Running oddjobd 0.26 on Raw Hide currently causes massive numbers of SELinux
policy denials to be logged. The D-BUS maintainer tells me that it's because
oddjobd subscribes to all messages using dbus_bus_add_match(""), though it has
no need to do so as unicast messages are always routed properly, and this is
what's triggering the denials.
I need to double-check that removing this call doesn't break anything on FE3/4/5
(which contain older versions of D-BUS which may or may not have required this
to be done) before making this fix for the upstream release.
Fixed in oddjob 0.27. There are no ill effects from removing the above
add_match call, at least as far back as D-BUS 0.22. The oddjob 0.27 release
also fixes a compilation failure against D-Bus 0.90.