Note: This selinux alert was seen during the automation run. Summary: SELinux is preventing genhomedircon (semanage_t) "write" to nss (sssd_var_lib_t). Detailed Description: SELinux denied access requested by genhomedircon. It is not expected that this access is required by genhomedircon and this access may signal an intrusion attempt. It is also possible that the specific version or configuration of the application is causing it to require additional access. Allowing Access: Sometimes labeling problems can cause SELinux denials. You could try to restore the default system file context for nss, restorecon -v 'nss' If this does not work, there is currently no automatic way to allow this access. Instead, you can generate a local policy module to allow this access - see FAQ (http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385) Or you can disable SELinux protection altogether. Disabling SELinux protection is not recommended. Please file a bug report (http://bugzilla.redhat.com/bugzilla/enter_bug.cgi) against this package. Additional Information: Source Context root:system_r:semanage_t:SystemLow-SystemHigh Target Context root:object_r:sssd_var_lib_t Target Objects nss [ sock_file ] Source genhomedircon Source Path /usr/bin/python Port <Unknown> Host jetfire.lab.eng.pnq.redhat.com Source RPM Packages python-2.4.3-43.el5 Target RPM Packages Policy RPM selinux-policy-2.4.6-302.el5 Selinux Enabled True Policy Type targeted MLS Enabled True Enforcing Mode Enforcing Plugin Name catchall_file Host Name jetfire.lab.eng.pnq.redhat.com Platform Linux jetfire.lab.eng.pnq.redhat.com 2.6.18-259.el5 #1 SMP Fri Apr 29 01:09:57 EDT 2011 x86_64 x86_64 Alert Count 11 First Seen Tue May 10 02:19:51 2011 Last Seen Wed May 18 15:52:05 2011 Local ID 060f0cd7-6f21-4b50-b076-5dd9e01bc690 Line Numbers Raw Audit Messages host=jetfire.lab.eng.pnq.redhat.com type=AVC msg=audit(1305714125.564:3395): avc: denied { write } for pid=29221 comm="genhomedircon" name="nss" dev=dm-0 ino=1231228 scontext=root:system_r:semanage_t:s0-s0:c0.c1023 tcontext=root:object_r:sssd_var_lib_t:s0 tclass=sock_file host=jetfire.lab.eng.pnq.redhat.com type=SYSCALL msg=audit(1305714125.564:3395): arch=c000003e syscall=42 success=no exit=-13 a0=4 a1=7fffd316b390 a2=6e a3=0 items=0 ppid=29219 pid=29221 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 ses=311 comm="genhomedircon" exe="/usr/bin/python" subj=root:system_r:semanage_t:s0-s0:c0.c1023 key=(null)
*** This bug has been marked as a duplicate of bug 706005 ***