The following was filed automatically by setroubleshoot: Resúmen: SELinux is preventing the /usr/bin/kdm from using potentially mislabeled files (/home/FAMM/.Xauthority-n). Descripción Detallada: SELinux has denied kdm access to potentially mislabeled file(s) (/home/FAMM/.Xauthority-n). This means that SELinux will not allow kdm to use these files. It is common for users to edit files in their home directory or tmp directories and then move (mv) them to system directories. The problem is that the files end up with the wrong file context which confined applications are not allowed to access. Permitiendo Acceso: If you want kdm to access this files, you need to relabel them using restorecon -v '/home/FAMM/.Xauthority-n'. You might want to relabel the entire directory using restorecon -R -v '/home/FAMM'. Información Adicional: Contexto Fuente system_u:system_r:xdm_t:s0-s0:c0.c1023 Contexto Destino unconfined_u:object_r:xauth_home_t:s0 Objetos Destino /home/FAMM/.Xauthority-n [ file ] Fuente kdm Dirección de Fuente /usr/bin/kdm Puerto <Desconocido> Nombre de Equipo (removed) Paquetes RPM Fuentes kdm-4.3.1-4.fc12 Paquetes RPM Destinos RPM de Políticas selinux-policy-3.6.32-7.fc12 SELinux Activado True Tipo de Política targeted MLS Activado True Modo Obediente Enforcing Nombre de Plugin home_tmp_bad_labels Nombre de Equipo (removed) Plataforma Linux (removed) 2.6.31-33.fc12.i686 #1 SMP Thu Sep 17 15:56:11 EDT 2009 i686 i686 Cantidad de Alertas 1 Visto por Primera Vez lun 21 sep 2009 20:49:33 CDT Visto por Última Vez lun 21 sep 2009 20:49:33 CDT ID Local ece39e7f-2ca9-4a74-bf1a-37c02a75e7dd Números de Línea Mensajes de Auditoría Crudos node=(removed) type=AVC msg=audit(1253584173.465:18): avc: denied { setattr } for pid=1328 comm="kdm" name=".Xauthority-n" dev=sda1 ino=10292 scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:xauth_home_t:s0 tclass=file node=(removed) type=SYSCALL msg=audit(1253584173.465:18): arch=40000003 syscall=15 success=no exit=-13 a0=bf9d321a a1=180 a2=bf9d321a a3=9c4eab0 items=0 ppid=1300 pid=1328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=1 comm="kdm" exe="/usr/bin/kdm" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null) audit2allow suggests: #============= xdm_t ============== allow xdm_t xauth_home_t:file setattr;
*** This bug has been marked as a duplicate of bug 524739 ***