Bug 1403427

Summary: rpc.statd - SELinux is preventing systemd from create access on the unix_stream_socket Unknown
Product: [Fedora] Fedora Reporter: Peter Bieringer <pb>
Component: selinux-policyAssignee: Lukas Vrabec <lvrabec>
Status: CLOSED NOTABUG QA Contact: Fedora Extras Quality Assurance <extras-qa>
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: 25CC: dominick.grift, dwalsh, lvrabec, mgrepl, plautrba, pmoore, ssekidde, tony
Target Milestone: ---   
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2016-12-14 15:21:32 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:

Description Peter Bieringer 2016-12-10 07:44:14 UTC
Description of problem:
SELinux is preventing systemd from create access on the unix_stream_socket Unknown

Version-Release number of selected component (if applicable):
selinux-policy-devel-3.13.1-225.1.fc25.noarch
selinux-policy-targeted-3.13.1-225.1.fc25.noarch
selinux-policy-3.13.1-225.1.fc25.noarch


How reproducible:
accessing NFS share on a QNAP


Actual results:
Not working

Additional info:
SELinux is preventing rpc.statd from write access on the file /run/rpc.statd.lock.#012#012*****  Plugin catchall (100. confidence) suggests   **************************#012#012If you believe that rpc.statd should be allowed write access on the rpc.statd.lock file by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'rpc.statd' --raw | audit2allow -M my-rpcstatd#012# semodule -X 300 -i my-rpcstatd.pp#012


# ausearch -c 'rpc.statd'
----
time->Tue Dec  6 21:30:55 2016
type=AVC msg=audit(1481056255.705:487): avc:  denied  { write } for  pid=20061 comm="rpc.statd" path="/run/rpc.statd.lock" dev="tmpfs" ino=48753 scontext=system_u:system_r:rpcd_t:s0 tcontext=system_u:object_r:var_run_t:s0 tclass=file permissive=0
----
time->Tue Dec  6 21:30:55 2016
type=AVC msg=audit(1481056255.734:490): avc:  denied  { write } for  pid=20067 comm="rpc.statd" name="rpcbind.sock" dev="tmpfs" ino=987818 scontext=system_u:system_r:rpcd_t:s0 tcontext=system_u:object_r:var_run_t:s0 tclass=sock_file permissive=0
----

Comment 1 Lukas Vrabec 2016-12-14 15:21:32 UTC
Please run:
# restorecon -Rv / 

To fix your issue.