Summary: SELinux is preventing /usr/bin/Xorg "read" access . Detailed Description: [SELinux is in permissive mode. This access was not denied.] SELinux denied access requested by Xorg. It is not expected that this access is required by Xorg and this access may signal an intrusion attempt. It is also possible that the specific version or configuration of the application is causing it to require additional access. Allowing Access: You can generate a local policy module to allow this access - see FAQ (http://docs.fedoraproject.org/selinux-faq-fc5/#id2961385) Please file a bug report. Additional Information: Source Context system_u:system_r:xserver_t:s0-s15:c0.c1023 Target Context system_u:object_r:unlabeled_t:s15:c0.c1023 Target Objects None [ lnk_file ] Source Xorg Source Path /usr/bin/Xorg Port <Unknown> Host (removed) Source RPM Packages xorg-x11-server-Xorg-1.9.1-2.fc14 Target RPM Packages Policy RPM selinux-policy-3.9.7-11.fc14 Selinux Enabled True Policy Type mls Enforcing Mode Permissive Plugin Name catchall Host Name (removed) Platform Linux (removed) 2.6.35.8-59.fc14.x86_64 #1 SMP Tue Nov 16 03:32:03 UTC 2010 x86_64 x86_64 Alert Count 1 First Seen Wed 17 Nov 2010 10:46:41 AM CET Last Seen Wed 17 Nov 2010 10:46:41 AM CET Local ID 12eb43b3-e1ab-49c7-bd67-645d533fb145 Line Numbers Raw Audit Messages node=(removed) type=AVC msg=audit(1289987201.942:31779): avc: denied { read } for pid=3146 comm="Xorg" name="xorg-x11-fonts-misc-sgi:unscaled:pri=10" dev=dm-0 ino=326952 scontext=system_u:system_r:xserver_t:s0-s15:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s15:c0.c1023 tclass=lnk_file node=(removed) type=SYSCALL msg=audit(1289987201.942:31779): arch=c000003e syscall=89 success=yes exit=29 a0=7fffcfa798a0 a1=7fffcfa794a0 a2=3ff a3=3d6972703a64656c items=0 ppid=3144 pid=3146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=tty7 ses=4294967295 comm="Xorg" exe="/usr/bin/Xorg" subj=system_u:system_r:xserver_t:s0-s15:c0.c1023 key=(null) Hash String generated from catchall,Xorg,xserver_t,unlabeled_t,lnk_file,read audit2allow suggests: #============= xserver_t ============== allow xserver_t unlabeled_t:lnk_file read;
Correct behaviour since /etc/X11/fontpath.d/xorg-x11-fonts-misc-sgi:unscaled:pri=10 was labeled user_u:object_r:etc_t:s0 instead of system_u:object_r:etc_t:s0.