Resúmen: SELinux is preventing access to files with the label, file_t. Descripción Detallada: SELinux permission checks on files labeled file_t are being denied. file_t is the context the SELinux kernel gives to files that do not have a label. This indicates a serious labeling problem. No files on an SELinux box should ever be labeled file_t. If you have just added a new disk drive to the system you can relabel it using the restorecon command. Otherwise you should relabel the entire file system. Permitiendo Acceso: You can execute the following command as root to relabel your computer system: "touch /.autorelabel; reboot" Información Adicional: Contexto Fuente system_u:system_r:gconfdefaultsm_t:s0-s0:c0.c1023 Contexto Destino system_u:object_r:file_t:s0 Objetos Destino /home/blanca [ dir ] Fuente gconf-defaults- Dirección de Fuente /usr/libexec/gconf-defaults-mechanism Puerto <Desconocido> Nombre de Equipo (removed) Paquetes RPM Fuentes GConf2-2.28.0-2.fc12 Paquetes RPM Destinos RPM de Políticas selinux-policy-3.6.32-49.fc12 SELinux Activado True Tipo de Política targeted Modo Obediente Enforcing Nombre de Plugin file Nombre de Equipo (removed) Plataforma Linux (removed) 2.6.31.5-127.fc12.i686 #1 SMP Sat Nov 7 21:41:45 EST 2009 i686 i686 Cantidad de Alertas 2 Visto por Primera Vez vie 04 dic 2009 09:54:21 CST Visto por Última Vez vie 04 dic 2009 09:54:21 CST ID Local 9938d6a2-ece5-444c-9be4-7de71cd9b366 Números de Línea Mensajes de Auditoría Crudos node=(removed) type=AVC msg=audit(1259942061.613:40): avc: denied { search } for pid=1800 comm="gconf-defaults-" name="blanca" dev=sda6 ino=12 scontext=system_u:system_r:gconfdefaultsm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=dir node=(removed) type=SYSCALL msg=audit(1259942061.613:40): arch=40000003 syscall=39 success=no exit=-13 a0=84b0908 a1=1c0 a2=6be218 a3=0 items=0 ppid=1 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="gconf-defaults-" exe="/usr/libexec/gconf-defaults-mechanism" subj=system_u:system_r:gconfdefaultsm_t:s0-s0:c0.c1023 key=(null) Hash String generated from selinux-policy-3.6.32-49.fc12,file,gconf-defaults-,gconfdefaultsm_t,file_t,dir,search audit2allow suggests: #============= gconfdefaultsm_t ============== allow gconfdefaultsm_t file_t:dir search;
*** This bug has been marked as a duplicate of bug 537613 ***