Additional info: libreport version: 2.0.14 kernel: 3.6.0-1.fc18.x86_64 description: :SELinux is preventing /usr/libexec/gnome-settings-daemon from 'write' accesses on the fifo_file /run/systemd/inhibit/2.ref. : :***** Plugin catchall (100. confidence) suggests *************************** : :If you believe that gnome-settings-daemon should be allowed write access on the 2.ref fifo_file by default. :Then you should report this as a bug. :You can generate a local policy module to allow this access. :Do :allow this access for now by executing: :# grep gdbus /var/log/audit/audit.log | audit2allow -M mypol :# semodule -i mypol.pp : :Additional Information: :Source Context system_u:system_r:xdm_t:s0-s0:c0.c1023 :Target Context system_u:object_r:systemd_logind_inhibit_var_run_t : :s0 :Target Objects /run/systemd/inhibit/2.ref [ fifo_file ] :Source gdbus :Source Path /usr/libexec/gnome-settings-daemon :Port <Unknown> :Host (removed) :Source RPM Packages gnome-settings-daemon-3.6.0-3.fc18.x86_64 :Target RPM Packages :Policy RPM selinux-policy-3.11.1-25.fc18.noarch :Selinux Enabled True :Policy Type targeted :Enforcing Mode Enforcing :Host Name (removed) :Platform Linux (removed) 3.6.0-1.fc18.x86_64 #1 SMP Mon Oct : 1 16:02:25 UTC 2012 x86_64 x86_64 :Alert Count 2 :First Seen 2012-10-03 12:10:20 CEST :Last Seen 2012-10-03 12:10:21 CEST :Local ID c8b53f94-8a16-46f9-8a28-2481aca83d24 : :Raw Audit Messages :type=AVC msg=audit(1349259021.47:130): avc: denied { write } for pid=29570 comm="gdbus" path="/run/systemd/inhibit/2.ref" dev="tmpfs" ino=96065 scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:systemd_logind_inhibit_var_run_t:s0 tclass=fifo_file : : :type=SYSCALL msg=audit(1349259021.47:130): arch=x86_64 syscall=recvmsg success=yes exit=EBUSY a0=a a1=7f784c9b88b0 a2=40000000 a3=40 items=0 ppid=29540 pid=29570 auid=42 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=7 comm=gdbus exe=/usr/libexec/gnome-settings-daemon subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null) : :Hash: gdbus,xdm_t,systemd_logind_inhibit_var_run_t,fifo_file,write : :audit2allow : :#============= xdm_t ============== :allow xdm_t systemd_logind_inhibit_var_run_t:fifo_file write; : :audit2allow -R : :#============= xdm_t ============== :allow xdm_t systemd_logind_inhibit_var_run_t:fifo_file write; :
Created attachment 620739 [details] File: type
Created attachment 620740 [details] File: hashmarkername
Fixed in selinux-policy-3.11.1-32.fc18.noarch
selinux-policy-3.11.1-36.fc18 has been submitted as an update for Fedora 18. https://admin.fedoraproject.org/updates/selinux-policy-3.11.1-36.fc18
Package selinux-policy-3.11.1-36.fc18: * should fix your issue, * was pushed to the Fedora 18 testing repository, * should be available at your local mirror within two days. Update it with: # su -c 'yum update --enablerepo=updates-testing selinux-policy-3.11.1-36.fc18' as soon as you are able to. Please go to the following url: https://admin.fedoraproject.org/updates/FEDORA-2012-15934/selinux-policy-3.11.1-36.fc18 then log in and leave karma (feedback).
selinux-policy-3.11.1-36.fc18 has been pushed to the Fedora 18 stable repository. If problems still persist, please make note of it in this bug report.