Resúmen: SELinux is preventing access to files with the label, file_t. Descripción Detallada: SELinux permission checks on files labeled file_t are being denied. file_t is the context the SELinux kernel gives to files that do not have a label. This indicates a serious labeling problem. No files on an SELinux box should ever be labeled file_t. If you have just added a new disk drive to the system you can relabel it using the restorecon command. Otherwise you should relabel the entire file system. Permitiendo Acceso: You can execute the following command as root to relabel your computer system: "touch /.autorelabel; reboot" Información Adicional: Contexto Fuente system_u:system_r:xdm_t:s0-s0:c0.c1023 Contexto Destino system_u:object_r:file_t:s0 Objetos Destino /home/blanca [ dir ] Fuente Default Dirección de Fuente /bin/bash Puerto <Desconocido> Nombre de Equipo (removed) Paquetes RPM Fuentes bash-4.0.33-1.fc12 Paquetes RPM Destinos RPM de Políticas selinux-policy-3.6.32-49.fc12 SELinux Activado True Tipo de Política targeted Modo Obediente Enforcing Nombre de Plugin file Nombre de Equipo (removed) Plataforma Linux (removed) 2.6.31.5-127.fc12.i686 #1 SMP Sat Nov 7 21:41:45 EST 2009 i686 i686 Cantidad de Alertas 4 Visto por Primera Vez jue 03 dic 2009 20:26:32 CST Visto por Última Vez jue 03 dic 2009 23:05:27 CST ID Local 8d74719a-fd09-4c63-a3ce-6b5751b625c2 Números de Línea Mensajes de Auditoría Crudos node=(removed) type=AVC msg=audit(1259903127.572:28): avc: denied { getattr } for pid=1320 comm="Default" path="/home/blanca" dev=sda6 ino=12 scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=dir node=(removed) type=SYSCALL msg=audit(1259903127.572:28): arch=40000003 syscall=195 success=no exit=-13 a0=908f838 a1=bfb291f0 a2=962ff4 a3=0 items=0 ppid=1165 pid=1320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="Default" exe="/bin/bash" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null) Hash String generated from selinux-policy-3.6.32-49.fc12,file,Default,xdm_t,file_t,dir,getattr audit2allow suggests: #============= xdm_t ============== allow xdm_t file_t:dir getattr;
restorecon -R -v /home Should fix. *** This bug has been marked as a duplicate of bug 537613 ***