Summary SELinux is preventing /sbin/setfiles (setfiles_t) "write" to pipe:[37965] (rpm_t). Detailed Description SELinux denied access requested by /sbin/setfiles. It is not expected that this access is required by /sbin/setfiles and this access may signal an intrusion attempt. It is also possible that the specific version or configuration of the application is causing it to require additional access. Allowing Access You can generate a local policy module to allow this access - see http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385 Or you can disable SELinux protection altogether. Disabling SELinux protection is not recommended. Please file a http://bugzilla.redhat.com/bugzilla/enter_bug.cgi against this package. Additional Information Source Context system_u:system_r:setfiles_t Target Context system_u:system_r:rpm_t Target Objects pipe:[37965] [ fifo_file ] Affected RPM Packages policycoreutils-2.0.25-14.fc8 [application] Policy RPM selinux-policy-3.0.8-3.fc8 Selinux Enabled True Policy Type targeted MLS Enabled True Enforcing Mode Enforcing Plugin Name plugins.catchall Host Name localhost Platform Linux localhost 2.6.23-0.189.rc6.git8.fc8 #1 SMP Wed Sep 19 20:34:10 EDT 2007 i686 athlon Alert Count 2 First Seen Mon 24 Sep 2007 06:33:12 AM CDT Last Seen Mon 24 Sep 2007 06:33:13 AM CDT Local ID 1bf48637-4571-49ee-b8e4-2d2952c9168a Line Numbers Raw Audit Messages avc: denied { write } for comm=restorecon dev=pipefs egid=0 euid=0 exe=/sbin/setfiles exit=0 fsgid=0 fsuid=0 gid=0 items=0 path=pipe:[37965] pid=3179 scontext=system_u:system_r:setfiles_t:s0 sgid=0 subj=system_u:system_r:setfiles_t:s0 suid=0 tclass=fifo_file tcontext=system_u:system_r:rpm_t:s0 tty=(none) uid=0 ____________________________________________________________________________________ Pinpoint customers who are looking for what you sell. http://searchmarketing.yahoo.com/ -- fedora-selinux-list mailing list fedora-selinux-list@xxxxxxxxxx https://www.redhat.com/mailman/listinfo/fedora-selinux-list