Comment 18 for bug 217787

Revision history for this message
Jamie Strandboge (jdstrand) wrote :

I can reproduce this by performing an action that cups needs a username and password for. An easy way to produce the is to adjust all the 'Require user' directives to point to a non-existant user, then go to http://localhost:631/ and try to change/save the configuration file. This results in:

May 2 16:46:50 hardy-i386-sec kernel: [ 519.383268] audit(1209746810.654:5): type=1503 operation="inode_permission" requested_mask="rw::" denied_mask="rw::" name="/var/lib/samba/secrets.tdb" pid=5209 profile="/usr/sbin/cupsd" namespace="default"
May 2 16:46:50 hardy-i386-sec kernel: [ 519.389411] audit(1209746810.662:6): type=1503 operation="inode_permission" requested_mask="rw::" denied_mask="rw::" name="/var/lib/samba/passdb.tdb" pid=5209 profile="/usr/sbin/cupsd" namespace="default"
May 2 16:46:50 hardy-i386-sec kernel: [ 519.396736] audit(1209746810.670:7): type=1503 operation="inode_permission" requested_mask="rw::" denied_mask="rw::" name="/var/lib/samba/passdb.tdb" pid=5209 profile="/usr/sbin/cupsd" namespace="default"
May 2 16:46:50 hardy-i386-sec kernel: [ 519.401804] audit(1209746810.673:8): type=1503 operation="inode_permission" requested_mask="rw::" denied_mask="rw::" name="/var/lib/samba/secrets.tdb" pid=5209 profile="/usr/sbin/cupsd" namespace="default"
May 2 16:46:50 hardy-i386-sec kernel: [ 519.409235] audit(1209746810.681:9): type=1503 operation="inode_permission" requested_mask="rw::" denied_mask="rw::" name="/var/lib/samba/secrets.tdb" pid=5209 profile="/usr/sbin/cupsd" namespace="default"
May 2 16:46:50 hardy-i386-sec kernel: [ 519.439720] audit(1209746810.712:10): type=1503 operation="inode_permission" requested_mask="Ux::" denied_mask="Ux::" name="/usr/share/samba/panic-action" pid=5226 profile="/usr/sbin/cupsd" namespace="default"