Hide Forgot
Description of problem: SELinux is preventing /usr/bin/iceauth from read access on the lnk_file squish. ***** Plugin catchall (100. confidence) suggests *************************** If you believe that iceauth should be allowed read access on the squish lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # grep iceauth /var/log/audit/audit.log | audit2allow -M mypol # semodule -i mypol.pp Additional Information: Source Context unconfined_u:unconfined_r:iceauth_t:s0-s0:c0.c1023 Target Context system_u:object_r:nfs_t:s0 Target Objects squish [ lnk_file ] Source iceauth Source Path /usr/bin/iceauth Port <Unknown> Host sugi Source RPM Packages xorg-x11-server-utils-7.5-5.fc15 Target RPM Packages Policy RPM selinux-policy-3.9.16-50.fc15 Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name sugi Platform Linux sugi 2.6.41.10-3.fc15.i686.PAE #1 SMP Mon Jan 23 15:36:55 UTC 2012 i686 i686 Alert Count 2 First Seen Wed Feb 15 15:16:07 2012 Last Seen Wed Feb 15 15:16:07 2012 Local ID 2057a276-359e-4b55-b8c8-379954f073f1 Raw Audit Messages type=AVC msg=audit(1329315367.543:91): avc: denied { read } for pid=4821 comm="iceauth" name="squish" dev=0:2b ino=15 scontext=unconfined_u:unconfined_r:iceauth_t:s0-s0:c0.c1023 tcontext=system_u:object_r:nfs_t:s0 tclass=lnk_file type=SYSCALL msg=audit(1329315367.543:91): arch=i386 syscall=open success=no exit=EACCES a0=bf872680 a1=0 a2=0 a3=3 items=0 ppid=4820 pid=4821 auid=2164 uid=2164 gid=2023 euid=2164 suid=2164 fsuid=2164 egid=2023 sgid=2023 fsgid=2023 tty=(none) ses=2 comm=iceauth exe=/usr/bin/iceauth subj=unconfined_u:unconfined_r:iceauth_t:s0-s0:c0.c1023 key=(null) Hash: iceauth,iceauth_t,nfs_t,lnk_file,read audit2allow #============= iceauth_t ============== allow iceauth_t nfs_t:lnk_file read; audit2allow -R #============= iceauth_t ============== allow iceauth_t nfs_t:lnk_file read; Version-Release number of selected component (if applicable): selinux-policy-targeted-3.9.16-50.fc15.noarch How reproducible: Steps to Reproduce: 1. 2. 3. Actual results: Expected results: Additional info:
We allow it in Fedora16/17. Backporting to F15.
Actually, you need to turn on the use_nfs_home_dirs boolean $ setsebool -P use_nfs_home_dirs 1