Summary: SELinux is preventing /usr/sbin/lxdm-binary "write" access on root. Detailed Description: SELinux denied access requested by lxdm-binary. It is not expected that this access is required by lxdm-binary and this access may signal an intrusion attempt. It is also possible that the specific version or configuration of the application is causing it to require additional access. Allowing Access: You can generate a local policy module to allow this access - see FAQ (http://docs.fedoraproject.org/selinux-faq-fc5/#id2961385) Please file a bug report. Additional Information: Source Context system_u:system_r:xdm_t:s0-s0:c0.c1023 Target Context system_u:object_r:admin_home_t:s0 Target Objects root [ dir ] Source lxdm-binary Source Path /usr/sbin/lxdm-binary Port <Unknown> Host (removed) Source RPM Packages lxdm-0.2.0-4.fc13 Target RPM Packages filesystem-2.4.31-1.fc13 Policy RPM selinux-policy-3.7.19-10.fc13 Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Plugin Name catchall Host Name (removed) Platform Linux (removed) 2.6.33.3-85.fc13.i686 #1 SMP Thu May 6 18:44:12 UTC 2010 i686 i686 Alert Count 1 First Seen Wed 14 Jul 2010 07:14:20 AM EEST Last Seen Wed 14 Jul 2010 07:14:20 AM EEST Local ID 0b98fe10-7f16-4b63-abcd-3d41025f7a8a Line Numbers Raw Audit Messages node=(removed) type=AVC msg=audit(1279080860.319:56): avc: denied { write } for pid=5448 comm="lxdm-binary" name="root" dev=sda2 ino=2149 scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:admin_home_t:s0 tclass=dir node=(removed) type=SYSCALL msg=audit(1279080860.319:56): arch=40000003 syscall=5 success=no exit=-13 a0=804ee7a a1=241 a2=180 a3=8703e88 items=0 ppid=1489 pid=5448 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=3 comm="lxdm-binary" exe="/usr/sbin/lxdm-binary" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null) Hash String generated from catchall,lxdm-binary,xdm_t,admin_home_t,dir,write audit2allow suggests: #============= xdm_t ============== #!!!! The source type 'xdm_t' can write to a 'dir' of the following types: # pcscd_var_run_t, xdm_home_t, pam_var_console_t, xkb_var_lib_t, xdm_rw_etc_t, var_lock_t, root_t, tmp_t, var_t, user_fonts_t, user_tmpfs_t, user_home_dir_t, xdm_spool_t, fonts_cache_t, locale_t, var_auth_t, tmpfs_t, user_tmp_t, var_spool_t, auth_cache_t, xdm_tmpfs_t, var_lib_t, var_run_t, xdm_tmp_t, xserver_log_t, var_log_t, xdm_log_t, pam_var_run_t, xdm_var_lib_t, xdm_var_run_t allow xdm_t admin_home_t:dir write;
Are you trying to log in as a root user?