Re. #1275961, I was intermittently experiencing that issue, but it's hard to test for, as I don't know what was triggering it. I'll follow up if I can confirm it's fixed for me.
Also, another user reported being unable to create new VMs after previous updates to this package. I can't duplicate that problem: I just successfully created a new VM from scratch in virt-manager.
This update has been submitted for testing by lvrabec.
Fixes problems with rpcbind and NFS mounts.
Fixes my NFS problems.
No regressions noted.
Re. #1275961, I was intermittently experiencing that issue, but it's hard to test for, as I don't know what was triggering it. I'll follow up if I can confirm it's fixed for me.
Also, another user reported being unable to create new VMs after previous updates to this package. I can't duplicate that problem: I just successfully created a new VM from scratch in virt-manager.
This update has been pushed to testing.
No more rpcbind errors, and the messages from #1275961 are gone, though I'm not really sure if that was a bug. I'll ask around.
works for me
Fixed NFS mounting for me
Looks OK here (x86_64).
no regressions noted
This update has been submitted for stable by bodhi.
LGTM
This update has been pushed to stable.
Thanks. This fixes
nfs-server
not starting for me.SELinux is preventing accounts-daemon from read access on the lnk_file .cache
Additional Information:
Source Context system_u:system_r:accountsd_t:s0
Target Context unconfined_u:object_r:cache_home_t:s0
Target Objects .cache [ lnk_file
Source accounts-daemon
Source Path accounts-daemon
Port <Unknown
Policy RPM <Unknown
Selinux Enabled True
Policy Type targeted
Enforcing Mode Enforcing
Platform Linux 4.10.0-rc2 #1 SMP Mon Jan 2 21:54:59 EET 2017 x86_64 x86_64
Alert Count 14
First Seen 2016-12-27 21:50:12 EET
Last Seen 2017-01-03 14:26:26 EET
Raw Audit Messages
type=AVC msg=audit(1483446386.661:95): avc: denied { read } for pid=746 comm="accounts-daemon" name=".cache" dev="sdb2" ino=1835058 scontext=system_u:system_r:accountsd_t:s0 tcontext=unconfined_u:object_r:cache_home_t:s0 tclass=lnk_file permissive=0
Hash: accounts-daemon,accountsd_t,cache_home_t,lnk_file,read