[Gluster-users] CentOS 6.4 + selinux enforcing + mount.glusterfs == bad?

Alan Orth alan.orth at gmail.com
Tue Mar 12 09:27:40 UTC 2013


I just learned how to create a new module to allow this request.  In a 
nutshell, use audit2allow to check the audit log and create a new 
module, see [1] and [2].  My exact steps:

    mkdir ~/selinux_gluster
    cd ~/selinux_gluster
    setenforce 0
    service netfs start
    audit2allow -M glusterd_centos64 -l -i /var/log/audit/audit.log
    setenforce 1
    semodule -i glusterd_centos64.pp
    service netfs start

More precisely, what you are doing is:

 1. setting selinux to permissive mode
 2. re-loading the policy to get a clean "starting point"
 3. performing the actions which are being denied
 4. creating a module
 5. re-enabling selinux enforcing mode
 6. loading the new selinux module (which, after loading, is copied into
    /etc/selinux/targeted/modules/active/modules/ and will persist after
 7. gluster should now be able to mount via /etc/fstab on boot, or via
    the netfs service, etc (ie, not manually as root).

Hope this helps some future traveler,


[1] http://fedorasolved.org/security-solutions/selinux-module-building
[2] man audit2allow

On 03/12/2013 11:32 AM, Alan Orth wrote:
> All,
> I've updated one of my GlusterFS clients from CentOS 6.3 to CentOS 6.4 
> and now my gluster volumes fail to mount at boot.  dmesg shows:
> type=1400 audit(1363004014.209:4): avc:  denied  { execute } for 
> pid=1150 comm="mount.glusterfs" name="glusterfsd" dev=sda1 ino=1315297 
> scontext=system_u:system_r:mount_t:s0 
> tcontext=system_u:object_r:glusterd_exec_t:s0 tclass=file
> Mounting manually as root works, but obviously isn't optimal.
> Does anyone know how to fix this?
> Thanks!

Alan Orth
alan.orth at gmail.com
"I have always wished for my computer to be as easy to use as my telephone; my wish has come true because I can no longer figure out how to use my telephone." -Bjarne Stroustrup, inventor of C++

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://supercolony.gluster.org/pipermail/gluster-users/attachments/20130312/a7e2c417/attachment.html>

More information about the Gluster-users mailing list