Summary: SELinux is preventing access to files with the label, file_t. Detailed Description: SELinux permission checks on files labeled file_t are being denied. file_t is the context the SELinux kernel gives to files that do not have a label. This indicates a serious labeling problem. No files on an SELinux box should ever be labeled file_t. If you have just added a disk drive to the system you can relabel it using the restorecon command. For example if you saved the home directory from a previous installation that did not use SELinux, 'restorecon -R -v /home' will fix the labels. Otherwise you should relabel the entire file system. Allowing Access: You can execute the following command as root to relabel your computer system: "touch /.autorelabel; reboot" Additional Information: Source Context system_u:system_r:xdm_t:s0-s0:c0.c1023 Target Context system_u:object_r:file_t:s0 Target Objects /home/maikie [ dir ] Source Default Source Path /bin/bash Port <Unknown> Host (removed) Source RPM Packages bash-4.0.33-1.fc12 Target RPM Packages Policy RPM selinux-policy-3.6.32-55.fc12 Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Plugin Name file Host Name (removed) Platform Linux (removed) 2.6.31.6-162.fc12.i686 #1 SMP Fri Dec 4 01:09:09 EST 2009 i686 i686 Alert Count 3 First Seen Tue 08 Dec 2009 01:25:53 PM BRST Last Seen Wed 09 Dec 2009 12:10:47 AM BRST Local ID d63e7d96-78f8-45c0-be95-df8d98b79645 Line Numbers Raw Audit Messages node=(removed) type=AVC msg=audit(1260324647.925:42): avc: denied { getattr } for pid=1347 comm="Default" path="/home/maikie" dev=sda2 ino=4857857 scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=dir node=(removed) type=SYSCALL msg=audit(1260324647.925:42): arch=40000003 syscall=195 success=no exit=-13 a0=8969838 a1=bf8699b0 a2=622ff4 a3=0 items=0 ppid=1148 pid=1347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="Default" exe="/bin/bash" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null) Hash String generated from selinux-policy-3.6.32-55.fc12,file,Default,xdm_t,file_t,dir,getattr audit2allow suggests: #============= xdm_t ============== allow xdm_t file_t:dir getattr;
*** This bug has been marked as a duplicate of bug 537613 ***