[Bugs] [Bug 1212923] [SELinux] [Snapshot] - Gluster/Snapshot creation fails when selinux is in Enforcing mode on RHEL-7.1
bugzilla at redhat.com
bugzilla at redhat.com
Mon Jun 15 11:39:12 UTC 2015
https://bugzilla.redhat.com/show_bug.cgi?id=1212923
--- Comment #21 from senaik at redhat.com ---
Scheduler fails to create snapshots on RHEL7.1 when SELinux is in Enforcing
mode.
When SELinux is in Permissive mode, Scheduler creates snapshots but I see the
below AVC
grep "AVC" /var/log/audit/audit.log
type=USER_AVC msg=audit(1434380101.086:4771): pid=1 uid=0 auid=4294967295
ses=4294967295 subj=system_u:system_r:init_t:s0 msg='avc: received setenforce
notice (enforcing=0) exe="/usr/lib/systemd/systemd" sauid=0 hostname=? addr=?
terminal=?'
type=AVC msg=audit(1434385206.279:4911): avc: denied { getattr } for
pid=12694 comm="xfs_db" path="/dev/dm-23" dev="devtmpfs" ino=271817
scontext=system_u:system_r:glusterd_t:s0
tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file
type=AVC msg=audit(1434385206.279:4912): avc: denied { read } for pid=12694
comm="xfs_db" name="dm-23" dev="devtmpfs" ino=271817
scontext=system_u:system_r:glusterd_t:s0
tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file
type=AVC msg=audit(1434385206.279:4912): avc: denied { open } for pid=12694
comm="xfs_db" path="/dev/dm-23" dev="devtmpfs" ino=271817
scontext=system_u:system_r:glusterd_t:s0
tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file
type=AVC msg=audit(1434385206.279:4913): avc: denied { write } for pid=12694
comm="xfs_db" name="dm-23" dev="devtmpfs" ino=271817
scontext=system_u:system_r:glusterd_t:s0
tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file
type=AVC msg=audit(1434385206.279:4914): avc: denied { ioctl } for pid=12694
comm="xfs_db" path="/dev/dm-23" dev="devtmpfs" ino=271817
scontext=system_u:system_r:glusterd_t:s0
tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file
==============================================================
rpm -qa |grep selinux
selinux-policy-targeted-3.13.1-27.el7.noarch
libselinux-utils-2.2.2-6.el7.x86_64
libselinux-python-2.2.2-6.el7.x86_64
libselinux-2.2.2-6.el7.x86_64
selinux-policy-3.13.1-27.el7.noarch
================================================================
cat audit.log |audit2allow
#============= glusterd_t ==============
allow glusterd_t fixed_disk_device_t:blk_file { read write getattr open ioctl
};
--
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=gWjZk67oVR&a=cc_unsubscribe
More information about the Bugs
mailing list