Résumé: SELinux is preventing xenconsoled (xenconsoled_t) "search" to / (nfs_t). Description détaillée: [SELinux est en mode permissif. Cet accès n'a pas été refusé.] SELinux denied access requested by xenconsoled. / may be a mislabeled. / default SELinux type is root_t, but its current type is nfs_t. Changing this file back to the default type, may fix your problem. File contexts can be assigned to a file in the following ways. * Files created in a directory receive the file context of the parent directory by default. * The SELinux policy might override the default label inherited from the parent directory by specifying a process running in context A which creates a file in a directory labeled B will instead create the file with label C. An example of this would be the dhcp client running with the dhclient_t type and creates a file in the directory /etc. This file would normally receive the etc_t type due to parental inheritance but instead the file is labeled with the net_conf_t type because the SELinux policy specifies this. * Users can change the file context on a file using tools such as chcon, or restorecon. This file could have been mislabeled either by user error, or if an normally confined application was run under the wrong domain. However, this might also indicate a bug in SELinux because the file should not have been labeled with this type. If you believe this is a bug, please file a bug report (http://bugzilla.redhat.com/bugzilla/enter_bug.cgi) against this package. Autoriser l'accès: You can restore the default system context to this file by executing the restorecon command. restorecon '/', if this file is a directory, you can recursively restore using restorecon -R '/'. Commande de correction: restorecon '/' Informations complémentaires: Contexte source system_u:system_r:xenconsoled_t:s0 Contexte cible system_u:object_r:nfs_t:s0 Objets du contexte / [ dir ] source xenconsoled Chemin de la source /usr/sbin/xenconsoled Port <Inconnu> Hôte (removed) Paquetages RPM source xen-runtime-3.4.1-1.fc11 Paquetages RPM cible filesystem-2.4.21-1.fc11 Politique RPM selinux-policy-3.6.12-82.fc11 Selinux activé True Type de politique targeted Mode strict Permissive Nom du plugin restorecon Nom de l'hôte (removed) Plateforme Linux (removed) 2.6.31-1.2.68.xendom0.fc12.i686.PAE #1 SMP Sat Sep 19 13:21:38 EDT 2009 i686 athlon Compteur d'alertes 1 Première alerte lun 28 sep 2009 20:21:44 CEST Dernière alerte lun 28 sep 2009 20:21:44 CEST ID local 3545e9a5-8443-4bbf-b853-c32ee50ca144 Numéros des lignes Messages d'audit bruts node=(removed) type=AVC msg=audit(1254162104.751:17): avc: denied { search } for pid=2310 comm="xenconsoled" name="/" dev=xenfs ino=1 scontext=system_u:system_r:xenconsoled_t:s0 tcontext=system_u:object_r:nfs_t:s0 tclass=dir node=(removed) type=SYSCALL msg=audit(1254162104.751:17): arch=40000003 syscall=5 success=yes exit=5 a0=3a8feb a1=8002 a2=0 a3=bfe11ed8 items=0 ppid=1 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="xenconsoled" exe="/usr/sbin/xenconsoled" subj=system_u:system_r:xenconsoled_t:s0 key=(null) Hash String generated from selinux-policy-3.6.12-82.fc11,restorecon,xenconsoled,xenconsoled_t,nfs_t,dir,search audit2allow suggests: #============= xenconsoled_t ============== allow xenconsoled_t nfs_t:dir search;
*** This bug has been marked as a duplicate of bug 538428 ***