On 08/11/2016 04:50 PM, Rami Rosen
wrote:
The 5 error details are quite long. Let me give just the first few lines: ============= SELinux is preventing (uetoothd) from mounton access on the directory /etc. ***** Plugin catchall_labels (83.8 confidence) suggests ******************* If you want to allow (uetoothd) to have mounton access on the etc directory Then you need to change the label on /etc Do # semanage fcontext -a -t FILE_TYPE '/etc' ============= SELinux is preventing lightdm from write access on the file .xsession-errors. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that lightdm should be allowed write access on the .xsession-errors file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'lightdm' --raw | audit2allow -M my-lightdm # semodule -X 300 -i my-lightdm.pp ============= SELinux is preventing lightdm from rename access on the file .xsession-errors. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that lightdm should be allowed rename access on the .xsession-errors file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'lightdm' --raw | audit2allow -M my-lightdm # semodule -X 300 -i my-lightdm.pp ============= SELinux is preventing systemd-logind from getattr access on the file /dev/shm/lldpad.state. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /dev/shm/lldpad.state default label should be lldpad_tmpfs_t. Then you can run restorecon. Do # /sbin/restorecon -v /dev/shm/lldpad.state ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that systemd-logind should be allowed getattr access on the lldpad.state file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'systemd-logind' --raw | audit2allow -M my-systemdlogind # semodule -X 300 -i my-systemdlogind.pp ============= SELinux is preventing accounts-daemon from write access on the directory root. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that accounts-daemon should be allowed write access on the root directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'accounts-daemon' --raw | audit2allow -M my-accountsdaemon # semodule -X 300 -i my-accountsdaemon.pp ============= I have not tried any of the suggestions. As I don't know if they are valid or what...
|
-- users mailing list users@xxxxxxxxxxxxxxxxxxxxxxx To unsubscribe or change subscription options: https://lists.fedoraproject.org/admin/lists/users@xxxxxxxxxxxxxxxxxxxxxxx Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct Guidelines: http://fedoraproject.org/wiki/Mailing_list_guidelines Have a question? Ask away: http://ask.fedoraproject.org