Summary: SELinux is preventing /usr/bin/consolehelper-gtk "open" access on database. Detailed Description: [SELinux is in permissive mode. This access was not denied.] SELinux denied access requested by consolehelper-g. It is not expected that this access is required by consolehelper-g and this access may signal an intrusion attempt. It is also possible that the specific version or configuration of the application is causing it to require additional access. Allowing Access: You can generate a local policy module to allow this access - see FAQ (http://docs.fedoraproject.org/selinux-faq-fc5/#id2961385) Please file a bug report. Additional Information: Source Context staff_u:staff_r:staff_consolehelper_t:s0 Target Context system_u:object_r:xdm_var_run_t:s0 Target Objects database [ file ] Source consolehelper-g Source Path /usr/bin/consolehelper-gtk Port <Unknown> Host (removed) Source RPM Packages usermode-gtk-1.104.2-1.fc13 Target RPM Packages Policy RPM selinux-policy-3.7.19-2.fc13 Selinux Enabled True Policy Type targeted Enforcing Mode Permissive Plugin Name catchall Host Name (removed) Platform Linux (removed) 2.6.33.2-57.fc13.x86_64 #1 SMP Tue Apr 20 08:57:50 UTC 2010 x86_64 x86_64 Alert Count 1 First Seen Wed 21 Apr 2010 04:47:54 PM EDT Last Seen Wed 21 Apr 2010 04:47:54 PM EDT Local ID 80d891bb-2138-4e0e-b513-33920a906da0 Line Numbers Raw Audit Messages node=(removed) type=AVC msg=audit(1271882874.218:44): avc: denied { open } for pid=2453 comm="consolehelper-g" name="database" dev=dm-2 ino=526029 scontext=staff_u:staff_r:staff_consolehelper_t:s0 tcontext=system_u:object_r:xdm_var_run_t:s0 tclass=file node=(removed) type=SYSCALL msg=audit(1271882874.218:44): arch=c000003e syscall=2 success=yes exit=68719476864 a0=7fffa96b5e3b a1=0 a2=1b6 a3=0 items=0 ppid=1 pid=2453 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=1 comm="consolehelper-g" exe="/usr/bin/consolehelper-gtk" subj=staff_u:staff_r:staff_consolehelper_t:s0 key=(null) Hash String generated from catchall,consolehelper-g,staff_consolehelper_t,xdm_var_run_t,file,open audit2allow suggests: #============= staff_consolehelper_t ============== allow staff_consolehelper_t xdm_var_run_t:file open;
*** This bug has been marked as a duplicate of bug 584570 ***