The following was filed automatically by setroubleshoot: Summary: SELinux is preventing udev-acl.ck "getattr" access on /dev/.udev/db/\x2fdevices\x2fpci0000:00\x2f0000:00:1d.1\x2fusb3\x2f3-1\x2f3-1:1.0\x2finput\x2finput3\x2fevent3. Detailed Description: SELinux denied access requested by udev-acl.ck. It is not expected that this access is required by udev-acl.ck and this access may signal an intrusion attempt. It is also possible that the specific version or configuration of the application is causing it to require additional access. Allowing Access: You can generate a local policy module to allow this access - see FAQ (http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385) Please file a bug report (http://bugzilla.redhat.com/bugzilla/enter_bug.cgi) against this package. Additional Information: Source Context system_u:system_r:consolekit_t:s0-s0:c0.c1023 Target Context system_u:object_r:udev_tbl_t:s0 Target Objects /dev/.udev/db/\x2fdevices\x2fpci0000:00\x2f0000:00 :1d.1\x2fusb3\x2f3-1\x2f3-1:1.0\x2finput\x2finput3 \x2fevent3 [ file ] Source udev-acl.ck Source Path /lib/udev/udev-acl Port <Unknown> Host (removed) Source RPM Packages udev-145-7.fc12 Target RPM Packages Policy RPM selinux-policy-3.6.28-8.fc12 Selinux Enabled True Policy Type targeted MLS Enabled True Enforcing Mode Enforcing Plugin Name catchall Host Name (removed) Platform Linux (removed) 2.6.31-0.180.rc7.git4.fc12.i686 #1 SMP Wed Aug 26 16:30:44 EDT 2009 i686 i686 Alert Count 1 First Seen Fri 28 Aug 2009 09:47:53 AM EDT Last Seen Fri 28 Aug 2009 09:47:53 AM EDT Local ID 6b803ce8-04df-4207-91b5-1f9b8b7f0cf2 Line Numbers Raw Audit Messages node=(removed) type=AVC msg=audit(1251467273.170:76): avc: denied { getattr } for pid=1832 comm="udev-acl.ck" path="/dev/.udev/db/\x2fdevices\x2fpci0000:00\x2f0000:00:1d.1\x2fusb3\x2f3-1\x2f3-1:1.0\x2finput\x2finput3\x2fevent3" dev=tmpfs ino=8170 scontext=system_u:system_r:consolekit_t:s0-s0:c0.c1023 tcontext=system_u:object_r:udev_tbl_t:s0 tclass=file node=(removed) type=SYSCALL msg=audit(1251467273.170:76): arch=40000003 syscall=196 success=no exit=-13 a0=bfb0ce2c a1=bfb0b9c8 a2=43cff4 a3=8484344 items=0 ppid=1255 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="udev-acl.ck" exe="/lib/udev/udev-acl" subj=system_u:system_r:consolekit_t:s0-s0:c0.c1023 key=(null) audit2allow suggests: #============= consolekit_t ============== allow consolekit_t udev_tbl_t:file getattr;
Is /lib/udev/udev-acl labeled correctly? ls -lZ /lib/udev/udev-acl -rwxr-xr-x. root root system_u:object_r:udev_exec_t:s0 /lib/udev/udev-acl # restorecon -v /lib/udev/udev-acl Should fix it. consolekit is supposed to transition to udev_t if udev-acl is labeled correctly