Resúmen: SELinux is preventing access to files with the label, file_t. Descripción Detallada: SELinux permission checks on files labeled file_t are being denied. file_t is the context the SELinux kernel gives to files that do not have a label. This indicates a serious labeling problem. No files on an SELinux box should ever be labeled file_t. If you have just added a new disk drive to the system you can relabel it using the restorecon command. Otherwise you should relabel the entire file system. Permitiendo Acceso: You can execute the following command as root to relabel your computer system: "touch /.autorelabel; reboot" Información Adicional: Contexto Fuente system_u:system_r:xdm_t:s0-s0:c0.c1023 Contexto Destino system_u:object_r:file_t:s0 Objetos Destino /home/osoriopa [ dir ] Fuente Default Dirección de Fuente /bin/bash Puerto <Desconocido> Nombre de Equipo (removed) Paquetes RPM Fuentes bash-4.0.33-1.fc12 Paquetes RPM Destinos RPM de Políticas selinux-policy-3.6.32-41.fc12 SELinux Activado True Tipo de Política targeted MLS Activado True Modo Obediente Enforcing Nombre de Plugin file Nombre de Equipo (removed) Plataforma Linux (removed) 2.6.31.5-127.fc12.i686.PAE #1 SMP Sat Nov 7 21:25:57 EST 2009 i686 i686 Cantidad de Alertas 5 Visto por Primera Vez vie 20 nov 2009 09:38:18 VET Visto por Última Vez vie 20 nov 2009 09:45:06 VET ID Local c7fafa6f-22b4-49f6-b602-cb7c7a2a133c Números de Línea Mensajes de Auditoría Crudos node=(removed) type=AVC msg=audit(1258726506.209:43677): avc: denied { getattr } for pid=3518 comm="Default" path="/home/osoriopa" dev=sda4 ino=65537 scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=dir node=(removed) type=SYSCALL msg=audit(1258726506.209:43677): arch=40000003 syscall=195 success=no exit=-13 a0=973f838 a1=bf8a92b0 a2=635ff4 a3=0 items=0 ppid=3393 pid=3518 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="Default" exe="/bin/bash" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null) Hash String generated from selinux-policy-3.6.32-41.fc12,file,Default,xdm_t,file_t,dir,getattr audit2allow suggests: #============= xdm_t ============== allow xdm_t file_t:dir getattr;
*** This bug has been marked as a duplicate of bug 537613 ***