That's what i got after disabling the dontaudit rules: type=AVC msg=audit(1292615925.298:170): avc: denied { getattr } for pid=3339 comm="akonadiserver" path="/usr/libexec/mysqld" dev=dm-1 ino=18961 scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=system_u:object_r:mysqld_exec_t:s0 tclass=file type=SYSCALL msg=audit(1292615925.298:170): arch=c000003e syscall=4 success=yes exit=0 a0=a4ba28 a1=a476e8 a2=a476e8 a3=e9 items=0 ppid=3337 pid=3339 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=1 comm="akonadiserver" exe="/usr/bin/akonadiserver" subj=staff_u:staff_r:staff_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1292615925.314:171): avc: denied { execute } for pid=3342 comm="akonadiserver" name="mysqld" dev=dm-1 ino=18961 scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=system_u:object_r:mysqld_exec_t:s0 tclass=file type=AVC msg=audit(1292615925.314:171): avc: denied { read open } for pid=3342 comm="akonadiserver" name="mysqld" dev=dm-1 ino=18961 scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=system_u:object_r:mysqld_exec_t:s0 tclass=file type=AVC msg=audit(1292615925.314:171): avc: denied { execute_no_trans } for pid=3342 comm="akonadiserver" path="/usr/libexec/mysqld" dev=dm-1 ino=18961 scontext=staff_u:staff_r:staff_t:s0-s0:c0.c1023 tcontext=system_u:object_r:mysqld_exec_t:s0 tclass=file type=SYSCALL msg=audit(1292615925.314:171): arch=c000003e syscall=59 success=yes exit=0 a0=a49e30 a1=a48ee0 a2=7fffb4bae178 a3=7fffb4bac7e0 items=0 ppid=3339 pid=3342 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=1 comm="mysqld" exe="/usr/libexec/mysqld" subj=staff_u:staff_r:staff_t:s0-s0:c0.c1023 key=(null)
Is this a mysqld database that runs under the users domain? Under the current Users UID?
Yes, that's how Akonadi works.
Miroslav lets add optional_policy(` mysql_exec(staff_t) ')
Fixed in selinux-policy-3.9.7-19.fc14
selinux-policy-3.9.7-19.fc14 has been submitted as an update for Fedora 14. https://admin.fedoraproject.org/updates/selinux-policy-3.9.7-19.fc14
selinux-policy-3.9.7-19.fc14 has been pushed to the Fedora 14 testing repository. If problems still persist, please make note of it in this bug report. If you want to test the update, you can install it with su -c 'yum --enablerepo=updates-testing update selinux-policy'. You can provide feedback for this update here: https://admin.fedoraproject.org/updates/selinux-policy-3.9.7-19.fc14
selinux-policy-3.9.7-19.fc14 has been pushed to the Fedora 14 stable repository. If problems still persist, please make note of it in this bug report.