Resúmen: SELinux is preventing the gconf-defaults- from using potentially mislabeled files (%gconf.xml). Descripción Detallada: SELinux has denied gconf-defaults- access to potentially mislabeled file(s) (%gconf.xml). This means that SELinux will not allow gconf-defaults- to use these files. It is common for users to edit files in their home directory or tmp directories and then move (mv) them to system directories. The problem is that the files end up with the wrong file context which confined applications are not allowed to access. Permitiendo Acceso: If you want gconf-defaults- to access this files, you need to relabel them using restorecon -v '%gconf.xml'. You might want to relabel the entire directory using restorecon -R -v ''. Información Adicional: Contexto Fuente system_u:system_r:gconfdefaultsm_t:s0-s0:c0.c1023 Contexto Destino unconfined_u:object_r:user_home_t:s0 Objetos Destino %gconf.xml [ file ] Fuente gconf-defaults- Dirección de Fuente /usr/libexec/gconf-defaults-mechanism Puerto <Desconocido> Nombre de Equipo (removed) Paquetes RPM Fuentes GConf2-2.26.2-1.fc11 Paquetes RPM Destinos RPM de Políticas selinux-policy-3.6.12-91.fc11 SELinux Activado True Tipo de Política targeted Modo Obediente Enforcing Nombre de Plugin home_tmp_bad_labels Nombre de Equipo (removed) Plataforma Linux (removed) 2.6.30.9-102.fc11.x86_64 #1 SMP Fri Dec 4 00:18:53 EST 2009 x86_64 x86_64 Cantidad de Alertas 4 Visto por Primera Vez vie 18 dic 2009 01:48:57 CLST Visto por Última Vez vie 18 dic 2009 09:28:36 CLST ID Local 185a0640-cf0c-421c-8361-03807950408a Números de Línea Mensajes de Auditoría Crudos node=(removed) type=AVC msg=audit(1261139316.134:23): avc: denied { read } for pid=2322 comm="gconf-defaults-" name="%gconf.xml" dev=dm-0 ino=146816 scontext=system_u:system_r:gconfdefaultsm_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file node=(removed) type=AVC msg=audit(1261139316.134:23): avc: denied { open } for pid=2322 comm="gconf-defaults-" name="%gconf.xml" dev=dm-0 ino=146816 scontext=system_u:system_r:gconfdefaultsm_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file node=(removed) type=SYSCALL msg=audit(1261139316.134:23): arch=c000003e syscall=2 success=no exit=-131938811387944 a0=2150b80 a1=0 a2=1b6 a3=238 items=0 ppid=1 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="gconf-defaults-" exe="/usr/libexec/gconf-defaults-mechanism" subj=system_u:system_r:gconfdefaultsm_t:s0-s0:c0.c1023 key=(null) Hash String generated from selinux-policy-3.6.12-91.fc11,home_tmp_bad_labels,gconf-defaults-,gconfdefaultsm_t,user_home_t,file,read audit2allow suggests: #============= gconfdefaultsm_t ============== allow gconfdefaultsm_t user_home_t:file { read open };
*** This bug has been marked as a duplicate of bug 560254 ***