Zusammenfassung: SELinux is preventing /sbin/setfiles "read" access on /var/spool/gdm/force-display-on-active-vt (deleted). Detaillierte Beschreibung: [SELinux ist im Permissive-Modus. Dieser Zugriff wurde nicht verweigert.] SELinux denied access requested by restorecon. It is not expected that this access is required by restorecon and this access may signal an intrusion attempt. It is also possible that the specific version or configuration of the application is causing it to require additional access. Zugriff erlauben: You can generate a local policy module to allow this access - see FAQ (http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385) Please file a bug report. Zusätzliche Informationen: Quellkontext unconfined_u:unconfined_r:setfiles_t:s0-s0:c0.c102 3 Zielkontext system_u:object_r:xdm_spool_t:s0 Zielobjekte /var/spool/gdm/force-display-on-active-vt (deleted) [ file ] Quelle restorecon Quellen-Pfad /sbin/setfiles Port <Unbekannt> Host (removed) Quellen-RPM-Pakete policycoreutils-2.0.78-7.fc12 Ziel-RPM-Pakete RPM-Richtlinie selinux-policy-3.6.32-66.fc12 SELinux aktiviert True Richtlinienversion targeted Enforcing-Modus Permissive Plugin-Name catchall Hostname (removed) Plattform Linux (removed) 2.6.31.9-174.fc12.x86_64 #1 SMP Mon Dec 21 05:33:33 UTC 2009 x86_64 x86_64 Anzahl der Alarme 18 Zuerst gesehen Sa 16 Jan 2010 17:41:48 CET Zuletzt gesehen So 24 Jan 2010 18:45:21 CET Lokale ID dc549374-38c2-41d9-9264-4e506618dd81 Zeilennummern Raw-Audit-Meldungen node=(removed) type=AVC msg=audit(1264355121.377:13): avc: denied { read } for pid=1878 comm="restorecon" path=2F7661722F73706F6F6C2F67646D2F666F7263652D646973706C61792D6F6E2D6163746976652D7674202864656C6574656429 dev=sda2 ino=8477 scontext=unconfined_u:unconfined_r:setfiles_t:s0-s0:c0.c1023 tcontext=system_u:object_r:xdm_spool_t:s0 tclass=file node=(removed) type=SYSCALL msg=audit(1264355121.377:13): arch=c000003e syscall=59 success=yes exit=0 a0=e5c050 a1=e5bfb0 a2=e57db0 a3=18 items=0 ppid=1873 pid=1878 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=1 comm="restorecon" exe="/sbin/setfiles" subj=unconfined_u:unconfined_r:setfiles_t:s0-s0:c0.c1023 key=(null) Hash String generated from selinux-policy-3.6.32-66.fc12,catchall,restorecon,setfiles_t,xdm_spool_t,file,read audit2allow suggests: #============= setfiles_t ============== allow setfiles_t xdm_spool_t:file read;
*** This bug has been marked as a duplicate of bug 556643 ***