permitido write acesso no bus sock_file por padrão. Then você deve informar que este é um erro. Você pode gerar um módulo de política local para permitir este acesso. Do permitir este acesso por agora executando: # ausearch -c 'gst-plugin-scan' --raw | audit2allow -M my-gstpluginscan # semodule -X 300 -i my-gstpluginscan.pp Additional Information: Source Context unconfined_u:unconfined_r:thumb_t:s0-s0:c0.c1023 Target Context unconfined_u:object_r:session_dbusd_tmp_t:s0 Target Objects bus [ sock_file ] Source gst-plugin-scan Source Path gst-plugin-scan Port <Desconhecido> Host (removed) Source RPM Packages Target RPM Packages SELinux Policy RPM selinux-policy-targeted-35.11-1.fc35.noarch Local Policy RPM selinux-policy-targeted-35.11-1.fc35.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name (removed) Platform Linux (removed) 5.15.16-200.fc35.x86_64 #1 SMP Thu Jan 20 15:38:18 UTC 2022 x86_64 x86_64 Alert Count 11 First Seen 2022-01-28 21:50:01 -03 Last Seen 2022-01-28 21:50:19 -03 Local ID 31a5e34a-44c1-4910-a78f-51b25814f7d6 Raw Audit Messages type=AVC msg=audit(1643417419.189:323): avc: denied { write } for pid=15279 comm="totem-video-thu" name="bus" dev="tmpfs" ino=78 scontext=unconfined_u:unconfined_r:thumb_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:session_dbusd_tmp_t:s0 tclass=sock_file permissive=0 Hash: gst-plugin-scan,thumb_t,session_dbusd_tmp_t,sock_file,write Version-Release number of selected component: selinux-policy-targeted-35.11-1.fc35.noarch Additional info: component: selinux-policy reporter: libreport-2.15.2 hashmarkername: setroubleshoot kernel: 5.15.16-200.fc35.x86_64 type: libreport
*** This bug has been marked as a duplicate of bug 2042696 ***