\u041e\u0431\u043e\u0431\u0449\u0435\u043d\u0438\u0435: SELinux is preventing kdm (xdm_t) "execute" bootloader_exec_t. \u0414\u0435\u0442\u0430\u0439\u043b\u043d\u043e \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0435: SELinux denied access requested by kdm. It is not expected that this access is required by kdm and this access may signal an intrusion attempt. It is also possible that the specific version or configuration of the application is causing it to require additional access. \u0420\u0430\u0437\u0440\u0435\u0448\u0430\u0432\u0430\u043d\u0435 \u043d\u0430 \u0434\u043e\u0441\u0442\u044a\u043f: You can generate a local policy module to allow this access - see FAQ (http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385) Or you can disable SELinux protection altogether. Disabling SELinux protection is not recommended. Please file a bug report (http://bugzilla.redhat.com/bugzilla/enter_bug.cgi) against this package. \u0414\u043e\u043f\u044a\u043b\u043d\u0438\u0442\u0435\u043b\u043d\u0430 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f: \u041d\u0430\u0447\u0430\u043b\u0435\u043d \u043a\u043e\u043d\u0442\u0435\u043a\u0441 system_u:system_r:xdm_t:s0-s0:c0.c1023 \u0426\u0435\u043b\u0435\u0432\u0438 \u043a\u043e\u043d\u0442\u0435\u043a\u0441\u0442 system_u:object_r:bootloader_exec_t:s0 \u0426\u0435\u043b\u0435\u0432\u0438 \u043e\u0431\u0435\u043a\u0442\u0438 /sbin/grub [ file ] Source kdm Source Path /usr/bin/kdm \u041f\u043e\u0440\u0442 <\u041d\u0435\u043f\u043e\u0437\u043d\u0430\u0442> \u0425\u043e\u0441\u0442 gadnio \u0418\u0437\u0445\u043e\u0434\u043d\u0438 RPM \u043f\u0430\u043a\u0435\u0442 \u0426\u0435\u043b\u0435\u0432\u0438 RPM \u043f\u0430\u043a\u0435\u0442\u0438 grub-0.97-51.fc11 RPM \u0441 \u043f\u043e\u043b\u0438\u0442\u0438\u043a\u0430 selinux-policy-3.6.12-85.fc11 Selinux \u0435 \u0440\u0430\u0437\u0440\u0435\u0448\u0435\u043d True \u0422\u0438\u043f \u043f\u043e\u043b\u0438\u0442\u0438\u043a\u0430 targeted \u0410\u043a\u0442\u0438\u0432\u0435\u043d \u0440\u0435\u0436\u0438\u043c Enforcing \u0418\u043c\u0435 \u043d\u0430 \u0434\u043e\u043f.\u043c\u043e\u0434\u0443\u043b catchall \u0418\u043c\u0435 \u043d\u0430 \u043c\u0430\u0448\u0438\u043d\u0430 gadnio \u041f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u0430 Linux gadnio 2.6.30.8-64.fc11.x86_64 #1 SMP Fri Sep 25 04:43:32 EDT 2009 x86_64 x86_64 \u0411\u0440\u043e\u0439 \u0442\u0440\u0435\u0432\u043e\u0433\u0438 14 \u0412\u0438\u0434\u044f\u043d\u043e \u0437\u0430 \u043f\u044a\u0440\u0432\u0438 5.08.2009 (\u0441\u0440) 9,07,49 EEST \u0412\u0438\u0434\u044f\u043d\u043e \u0437\u0430 \u043f\u043e\u0441\u043b\u0435\Uffffffff31.10.2009 (\u0441\u0431) 16,44,33 EET \u041b\u043e\u043a\u0430\u043b\u043d\u043e ID 6c4ddf37-a9fd-4331-bd0e-72d810ba19d3 \u041d\u043e\u043c\u0435\u0440\u0430 \u043d\u0430 \u0440\u0435\u0434\u043e\u0432\Uffffffff \u0421\u0443\u0440\u043e\u0432\u0438 \u043e\u0434\u0438\u0442 \u0441\u044a\u043e\Uffffffff node=gadnio type=AVC msg=audit(1257000273.644:35768): avc: denied { execute } for pid=1976 comm="kdm" name="grub" dev=sda1 ino=992796 scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bootloader_exec_t:s0 tclass=file node=gadnio type=SYSCALL msg=audit(1257000273.644:35768): arch=c000003e syscall=21 success=no exit=-13 a0=7ffff7478486 a1=1 a2=0 a3=10 items=0 ppid=1 pid=1976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kdm" exe=2F7573722F62696E2F6B646D202864656C6574656429 subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null) Hash String generated from selinux-policy-3.6.12-85.fc11,catchall,kdm,xdm_t,bootloader_exec_t,file,execute audit2allow suggests: #============= xdm_t ============== allow xdm_t bootloader_exec_t:file execute;
*** This bug has been marked as a duplicate of bug 538428 ***