Hide Forgot
Summary: SELinux is preventing /usr/sbin/restorecond "relabelfrom" access on .ICEauthority. Detailed Description: SELinux denied access requested by restorecond. It is not expected that this access is required by restorecond and this access may signal an intrusion attempt. It is also possible that the specific version or configuration of the application is causing it to require additional access. Allowing Access: You can generate a local policy module to allow this access - see FAQ (http://docs.fedoraproject.org/selinux-faq-fc5/#id2961385) Please file a bug report. Additional Information: Source Context user_u:user_r:user_t:s0 Target Context unconfined_u:object_r:user_home_t:s0 Target Objects .ICEauthority [ file ] Source restorecond Source Path /usr/sbin/restorecond Port <Unknown> Host (removed) Source RPM Packages policycoreutils-2.0.83-33.1.fc13 Target RPM Packages Policy RPM selinux-policy-3.7.19-76.fc13 Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Plugin Name catchall Host Name (removed) Platform Linux (removed) 2.6.34.7-66.fc13.i686 #1 SMP Wed Dec 15 07:40:25 UTC 2010 i686 i686 Alert Count 2 First Seen Mon 03 Jan 2011 11:01:46 PM EST Last Seen Sun 16 Jan 2011 09:27:46 PM EST Local ID 44980a81-01d7-48ba-b26d-250962dedf32 Line Numbers Raw Audit Messages node=(removed) type=AVC msg=audit(1295231266.826:105055): avc: denied { relabelfrom } for pid=5249 comm="restorecond" name=".ICEauthority" dev=dm-0 ino=135731 scontext=user_u:user_r:user_t:s0 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file node=(removed) type=SYSCALL msg=audit(1295231266.826:105055): arch=40000003 syscall=227 success=no exit=-13 a0=1b97498 a1=6af185 a2=1cbda48 a3=22 items=0 ppid=5073 pid=5249 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=1 comm="restorecond" exe="/usr/sbin/restorecond" subj=user_u:user_r:user_t:s0 key=(null) Hash String generated from catchall,restorecond,user_t,user_home_t,file,relabelfrom audit2allow suggests: #============= user_t ============== #!!!! This avc is a constraint violation. You will need to add an attribute to either the source or target type to make it work. #Contraint rule: allow user_t user_home_t:file relabelfrom;
*** This bug has been marked as a duplicate of bug 671217 ***