Description of problem: SummarySELinux is preventing /sbin/rpc.statd (rpcd_t) "write" to pipe (automount_t). Version-Release number of selected component (if applicable): Source Context: system_u:system_r:rpcd_tTarget Context: system_u:system_r:automount_tTarget Objects: pipe [ fifo_file ]Affected RPM Packages: nfs-utils-1.1.0-6.fc8 [application]Policy RPM: selinux-policy-3.0.8-76.fc8Selinux Enabled: TruePolicy Type: targetedMLS Enabled: TrueEnforcing Mode: PermissivePlugin Name: plugins.catchallHost Name: brisket.steaks.homPlatform: Linux brisket.steaks.hom 2.6.23.14-107.fc8 #1 SMP Mon Jan 14 21:37:30 EST 2008 i686 i686Alert Count: 1First Seen: Mon 28 Jan 2008 12:06:32 AM ESTLast Seen: Mon 28 Jan 2008 12:06:32 AM ESTLocal ID: aeaada37-8740-4cbd-ab0f-5b6121bcc77b How reproducible: Running a small SOHO network. FC8 NIS server -> local machine Steps to Reproduce: 1. 2. 3. Actual results: avc: denied { write } for comm=rpc.statd dev=pipefs egid=0 euid=0 exe=/sbin/rpc.statd exit=0 fsgid=0 fsuid=0 gid=0 items=0 path=pipe:[53007] pid=7590 scontext=system_u:system_r:rpcd_t:s0 sgid=0 subj=system_u:system_r:rpcd_t:s0 suid=0 tclass=fifo_file tcontext=system_u:system_r:automount_t:s0 tty=(none) uid=0 Expected results: Additional info:
I too am seeing this exact same message. Raw Audit Messages :avc: denied { write } for comm=rpc.statd dev=pipefs egid=0 euid=0 exe=/sbin/rpc.statd exit=0 fsgid=0 fsuid=0 gid=0 items=0 path=pipe:[39813] pid=4142 scontext=system_u:system_r:rpcd_t:s0 sgid=0 subj=system_u:system_r:rpcd_t:s0 suid=0 tclass=fifo_file tcontext=system_u:system_r:automount_t:s0 tty=(none) uid=0
Fixed in selinux-policy-3.0.8-83 You can safely ignore.
Bugs have been in modified for over one month. Closing as fixed in current release please reopen if the problem still persists.