Résumé: SELinux is preventing /usr/bin/canberra-gtk-play "module_request" access. Description détaillée: [SELinux is in permissive mode. This access was not denied.] SELinux denied access requested by canberra-gtk-pl. It is not expected that this access is required by canberra-gtk-pl and this access may signal an intrusion attempt. It is also possible that the specific version or configuration of the application is causing it to require additional access. Autoriser l'accès: You can generate a local policy module to allow this access - see FAQ (http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385) Please file a bug report. Informations complémentaires: Contexte source system_u:system_r:xdm_t:s0-s0:c0.c1023 Contexte cible system_u:system_r:kernel_t:s0 Objets du contexte None [ system ] source metacity Chemin de la source /usr/bin/metacity Port <Inconnu> Hôte (removed) Paquetages RPM source libcanberra-gtk2-0.22-1.fc12 Paquetages RPM cible Politique RPM selinux-policy-3.6.32-41.fc12 Selinux activé True Type de politique targeted MLS activé True Mode strict Permissive Nom du plugin catchall Nom de l'hôte (removed) Plateforme Linux (removed) 2.6.31.5-127.fc12.x86_64 #1 SMP Sat Nov 7 21:11:14 EST 2009 x86_64 x86_64 Compteur d'alertes 15 Première alerte mar. 17 nov. 2009 20:19:48 CET Dernière alerte jeu. 19 nov. 2009 19:34:24 CET ID local e82f7975-62a1-43e1-acf4-01c82920d678 Numéros des lignes Messages d'audit bruts node=(removed) type=AVC msg=audit(1258655664.141:11): avc: denied { module_request } for pid=1658 comm="canberra-gtk-pl" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:system_r:kernel_t:s0 tclass=system node=(removed) type=SYSCALL msg=audit(1258655664.141:11): arch=c000003e syscall=41 success=no exit=-97 a0=a a1=1 a2=0 a3=0 items=0 ppid=1615 pid=1658 auid=4294967295 uid=42 gid=476 euid=42 suid=42 fsuid=42 egid=476 sgid=476 fsgid=476 tty=(none) ses=4294967295 comm="canberra-gtk-pl" exe="/usr/bin/canberra-gtk-play" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null) Hash String generated from selinux-policy-3.6.32-41.fc12,catchall,metacity,xdm_t,kernel_t,system,module_request audit2allow suggests: #============= xdm_t ============== allow xdm_t kernel_t:system module_request;
*** This bug has been marked as a duplicate of bug 527936 ***