Description of problem: type=SYSCALL msg=audit(1247585893.558:75): arch=c000003e syscall=21 success=no exit=-13 a0=7b11cd0 a1=2 a2=3df612f258 a3=1 items=0 ppid=8867 pid=14125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="python" exe="/usr/bin/python" subj=system_u:system_r:xm_t:s0 key=(null) type=AVC msg=audit(1247585893.558:75): avc: denied { write } for pid=14125 comm="python" name="xm" dev=dm-0 ino=9502801 scontext=system_u:system_r:xm_t:s0 tcontext=system_u:object_r:mnt_t:s0 tclass=dir This doesn't happen when ran manually. Version-Release number of selected component (if applicable): selinux-policy-2.4.6-249.el5 How reproducible: Very.
This avc indicates a write operation between xm and a directory labeled mnt_t Any idea what it is trying to create under /mnt?