Summary: SELinux is preventing /usr/bin/python "create" access. Detailed Description: [SELinux is in permissive mode. This access was not denied.] SELinux denied access requested by system-config-s. It is not expected that this access is required by system-config-s and this access may signal an intrusion attempt. It is also possible that the specific version or configuration of the application is causing it to require additional access. Allowing Access: You can generate a local policy module to allow this access - see FAQ (http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385) Please file a bug report. Additional Information: Source Context system_u:system_r:sambagui_t:s0-s0:c0.c1023 Target Context system_u:system_r:sambagui_t:s0-s0:c0.c1023 Target Objects None [ unix_dgram_socket ] Source system-config-s Source Path /usr/bin/python Port <Unknown> Host (removed) Source RPM Packages python-2.6.2-2.fc12 Target RPM Packages Policy RPM selinux-policy-3.6.32-27.fc12 Selinux Enabled True Policy Type targeted MLS Enabled True Enforcing Mode Permissive Plugin Name catchall Host Name (removed) Platform Linux (removed) 2.6.31.4-84.fc12.i686 #1 SMP Fri Oct 16 00:16:44 EDT 2009 i686 i686 Alert Count 1 First Seen Sun 18 Oct 2009 07:42:10 PM GMT Last Seen Sun 18 Oct 2009 07:42:10 PM GMT Local ID cf73d8be-c93b-4fb5-b766-08f8a99fb361 Line Numbers Raw Audit Messages node=(removed) type=AVC msg=audit(1255894930.296:24077): avc: denied { create } for pid=7021 comm="system-config-s" scontext=system_u:system_r:sambagui_t:s0-s0:c0.c1023 tcontext=system_u:system_r:sambagui_t:s0-s0:c0.c1023 tclass=unix_dgram_socket node=(removed) type=SYSCALL msg=audit(1255894930.296:24077): arch=40000003 syscall=102 success=yes exit=5 a0=1 a1=bfe3d03c a2=6bdff4 a3=1 items=0 ppid=7020 pid=7021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="system-config-s" exe="/usr/bin/python" subj=system_u:system_r:sambagui_t:s0-s0:c0.c1023 key=(null) Hash String generated from selinux-policy-3.6.32-27.fc12,catchall,system-config-s,sambagui_t,sambagui_t,unix_dgram_socket,create audit2allow suggests: #============= sambagui_t ============== allow sambagui_t self:unix_dgram_socket create;
Fixed in selinux-policy-3.6.32-29.fc12.noarch