Sumário: SELinux is preventing /usr/bin/metacity "module_request" access. Descrição detalhada: SELinux denied access requested by metacity. It is not expected that this access is required by metacity and this access may signal an intrusion attempt. It is also possible that the specific version or configuration of the application is causing it to require additional access. Permitindo acesso: You can generate a local policy module to allow this access - see FAQ (http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385) Please file a bug report. Informações adicionais: Contexto de origem system_u:system_r:xdm_t:s0-s0:c0.c1023 Contexto de destino system_u:system_r:kernel_t:s0 Objetos de destino None [ system ] Origem canberra-gtk-pl Caminho da origem /usr/bin/canberra-gtk-play Porta <Desconhecido> Máquina (removed) Pacotes RPM de origem metacity-2.28.0-3.fc12 Pacotes RPM de destino RPM da política selinux-policy-3.6.32-27.fc12 Selinux habilitado True Tipo de política targeted MLS habilitado True Modo reforçado Enforcing Nome do plugin catchall Nome da máquina (removed) Plataforma Linux (removed) 2.6.31.1-56.fc12.i686 #1 SMP Tue Sep 29 16:32:02 EDT 2009 i686 i686 Contador de alertas 4 Visto pela primeira vez em Sex 23 Out 2009 22:53:37 BRT Visto pela última vez em Sex 23 Out 2009 22:57:14 BRT ID local a429878c-b979-45aa-bd65-31369be9a10b Números de linha Mensagens de auditoria não p node=(removed) type=AVC msg=audit(1256349434.790:9): avc: denied { module_request } for pid=1276 comm="metacity" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:system_r:kernel_t:s0 tclass=system node=(removed) type=SYSCALL msg=audit(1256349434.790:9): arch=40000003 syscall=102 success=no exit=-97 a0=1 a1=b28c5030 a2=48b208 a3=b1d00a98 items=0 ppid=1216 pid=1276 auid=4294967295 uid=42 gid=481 euid=42 suid=42 fsuid=42 egid=481 sgid=481 fsgid=481 tty=(none) ses=4294967295 comm="metacity" exe="/usr/bin/metacity" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null) Hash String generated from selinux-policy-3.6.32-27.fc12,catchall,canberra-gtk-pl,xdm_t,kernel_t,system,module_request audit2allow suggests: #============= xdm_t ============== allow xdm_t kernel_t:system module_request;
*** This bug has been marked as a duplicate of bug 527936 ***