Description of problem: SELinux is preventing /usr/bin/mandb from 'open' accesses on the file . ***** Plugin catchall (100. confidence) suggests ************************** If cree que de manera predeterminada, mandb debería permitir acceso open sobre file. Then debería reportar esto como un error. Puede generar un módulo de política local para permitir este acceso. Do permita el acceso momentáneamente executando: # grep mandb /var/log/audit/audit.log | audit2allow -M mypol # semodule -i mypol.pp Additional Information: Source Context system_u:system_r:mandb_t:s0-s0:c0.c1023 Target Context unconfined_u:object_r:user_tmp_t:s0 Target Objects [ file ] Source mandb Source Path /usr/bin/mandb Port <Unknown> Host (removed) Source RPM Packages man-db-2.6.5-4.fc20.x86_64 Target RPM Packages Policy RPM selinux-policy-3.12.1-183.fc20.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name (removed) Platform Linux (removed) 3.16.2-200.fc20.x86_64 #1 SMP Mon Sep 8 11:54:45 UTC 2014 x86_64 x86_64 Alert Count 1 First Seen 2014-09-17 15:13:06 CDT Last Seen 2014-09-17 15:13:06 CDT Local ID 1f585a8b-6e23-446f-a00d-fbfe04fe91f5 Raw Audit Messages type=AVC msg=audit(1410984786.860:507): avc: denied { open } for pid=5161 comm="mandb" path="/usr/share/man/man1/ipcluster.1.gz" dev="dm-0" ino=1182877 scontext=system_u:system_r:mandb_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_tmp_t:s0 tclass=file permissive=0 type=SYSCALL msg=audit(1410984786.860:507): arch=x86_64 syscall=open success=no exit=EACCES a0=17fd6c0 a1=0 a2=0 a3=8 items=0 ppid=5156 pid=5161 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=2 comm=mandb exe=/usr/bin/mandb subj=system_u:system_r:mandb_t:s0-s0:c0.c1023 key=(null) Hash: mandb,mandb_t,user_tmp_t,file,open Additional info: reporter: libreport-2.2.3 hashmarkername: setroubleshoot kernel: 3.16.2-200.fc20.x86_64 type: libreport
restorecon -R -v /usr/share/man Looks like you have some man pages that were created in /tmp and then mv'd to this directory.