Hide Forgot
Summary: SELinux is preventing /usr/bin/pinentry-qt4 "getattr" access on /home/walt/.kde/cache-(removed). Detailed Description: SELinux denied access requested by pinentry-qt. It is not expected that this access is required by pinentry-qt and this access may signal an intrusion attempt. It is also possible that the specific version or configuration of the application is causing it to require additional access. Allowing Access: You can generate a local policy module to allow this access - see FAQ (http://docs.fedoraproject.org/selinux-faq-fc5/#id2961385) Please file a bug report. Additional Information: Source Context user_u:user_r:gpg_pinentry_t:s0 Target Context unconfined_u:object_r:user_home_t:s0 Target Objects /home/walt/.kde/cache-(removed) [ lnk_file ] Source pinentry-qt Source Path /usr/bin/pinentry-qt4 Port <Unknown> Host (removed) Source RPM Packages pinentry-qt-0.8.0-3.fc13 Target RPM Packages Policy RPM selinux-policy-3.7.19-76.fc13 Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Plugin Name catchall Host Name (removed) Platform Linux (removed) 2.6.34.7-66.fc13.i686 #1 SMP Wed Dec 15 07:40:25 UTC 2010 i686 i686 Alert Count 270 First Seen Tue 04 Jan 2011 07:20:25 AM EST Last Seen Tue 18 Jan 2011 10:04:00 PM EST Local ID 053e0747-7a04-4333-b7ac-8da983419245 Line Numbers Raw Audit Messages node=(removed) type=AVC msg=audit(1295406240.951:121528): avc: denied { getattr } for pid=32491 comm="pinentry-qt" path="/home/walt/.kde/cache-(removed)" dev=dm-0 ino=400021 scontext=user_u:user_r:gpg_pinentry_t:s0 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=lnk_file node=(removed) type=SYSCALL msg=audit(1295406240.951:121528): arch=40000003 syscall=196 success=no exit=-13 a0=bfc4298b a1=bfc428d8 a2=bf5ff4 a3=98755d0 items=0 ppid=5015 pid=32491 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=1 comm="pinentry-qt" exe="/usr/bin/pinentry-qt4" subj=user_u:user_r:gpg_pinentry_t:s0 key=(null) Hash String generated from catchall,pinentry-qt,gpg_pinentry_t,user_home_t,lnk_file,getattr audit2allow suggests: #============= gpg_pinentry_t ============== allow gpg_pinentry_t user_home_t:lnk_file getattr;
*** This bug has been marked as a duplicate of bug 671226 ***