Bugzilla (bugzilla.redhat.com) will be under maintenance for infrastructure upgrades and will not be available on July 31st between 12:30 AM - 05:30 AM UTC. We appreciate your understanding and patience. You can follow status.redhat.com for details.
Bug 884746 - SELinux is preventing /usr/sbin/smbd from 'create' accesses on the directory untitled folder.
Summary: SELinux is preventing /usr/sbin/smbd from 'create' accesses on the directory ...
Keywords:
Status: CLOSED NOTABUG
Alias: None
Product: Fedora
Classification: Fedora
Component: selinux-policy
Version: 17
Hardware: i686
OS: Unspecified
unspecified
unspecified
Target Milestone: ---
Assignee: Miroslav Grepl
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard: abrt_hash:dcd751aafe311d6b4647604d063...
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2012-12-06 16:27 UTC by mruminski
Modified: 2012-12-06 20:40 UTC (History)
3 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2012-12-06 20:40:51 UTC
Type: ---


Attachments (Terms of Use)
File: type (9 bytes, text/plain)
2012-12-06 16:27 UTC, mruminski
no flags Details
File: hashmarkername (14 bytes, text/plain)
2012-12-06 16:27 UTC, mruminski
no flags Details

Description mruminski 2012-12-06 16:27:19 UTC
Additional info:
libreport version: 2.0.18
kernel:         3.6.9-2.fc17.i686

description:
:SELinux is preventing /usr/sbin/smbd from 'create' accesses on the directory untitled folder.
:
:*****  Plugin samba_share (98.5 confidence) suggests  ************************
:
:If you want to allow smbd to have create access on the untitled folder directory
:Then należy zmienić etykietę "untitled.folder"
:Do
:# semanage fcontext -a -t samba_share_t 'untitled.folder'
:# restorecon  -v 'untitled.folder'
:
:*****  Plugin catchall (2.42 confidence) suggests  ***************************
:
:If aby smbd powinno mieć domyślnie create dostęp do untitled folder directory.
:Then proszę to zgłosić jako błąd.
:Można utworzyć lokalny moduł polityki, aby umożliwić ten dostęp.
:Do
:można tymczasowo zezwolić na ten dostęp wykonując polecenia:
:# grep smbd /var/log/audit/audit.log | audit2allow -M mojapolityka
:# semodule -i mojapolityka.pp
:
:Additional Information:
:Source Context                system_u:system_r:smbd_t:s0
:Target Context                system_u:object_r:fusefs_t:s0
:Target Objects                untitled folder [ dir ]
:Source                        smbd
:Source Path                   /usr/sbin/smbd
:Port                          <Nieznane>
:Host                          (removed)
:Source RPM Packages           samba-3.6.9-96.fc17.1.i686
:Target RPM Packages           
:Policy RPM                    selinux-policy-3.10.0-161.fc17.noarch
:Selinux Enabled               True
:Policy Type                   targeted
:Enforcing Mode                Enforcing
:Host Name                     (removed)
:Platform                      Linux (removed) 3.6.9-2.fc17.i686 #1 SMP Tue Dec 4
:                              14:22:00 UTC 2012 i686 i686
:Alert Count                   1
:First Seen                    2012-12-06 17:25:38 CET
:Last Seen                     2012-12-06 17:25:38 CET
:Local ID                      60bddccf-1dd6-47c2-a9be-66e423df9925
:
:Raw Audit Messages
:type=AVC msg=audit(1354811138.260:85): avc:  denied  { create } for  pid=2661 comm="smbd" name=756E7469746C656420666F6C646572 scontext=system_u:system_r:smbd_t:s0 tcontext=system_u:object_r:fusefs_t:s0 tclass=dir
:
:
:type=SYSCALL msg=audit(1354811138.260:85): arch=i386 syscall=mkdir success=no exit=EACCES a0=b8ad4ca8 a1=1ed a2=b77f2ff4 a3=b8ad4ca8 items=0 ppid=2600 pid=2661 auid=4294967295 uid=0 gid=0 euid=99 suid=99 fsuid=99 egid=99 sgid=99 fsgid=99 tty=(none) ses=4294967295 comm=smbd exe=/usr/sbin/smbd subj=system_u:system_r:smbd_t:s0 key=(null)
:
:Hash: smbd,smbd_t,fusefs_t,dir,create
:
:audit2allow
:
:#============= smbd_t ==============
:#!!!! This avc can be allowed using the boolean 'samba_share_fusefs'
:
:allow smbd_t fusefs_t:dir create;
:
:audit2allow -R
:
:#============= smbd_t ==============
:#!!!! This avc can be allowed using the boolean 'samba_share_fusefs'
:
:allow smbd_t fusefs_t:dir create;
:

Comment 1 mruminski 2012-12-06 16:27:23 UTC
Created attachment 658850 [details]
File: type

Comment 2 mruminski 2012-12-06 16:27:26 UTC
Created attachment 658851 [details]
File: hashmarkername

Comment 3 Daniel Walsh 2012-12-06 20:40:51 UTC
setsebool -P samba_share_fusefs 1


Note You need to log in before you can comment on or make changes to this bug.