Zusammenfassung: SELinux is preventing /usr/bin/kdm "getattr" access on /tmp/.X11-unix/X0. Detaillierte Beschreibung: SELinux denied access requested by kdm. It is not expected that this access is required by kdm and this access may signal an intrusion attempt. It is also possible that the specific version or configuration of the application is causing it to require additional access. Zugriff erlauben: You can generate a local policy module to allow this access - see FAQ (http://docs.fedoraproject.org/selinux-faq-fc5/#id2961385) Please file a bug report. Zusätzliche Informationen: Quellkontext system_u:system_r:xdm_t:s0-s0:c0.c1023 Zielkontext system_u:object_r:initrc_tmp_t:s0 Zielobjekte /tmp/.X11-unix/X0 [ sock_file ] Quelle kdm Quellen-Pfad /usr/bin/kdm Port <Unbekannt> Host (removed) Quellen-RPM-Pakete kdm-4.3.4-6.fc12 Ziel-RPM-Pakete RPM-Richtlinie selinux-policy-3.6.32-78.fc12 SELinux aktiviert True Richtlinienversion targeted Enforcing-Modus Enforcing Plugin-Name catchall Hostname (removed) Plattform Linux tpr61 2.6.31.12-174.2.3.fc12.i686.PAE #1 SMP Mon Jan 18 20:06:44 UTC 2010 i686 i686 Anzahl der Alarme 67 Zuerst gesehen So 27 Dez 2009 23:57:31 CET Zuletzt gesehen Di 02 Feb 2010 15:27:49 CET Lokale ID c68c2ef0-c04f-4a58-b6f5-2acf6deca4e6 Zeilennummern Raw-Audit-Meldungen node=tpr61 type=AVC msg=audit(1265120869.909:63479): avc: denied { getattr } for pid=13792 comm="kdm" path="/tmp/.X11-unix/X0" dev=dm-4 ino=14 scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:initrc_tmp_t:s0 tclass=sock_file node=tpr61 type=SYSCALL msg=audit(1265120869.909:63479): arch=40000003 syscall=196 success=no exit=-13 a0=bf8f783c a1=bf8f77bc a2=29fff4 a3=772530 items=0 ppid=13717 pid=13792 auid=500 uid=0 gid=500 euid=0 suid=0 fsuid=0 egid=500 sgid=500 fsgid=500 tty=(none) ses=1 comm="kdm" exe="/usr/bin/kdm" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null) Hash String generated from selinux-policy-3.6.32-78.fc12,catchall,kdm,xdm_t,initrc_tmp_t,sock_file,getattr audit2allow suggests: #============= xdm_t ============== allow xdm_t initrc_tmp_t:sock_file getattr;
Are you using freenx?
I installed it a few minutes ago. Look here: [Bug 550013]
*** This bug has been marked as a duplicate of bug 550013 ***