Summary: SELinux is preventing /usr/local/Brother/Printer/HL2270DW/inf/brprintconflsr3 "execute" access on brprintconflsr3. Detailed Description: [SELinux is in permissive mode. This access was not denied.] SELinux denied access requested by brprintconflsr3. It is not expected that this access is required by brprintconflsr3 and this access may signal an intrusion attempt. It is also possible that the specific version or configuration of the application is causing it to require additional access. Allowing Access: You can generate a local policy module to allow this access - see FAQ (http://docs.fedoraproject.org/selinux-faq-fc5/#id2961385) Please file a bug report. Additional Information: Source Context system_u:system_r:cupsd_t:s0-s0:c0.c1023 Target Context system_u:object_r:cupsd_rw_etc_t:s0 Target Objects brprintconflsr3 [ file ] Source brprintconflsr3 Source Path /usr/local/Brother/Printer/HL2270DW/inf/brprintcon flsr3 Port <Unknown> Host (removed) Source RPM Packages hl2270dwlpr-2.1.0-1 Target RPM Packages Policy RPM selinux-policy-3.9.7-14.fc14 Selinux Enabled True Policy Type targeted Enforcing Mode Permissive Plugin Name catchall Host Name (removed) Platform Linux (removed) 2.6.35.6-48.fc14.i686 #1 SMP Fri Oct 22 15:34:36 UTC 2010 i686 i686 Alert Count 4 First Seen Mon 06 Dec 2010 01:50:46 PM PST Last Seen Mon 06 Dec 2010 01:52:44 PM PST Local ID e9511aea-6035-4850-845f-af8b89d83a11 Line Numbers Raw Audit Messages node=(removed) type=AVC msg=audit(1291672364.409:54360): avc: denied { execute } for pid=2850 comm="sh" name="brprintconflsr3" dev=sda3 ino=531913 scontext=system_u:system_r:cupsd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:cupsd_rw_etc_t:s0 tclass=file node=(removed) type=AVC msg=audit(1291672364.409:54360): avc: denied { execute_no_trans } for pid=2850 comm="sh" path="/usr/local/Brother/Printer/HL2270DW/inf/brprintconflsr3" dev=sda3 ino=531913 scontext=system_u:system_r:cupsd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:cupsd_rw_etc_t:s0 tclass=file node=(removed) type=SYSCALL msg=audit(1291672364.409:54360): arch=40000003 syscall=11 per=400000 success=yes exit=0 a0=95c52d8 a1=95c4778 a2=95c4388 a3=95c4778 items=0 ppid=2849 pid=2850 auid=4294967295 uid=4 gid=7 euid=4 suid=4 fsuid=4 egid=7 sgid=7 fsgid=7 tty=(none) ses=4294967295 comm="brprintconflsr3" exe="/usr/local/Brother/Printer/HL2270DW/inf/brprintconflsr3" subj=system_u:system_r:cupsd_t:s0-s0:c0.c1023 key=(null) Hash String generated from catchall,brprintconflsr3,cupsd_t,cupsd_rw_etc_t,file,execute audit2allow suggests: #============= cupsd_t ============== allow cupsd_t cupsd_rw_etc_t:file { execute execute_no_trans };
*** This bug has been marked as a duplicate of bug 660016 ***