Filtrar a saída usando ausearch -m avc | audit2allow
é fácil de encontrar o culpado:
$ echo "
Oct 5 20:50:18 localhost kernel: type=1400 audit(1349463018.930:95232): avc: denied { search } for pid=10443 comm="httpd" name="nijansen" dev=dm-6 ino=12058625 scontext=system_u:system_r:httpd_t:s0 tcontext=unconfined_u:object_r:user_home_dir_t:s0 tclass=dir
Oct 5 20:50:18 localhost kernel: type=1400 audit(1349463018.938:95233): avc: denied { getattr } for pid=10444 comm="httpd" path="/home/nijansen" dev=dm-6 ino=12058625 scontext=system_u:system_r:httpd_t:s0 tcontext=unconfined_u:object_r:user_home_dir_t:s0 tclass=dir
" | audit2allow
============= httpd_t ==============
!!!! This avc can be allowed using the boolean 'httpd_enable_homedirs'
allow httpd_t user_home_dir_t:dir { search getattr };
Para resolver isso, execute como root:
# setsebool -P httpd_enable_homedirs=on