Summary: SELinux is preventing access to files with the label, file_t. Detailed Description: [SELinux is in permissive mode. This access was not denied.] SELinux permission checks on files labeled file_t are being denied. file_t is the context the SELinux kernel gives to files that do not have a label. This indicates a serious labeling problem. No files on an SELinux box should ever be labeled file_t. If you have just added a new disk drive to the system you can relabel it using the restorecon command. Otherwise you should relabel the entire files system. Allowing Access: You can execute the following command as root to relabel your computer system: "touch /.autorelabel; reboot" Additional Information: Source Context system_u:system_r:hald_t:s0 Target Context system_u:object_r:file_t:s0 Target Objects / [ dir ] Source libgpod-callout Source Path /usr/lib/hal/scripts/libgpod-callout Port <Unknown> Host (removed) Source RPM Packages libgpod-0.7.0-2.fc11 Target RPM Packages filesystem-2.4.21-1.fc11 Policy RPM selinux-policy-3.6.12-83.fc11 Selinux Enabled True Policy Type targeted MLS Enabled True Enforcing Mode Permissive Plugin Name file Host Name (removed) Platform Linux (removed) 2.6.30.8-64.fc11.i586 #1 SMP Fri Sep 25 04:30:19 EDT 2009 i686 i686 Alert Count 28 First Seen Mon 14 Sep 2009 02:48:56 PM CEST Last Seen Wed 14 Oct 2009 02:07:05 AM CEST Local ID 20f2b54c-96d6-467a-a39f-7f093b744384 Line Numbers Raw Audit Messages node=(removed) type=AVC msg=audit(1255478825.304:129): avc: denied { read } for pid=6283 comm="libgpod-callout" name="/" dev=sdb3 ino=2 scontext=system_u:system_r:hald_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=dir node=(removed) type=AVC msg=audit(1255478825.304:129): avc: denied { open } for pid=6283 comm="libgpod-callout" name="/" dev=sdb3 ino=2 scontext=system_u:system_r:hald_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=dir node=(removed) type=SYSCALL msg=audit(1255478825.304:129): arch=40000003 syscall=5 success=yes exit=3 a0=99e84c0 a1=98800 a2=47d91a4 a3=99eaf60 items=0 ppid=1410 pid=6283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="libgpod-callout" exe="/usr/lib/hal/scripts/libgpod-callout" subj=system_u:system_r:hald_t:s0 key=(null) Hash String generated from selinux-policy-3.6.12-83.fc11,file,libgpod-callout,hald_t,file_t,dir,read audit2allow suggests: #============= hald_t ============== allow hald_t file_t:dir { read open };
*** This bug has been marked as a duplicate of bug 537613 ***