The following was filed automatically by setroubleshoot: Resúmen: SELinux is preventing the /usr/bin/kdm from using potentially mislabeled files (/home/FAMM/.Xauthority). Descripción Detallada: SELinux has denied kdm access to potentially mislabeled file(s) (/home/FAMM/.Xauthority). This means that SELinux will not allow kdm to use these files. It is common for users to edit files in their home directory or tmp directories and then move (mv) them to system directories. The problem is that the files end up with the wrong file context which confined applications are not allowed to access. Permitiendo Acceso: If you want kdm to access this files, you need to relabel them using restorecon -v '/home/FAMM/.Xauthority'. You might want to relabel the entire directory using restorecon -R -v '/home/FAMM'. Información Adicional: Contexto Fuente system_u:system_r:xdm_t:s0-s0:c0.c1023 Contexto Destino unconfined_u:object_r:xauth_home_t:s0 Objetos Destino /home/FAMM/.Xauthority [ file ] Fuente kdm Dirección de Fuente /usr/bin/kdm Puerto <Desconocido> Nombre de Equipo (removed) Paquetes RPM Fuentes kdm-4.3.1-4.fc12 Paquetes RPM Destinos RPM de Políticas selinux-policy-3.6.32-7.fc12 SELinux Activado True Tipo de Política targeted MLS Activado True Modo Obediente Enforcing Nombre de Plugin home_tmp_bad_labels Nombre de Equipo (removed) Plataforma Linux (removed) 2.6.31-33.fc12.i686 #1 SMP Thu Sep 17 15:56:11 EDT 2009 i686 i686 Cantidad de Alertas 1 Visto por Primera Vez lun 21 sep 2009 20:49:33 CDT Visto por Última Vez lun 21 sep 2009 20:49:33 CDT ID Local 3f3d7584-95a5-4eaf-9a2a-a4be6937a6c8 Números de Línea Mensajes de Auditoría Crudos node=(removed) type=AVC msg=audit(1253584173.608:19): avc: denied { unlink } for pid=1328 comm="kdm" name=".Xauthority" dev=sda1 ino=10166 scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:xauth_home_t:s0 tclass=file node=(removed) type=SYSCALL msg=audit(1253584173.608:19): arch=40000003 syscall=10 success=no exit=-13 a0=bf9d361c a1=0 a2=bf9d361c a3=bf9d321a items=0 ppid=1300 pid=1328 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=1 comm="kdm" exe="/usr/bin/kdm" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null) audit2allow suggests: #============= xdm_t ============== allow xdm_t xauth_home_t:file unlink;
*** This bug has been marked as a duplicate of bug 524739 ***