View Issue Details

IDProjectCategoryView StatusLast Update
0015666CentOS-7selinux-policypublic2019-01-04 13:19
Reportertester2 
PrioritynormalSeverityminorReproducibilityhave not tried
Status newResolutionopen 
PlatformOSOS Version7
Product Version 
Target VersionFixed in Version 
Summary0015666: SELinux is preventing gdm-session-wor from 'create' accesses on the directory gdm.
DescriptionDescription of problem:
SELinux is preventing gdm-session-wor from 'create' accesses on the directory gdm.

***** Plugin catchall_boolean (89.3 confidence) suggests ******************

If you want to allow polyinstantiation to enabled
Then you must tell SELinux about this by enabling the 'polyinstantiation_enabled' boolean.

Do
setsebool -P polyinstantiation_enabled 1

***** Plugin catchall (11.6 confidence) suggests **************************

If you believe that gdm-session-wor should be allowed create access on the gdm directory by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# ausearch -c 'gdm-session-wor' --raw | audit2allow -M my-gdmsessionwor
# semodule -i my-gdmsessionwor.pp

Additional Information:
Source Context system_u:system_r:xdm_t:s0-s0:c0.c1023
Target Context system_u:object_r:user_home_t:s0
Target Objects gdm [ dir ]
Source gdm-session-wor
Source Path gdm-session-wor
Port <Unknown>
Host (removed)
Source RPM Packages
Target RPM Packages
Policy RPM selinux-policy-3.13.1-229.el7_6.6.noarch
Selinux Enabled True
Policy Type targeted
Enforcing Mode Enforcing
Host Name (removed)
Platform Linux (removed) 3.10.0-957.1.3.el7.x86_64 #1 SMP
                              Thu Nov 29 14:49:43 UTC 2018 x86_64 x86_64
Alert Count 1
First Seen 2019-01-04 14:18:18 CET
Last Seen 2019-01-04 14:18:18 CET
Local ID 2b086dc9-681f-477d-9c9f-519f79d78eda

Raw Audit Messages
type=AVC msg=audit(1546607898.163:191): avc: denied { create } for pid=4972 comm="gdm-session-wor" name="gdm" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:user_home_t:s0 tclass=dir permissive=0


Hash: gdm-session-wor,xdm_t,user_home_t,dir,create

Version-Release number of selected component:
selinux-policy-3.13.1-229.el7_6.6.noarch
Additional Informationreporter: libreport-2.1.11.1
hashmarkername: setroubleshoot
kernel: 3.10.0-957.1.3.el7.x86_64
reproducible: Not sure how to reproduce the problem
type: libreport
TagsNo tags attached.
abrt_hashd01f0bc15d2129f544aa76d19eec0c0c5eb4c03bcb43f418a25aaa9186defc77
URL

Activities

There are no notes attached to this issue.

Issue History

Date Modified Username Field Change
2019-01-04 13:19 tester2 New Issue