> > >
> > > Great answer, that was it. Only question I have is whether I have to
> disable SeLinux control of smbd and nmbd or just smbd. Thanks!
Those aren't really the proper answer. The correct solution is to
label the filesystem for smbd access, or add the desired filesystem
label to the policy.
But I suppose your solution is ok, akin to disabling a firewall
instead of unblocking the one port you need.
So, I can't figure out how to change that. I thought I could do
it by using the 'reset' and/or fixfiles functionality.
That changed the ls display to
[root@linuxlaptop media]# ls -lZ /media
drwxr-xr-x root
root
system_u:object_r:mnt_t
cdrecorder
drwxrwxrwx root
root
system_u:object_r:mnt_t
media
/media/media was a file_t type before. But now I can mount "music" on my xp host, but cant see any files.
[music]
path = /media/media
writeable = yes
browseable = yes
valid users = jim
I get the following in the audit log. I have no idea why its
referring to the trash file. Any more clues? Thanks.
type=CWD msg=audit(1141778849.514:1463): cwd="/media/media"
type=PATH msg=audit(1141778849.514:1463): item=0
name=2E2F3130302047756974617220536F6C6F732032312D3430 flags=1
inode=7061505 dev=08:01 mode=040775 ouid=500 ogid=500 rdev=00:00
type=AVC msg=audit(1141778849.514:1464): avc: denied {
getattr } for pid=6755 comm="smbd" name=".Trash-jim" dev=sda1
ino=3997697 scontext=root:system_r:smbd_t
tcontext=user_u:object_r:file_t tclass=dir
type=SYSCALL msg=audit(1141778849.514:1464): arch=40000003 syscall=195
success=no exit=-13 a0=bf9ccc74 a1=bf9cd474 a2=589ff4 a3=bf9cd474
items=1 pid=6755 auid=4294967295 uid=500 gid=0 euid=500 suid=0
fsuid=500 egid=500 sgid=500 fsgid=500 comm="smbd" exe="/usr/sbin/smbd"
type=AVC_PATH msg=audit(1141778849.514:1464): path="/media/media/.Trash-jim"
type=CWD msg=audit(1141778849.514:1464): cwd="/media/media"
type=PATH msg=audit(1141778849.514:1464): item=0 name="./.Trash-jim"
flags=1 inode=3997697 dev=08:01 mode=040700 ouid=500 ogid=500
rdev=00:00
type=AVC msg=audit(1141778849.514:1465): avc: denied {
getattr } for pid=6755 comm="smbd"
name=31302C303030204D616E69616373 dev=sda1 ino=7749633
scontext=root:system_r:smbd_t tcontext=user_u:object_r:file_t tclass=dir
type=SYSCALL msg=audit(1141778849.514:1465): arch=40000003 syscall=195
success=no exit=-13 a0=bf9ccc74 a1=bf9cd474 a2=589ff4 a3=bf9cd474
items=1 pid=6755 auid=4294967295 uid=500 gid=0 euid=500 suid=0
fsuid=500 egid=500 sgid=500 fsgid=500 comm="smbd" exe="/usr/sbin/smbd"
type=AVC_PATH msg=audit(1141778849.514:1465): path=2F6D656469612F6D656469612F31302C303030204D616E69616373
type=CWD msg=audit(1141778849.514:1465): cwd="/media/media"
type=PATH msg=audit(1141778849.514:1465): item=0
name=2E2F31302C303030204D616E69616373 flags=1 inode=7749633
dev=08:01 mode=040775 ouid=500 ogid=500 rdev=00:00