Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 243261 Details for
Bug 357601
SELinux is preventing semanage (semanage_t) "write" to pipe
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
selinux rpc.mountd getattr alert
selinux_alert.rpc.mountd.getattr.txt (text/plain), 2.62 KB, created by
Ralf Corsepius
on 2007-10-30 12:24:06 UTC
(
hide
)
Description:
selinux rpc.mountd getattr alert
Filename:
MIME Type:
Creator:
Ralf Corsepius
Created:
2007-10-30 12:24:06 UTC
Size:
2.62 KB
patch
obsolete
>Summary > SELinux is preventing /usr/sbin/rpc.mountd (nfsd_t) "getattr" access to > device /dev/dmmidi. > >Detailed Description > SELinux has denied the /usr/sbin/rpc.mountd (nfsd_t) "getattr" access to > device /dev/dmmidi. /dev/dmmidi is mislabeled, this device has the default > label of the /dev directory, which should not happen. All Character and/or > Block Devices should have a label. You can attempt to change the label of > the file using restorecon -v /dev/dmmidi. If this device remains labeled > device_t, then this is a bug in SELinux policy. Please file a > http://bugzilla.redhat.com/bugzilla/enter_bug.cgi against the selinux-policy > package. If you look at the other similar devices labels, ls -lZ > /dev/SIMILAR, and find a type that would work for /dev/dmmidi, you can use > chcon -t SIMILAR_TYPE /dev/dmmidi, If this fixes the problem, you can make > this permanent by executing semanage fcontext -a -t SIMILAR_TYPE /dev/dmmidi > If the restorecon changes the context, this indicates that the application > that created the device, created it without using SELinux APIs. If you can > figure out which application created the device, please file a > http://bugzilla.redhat.com/bugzilla/enter_bug.cgi against this application. > >Allowing Access > Attempt restorecon -v /dev/dmmidi or chcon -t SIMILAR_TYPE /dev/dmmidi > >Additional Information > >Source Context user_u:system_r:nfsd_t >Target Context system_u:object_r:device_t >Target Objects /dev/dmmidi [ chr_file ] >Affected RPM Packages nfs-utils-1.1.0-4.fc7 [application] >Policy RPM selinux-policy-2.6.4-48.fc7 >Selinux Enabled True >Policy Type targeted >MLS Enabled True >Enforcing Mode Permissive >Plugin Name plugins.device >Host Name mccallum >Platform Linux mccallum 2.6.22.9-91.fc7 #1 SMP Thu Sep 27 > 23:10:59 EDT 2007 i686 i686 >Alert Count 2 >First Seen Tue 30 Oct 2007 06:08:30 AM CET >Last Seen Tue 30 Oct 2007 11:25:15 AM CET >Local ID 19112419-9fcc-41ed-b101-6036df2d1d01 >Line Numbers > >Raw Audit Messages > >avc: denied { getattr } for comm="rpc.mountd" dev=tmpfs egid=0 euid=0 >exe="/usr/sbin/rpc.mountd" exit=0 fsgid=0 fsuid=0 gid=0 items=0 name="dmmidi" >path="/dev/dmmidi" pid=27110 scontext=user_u:system_r:nfsd_t:s0 sgid=0 >subj=user_u:system_r:nfsd_t:s0 suid=0 tclass=chr_file >tcontext=system_u:object_r:device_t:s0 tty=(none) uid=0 >
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 357601
:
242711
|
243251
| 243261 |
243271
|
243281
|
243291