Description of problem: SELinux denied access requested by setxkbmap. It is not expected that this access is required by setxkbmap and this access may signal an intrusion attempt. It is also possible that the specific version or configuration of the application is causing it to require additional access. Version-Release number of selected component (if applicable): How reproducible: Steps to Reproduce: 1. 2. 3. Actual results: Expected results: Additional info: Allowing Access You can generate a local policy module to allow this access - see http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385 Or you can disable SELinux protection altogether. Disabling SELinux protection is not recommended. Please file a http://bugzilla.redhat.com/bugzilla/enter_bug.cgi against this package. Additional Information Source Context system_u:system_r:rhgb_t Target Context system_u:object_r:fs_t Target Objects / [ filesystem ] Affected RPM Packages filesystem-2.4.6-1.fc7 [target] Policy RPM selinux-policy-2.6.4-49.fc7 Selinux Enabled True Policy Type targeted MLS Enabled True Enforcing Mode Enforcing Plugin Name plugins.catchall Host Name timmieland.private Platform Linux timmieland.private 2.6.23.1-21.fc7 #1 SMP Thu Nov 1 21:09:24 EDT 2007 i686 athlon Alert Count 29 First Seen Mon 05 Nov 2007 11:30:57 PM MST Last Seen Sat 10 Nov 2007 03:11:26 PM MST Local ID bbcf2355-3f59-45e4-94a0-8451178713f8 Line Numbers Raw Audit Messages avc: denied { getattr } for comm="setxkbmap" dev=dm-0 name="/" pid=2942 scontext=system_u:system_r:rhgb_t:s0 tclass=filesystem tcontext=system_u:object_r:fs_t:s0
Fixed in selinux-policy-2.6.4-58.fc7