Summary: SELinux is preventing /usr/bin/canberra-gtk-play "module_request" access. Detailed Description: SELinux denied access requested by canberra-gtk-pl. It is not expected that this access is required by canberra-gtk-pl and this access may signal an intrusion attempt. It is also possible that the specific version or configuration of the application is causing it to require additional access. Allowing Access: You can generate a local policy module to allow this access - see FAQ (http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385) Please file a bug report. Additional Information: Source Context system_u:system_r:xdm_t:s0-s0:c0.c1023 Target Context system_u:system_r:kernel_t:s0 Target Objects None [ system ] Source canberra-gtk-pl Source Path /usr/bin/canberra-gtk-play Port <Unknown> Host (removed) Source RPM Packages libcanberra-gtk2-0.22-1.fc12 Target RPM Packages Policy RPM selinux-policy-3.6.32-46.fc12 Selinux Enabled True Policy Type targeted MLS Enabled True Enforcing Mode Enforcing Plugin Name catchall Host Name (removed) Platform Linux (removed) 2.6.31.5-127.fc12.x86_64 #1 SMP Sat Nov 7 21:11:14 EST 2009 x86_64 x86_64 Alert Count 4 First Seen Mon 16 Nov 2009 03:40:12 PM EST Last Seen Thu 19 Nov 2009 08:33:13 AM EST Local ID 8ce5cf89-0508-4a1a-ad71-f443b060e464 Line Numbers Raw Audit Messages node=(removed) type=AVC msg=audit(1258637593.932:18): avc: denied { module_request } for pid=1580 comm="canberra-gtk-pl" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:system_r:kernel_t:s0 tclass=system node=(removed) type=SYSCALL msg=audit(1258637593.932:18): arch=c000003e syscall=41 success=no exit=-97 a0=a a1=1 a2=0 a3=0 items=0 ppid=1536 pid=1580 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm="canberra-gtk-pl" exe="/usr/bin/canberra-gtk-play" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null) Hash String generated from selinux-policy-3.6.32-46.fc12,catchall,canberra-gtk-pl,xdm_t,kernel_t,system,module_request audit2allow suggests: #============= xdm_t ============== allow xdm_t kernel_t:system module_request;
*** This bug has been marked as a duplicate of bug 527936 ***