The following was filed automatically by setroubleshoot: Sommario: SELinux is preventing Xorg "setopt" access on <Unknown>. Descrizione dettagliata: [Xorg has a permissive type (xserver_t). This access was not denied.] SELinux denied access requested by Xorg. It is not expected that this access is required by Xorg and this access may signal an intrusion attempt. It is also possible that the specific version or configuration of the application is causing it to require additional access. Abilitazione accesso in corso: You can generate a local policy module to allow this access - see FAQ (http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385) Please file a bug report (http://bugzilla.redhat.com/bugzilla/enter_bug.cgi) against this package. Informazioni aggiuntive: Contesto della sorgente system_u:system_r:xserver_t:s0-s0:c0.c1023 Contesto target system_u:system_r:xserver_t:s0-s0:c0.c1023 Oggetti target None [ netlink_kobject_uevent_socket ] Sorgente Xorg Percorso della sorgente /usr/bin/Xorg Porta <Sconosciuto> Host (removed) Sorgente Pacchetti RPM xorg-x11-server-Xorg-1.6.99-45.20090903.fc12 Pacchetti RPM target RPM della policy selinux-policy-3.6.30-2.fc12 Selinux abilitato True Tipo di policy targeted MLS abilitato True Modalità Enforcing Enforcing Nome plugin catchall Host Name (removed) Piattaforma Linux (removed) 2.6.31-0.199.rc8.git2.fc12.i686 #1 SMP Wed Sep 2 21:10:11 EDT 2009 i686 i686 Conteggio avvisi 3 Primo visto ven 04 set 2009 16:03:01 CEST Ultimo visto sab 05 set 2009 12:02:17 CEST ID locale 17e153b6-aab7-444b-aaff-0a0545a7f641 Numeri di linea Messaggi Raw Audit node=(removed) type=AVC msg=audit(1252144937.830:17): avc: denied { setopt } for pid=1327 comm="Xorg" scontext=system_u:system_r:xserver_t:s0-s0:c0.c1023 tcontext=system_u:system_r:xserver_t:s0-s0:c0.c1023 tclass=netlink_kobject_uevent_socket node=(removed) type=SYSCALL msg=audit(1252144937.830:17): arch=40000003 syscall=102 success=yes exit=0 a0=e a1=bf903190 a2=5d570fc a3=5d572a0 items=0 ppid=1326 pid=1327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="Xorg" exe="/usr/bin/Xorg" subj=system_u:system_r:xserver_t:s0-s0:c0.c1023 key=(null) audit2allow suggests: #============= xserver_t ============== allow xserver_t self:netlink_kobject_uevent_socket setopt;
*** This bug has been marked as a duplicate of bug 521372 ***