> > >
> > > Great answer, that was it.  Only question I have is whether I have to
> disable SeLinux control of smbd and nmbd or just smbd.  Thanks!

Those aren't really the proper answer.  The correct solution is to
label the filesystem for smbd access, or add the desired filesystem
label to the policy.

But I suppose your solution is ok, akin to disabling a firewall
instead of unblocking the one port you need.

So, I can't figure out how to change that.  I thought I could do it by using the 'reset'  and/or fixfiles functionality.  That  changed the ls display to
[root@linuxlaptop media]# ls -lZ /media
drwxr-xr-x  root     root     system_u:object_r:mnt_t          cdrecorder
drwxrwxrwx  root     root     system_u:object_r:mnt_t          media

/media/media was a file_t type before.  But now I can mount "music" on my xp host, but cant see any files.

[music]
        path = /media/media
        writeable = yes
        browseable = yes
        valid users = jim

I get the following in the audit log.  I have no idea why its referring to the trash file.  Any more clues?  Thanks.

type=CWD msg=audit(1141778849.514:1463):  cwd="/media/media"
type=PATH msg=audit(1141778849.514:1463): item=0 name=2E2F3130302047756974617220536F6C6F732032312D3430 flags=1  inode=7061505 dev=08:01 mode=040775 ouid=500 ogid=500 rdev=00:00
type=AVC msg=audit(1141778849.514:1464): avc:  denied  { getattr } for  pid=6755 comm="smbd" name=".Trash-jim" dev=sda1 ino=3997697 scontext=root:system_r:smbd_t tcontext=user_u:object_r:file_t tclass=dir
type=SYSCALL msg=audit(1141778849.514:1464): arch=40000003 syscall=195 success=no exit=-13 a0=bf9ccc74 a1=bf9cd474 a2=589ff4 a3=bf9cd474 items=1 pid=6755 auid=4294967295 uid=500 gid=0 euid=500 suid=0 fsuid=500 egid=500 sgid=500 fsgid=500 comm="smbd" exe="/usr/sbin/smbd"
type=AVC_PATH msg=audit(1141778849.514:1464):  path="/media/media/.Trash-jim"
type=CWD msg=audit(1141778849.514:1464):  cwd="/media/media"
type=PATH msg=audit(1141778849.514:1464): item=0 name="./.Trash-jim" flags=1  inode=3997697 dev=08:01 mode=040700 ouid=500 ogid=500 rdev=00:00

type=AVC msg=audit(1141778849.514:1465): avc:  denied  { getattr } for  pid=6755 comm="smbd" name=31302C303030204D616E69616373 dev=sda1 ino=7749633 scontext=root:system_r:smbd_t tcontext=user_u:object_r:file_t tclass=dir
type=SYSCALL msg=audit(1141778849.514:1465): arch=40000003 syscall=195 success=no exit=-13 a0=bf9ccc74 a1=bf9cd474 a2=589ff4 a3=bf9cd474 items=1 pid=6755 auid=4294967295 uid=500 gid=0 euid=500 suid=0 fsuid=500 egid=500 sgid=500 fsgid=500 comm="smbd" exe="/usr/sbin/smbd"
type=AVC_PATH msg=audit(1141778849.514:1465):  path=2F6D656469612F6D656469612F31302C303030204D616E69616373
type=CWD msg=audit(1141778849.514:1465):  cwd="/media/media"
type=PATH msg=audit(1141778849.514:1465): item=0 name=2E2F31302C303030204D616E69616373 flags=1  inode=7749633 dev=08:01 mode=040775 ouid=500 ogid=500 rdev=00:00