When I run locate from staff_r, I get a bunch of messages of the form audit(1080282148.605:0): avc: denied { read } for pid=7704 exe=/usr/bin/slocate name=xxxx dev=hda2 ino=1573113 scontext=aleksey:staff_r:staff_locate_t tcontext=aleksey:object_r:staff_home_t tclass=lnk_file audit(1080282148.620:0): avc: denied { read } for pid=7704 exe=/usr/bin/slocate name=yyyy dev=hda2 ino=1409767 scontext=aleksey:staff_r:staff_locate_t tcontext=aleksey:object_r:staff_home_t tclass=lnk_file (where names all match the pattern I was trying to locate) and slocate does not print any matches. I am currently using policy-sources-1.9-15
What are you trying to slocate? Dan
No matter what I try to locate, if I run "locate xyz" under staff_r, it never works (and I have to run it under sudo to get any output)...
Added allow rule to policy-1.10-1-5
This has been working correctly for a while now.