The following was filed automatically by setroubleshoot: 概述: SELinux is preventing the npviewer from using potentially mislabeled files (root). 详细描述: SELinux has denied npviewer access to potentially mislabeled file(s) (root). This means that SELinux will not allow npviewer to use these files. It is common for users to edit files in their home directory or tmp directories and then move (mv) them to system directories. The problem is that the files end up with the wrong file context which confined applications are not allowed to access. 允许访问: If you want npviewer to access this files, you need to relabel them using restorecon -v 'root'. You might want to relabel the entire directory using restorecon -R -v 'root'. 附加信息: 源上下文 unconfined_u:unconfined_r:nsplugin_config_t:s0-s0: c0.c1023 目标上下文 system_u:object_r:admin_home_t:s0 目标对象 root [ dir ] 源 npviewer 源路径 /bin/bash 端口 <未知> 主机 (removed) 源 RPM 软件包 bash-4.0.28-1.fc12 目标 RPM 软件包 filesystem-2.4.27-1.fc12 策略 RPM selinux-policy-3.6.26-8.fc12 启用 Selinux True 策略类型 targeted 启用 MLS True Enforcing 模式 Enforcing 插件名称 home_tmp_bad_labels 主机名 (removed) 平台 Linux (removed) 2.6.31-0.125.4.2.rc5.git2.fc12.i686.PAE #1 SMP Tue Aug 11 21:01:03 EDT 2009 i686 i686 警报计数 6 第一个 2009年09月16日 星期三 08时35分26秒 最后一个 2009年09月16日 星期三 08时35分26秒 本地 ID f6317fc5-c700-4ea8-8e88-31c65e186f50 行号 原始核查信息 node=(removed) type=AVC msg=audit(1253061326.651:22893): avc: denied { search } for pid=2367 comm="npviewer" name="root" dev=sda7 ino=73586 scontext=unconfined_u:unconfined_r:nsplugin_config_t:s0-s0:c0.c1023 tcontext=system_u:object_r:admin_home_t:s0 tclass=dir node=(removed) type=SYSCALL msg=audit(1253061326.651:22893): arch=40000003 syscall=195 success=no exit=-13 a0=80e595b a1=bfeaa1bc a2=cf8ff4 a3=9927f70 items=0 ppid=2363 pid=2367 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=1 comm="npviewer" exe="/bin/bash" subj=unconfined_u:unconfined_r:nsplugin_config_t:s0-s0:c0.c1023 key=(null) audit2allow suggests: #============= nsplugin_config_t ============== allow nsplugin_config_t admin_home_t:dir search;
*** This bug has been marked as a duplicate of bug 523570 ***