Red Hat Bugzilla – Bug 430138
/dev/dmmidi has default label; rpc.mountd causes SELinux error audits
Last modified: 2008-03-05 17:17:32 EST
Description of problem:
SELinux has denied the /usr/sbin/rpc.mountd (nfsd_t) "getattr" access to device
/dev/dmmidi. /dev/dmmidi is mislabeled, this device has the default label of the
/dev directory, which should not happen. All Character and/or Block Devices
should have a label. You can attempt to change the label of the file using
restorecon -v /dev/dmmidi. If this device remains labeled device_t, then this is
a bug in SELinux policy. Please file a bug report against the selinux-policy
package. If you look at the other similar devices labels, ls -lZ /dev/SIMILAR,
and find a type that would work for /dev/dmmidi, you can use chcon -t
SIMILAR_TYPE /dev/dmmidi, If this fixes the problem, you can make this permanent
by executing semanage fcontext -a -t SIMILAR_TYPE /dev/dmmidi If the restorecon
changes the context, this indicates that the application that created the
device, created it without using SELinux APIs. If you can figure out which
application created the device, please file a bug report against this application.
Version-Release number of selected component (if applicable):
export a directory over NFS (i exported a sub-tree of /media) while SELinux is
in enforcing mode. mount it remotely and access files on it. rpc.mountd will
begin generating denial audit messages at a rate of (in my case) several per hour.
no apparent ill effects other than the audit messages --- the NFS-exported
directory works well and is accessible. hence, low priority.
however, this also seems like a low-hanging fruit; adding a file label to the
default policy should fix it. i do not know what label would best work,
Fixed in selinux-policy-2.6.4-71.fc7
Bugs have been in modified for over one month. Closing as fixed in current
release please reopen if the problem still persists.