Description of problem: SELinux is preventing cjdroute from 'write' accesses on the sock_file /var/lib/sss/pipes/nss. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that cjdroute should be allowed write access on the nss sock_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'cjdroute' --raw | audit2allow -M my-cjdroute # semodule -X 300 -i my-cjdroute.pp Additional Information: Source Context system_u:system_r:cjdns_t:s0 Target Context system_u:object_r:sssd_var_lib_t:s0 Target Objects /var/lib/sss/pipes/nss [ sock_file ] Source cjdroute Source Path cjdroute Port <Unknown> Host (removed) Source RPM Packages Target RPM Packages Policy RPM selinux-policy-3.14.3-35.fc30.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name (removed) Platform Linux (removed) 5.0.9-301.fc30.x86_64 #1 SMP Tue Apr 23 23:57:35 UTC 2019 x86_64 x86_64 Alert Count 38 First Seen 2019-02-20 04:58:54 EST Last Seen 2019-05-09 02:17:54 EDT Local ID 7c8717b5-2693-4520-bcc9-62ee4fc9c900 Raw Audit Messages type=AVC msg=audit(1557382674.697:162072): avc: denied { write } for pid=3157586 comm="cjdroute" name="nss" dev="dm-0" ino=653354 scontext=system_u:system_r:cjdns_t:s0 tcontext=system_u:object_r:sssd_var_lib_t:s0 tclass=sock_file permissive=0 Hash: cjdroute,cjdns_t,sssd_var_lib_t,sock_file,write Version-Release number of selected component: selinux-policy-3.14.3-35.fc30.noarch Additional info: component: selinux-policy reporter: libreport-2.10.0 hashmarkername: setroubleshoot kernel: 5.0.9-301.fc30.x86_64 type: libreport
*** This bug has been marked as a duplicate of bug 1708081 ***