Bug 749181
Summary: | Infrequent 'permission denied' errors with NFS3 on client | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 6 | Reporter: | Stefan Walter <walteste> |
Component: | kernel | Assignee: | nfs-maint |
Status: | CLOSED DUPLICATE | QA Contact: | Red Hat Kernel QE team <kernel-qe> |
Severity: | unspecified | Docs Contact: | |
Priority: | unspecified | ||
Version: | 6.1 | CC: | baumanmo, eparis, jlayton, steved |
Target Milestone: | rc | ||
Target Release: | --- | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | NFS server | ||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2012-03-20 18:27:50 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Stefan Walter
2011-10-26 12:26:04 UTC
It seem that our testing with SELinux was not thorough enough (our team is playing with a server of a productive service after all). After a few reboots the server started to report SELinux messages like the following randomly: type=1400 audit(1319712116.696:712): avc: denied { 0x400000 } for pid=3164 comm="nfsd" name="" dev=dm-18 ino=16124690 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file This avc message did not show up in our logs before today. A quick google search for that message leads me to believe that we hit the bug reported in BZ576207 which is not fixed in the RHEl6. Disabling SELinux on the server now makes the problem go away. I am going to run our server with a kernel that incorporates the patch for a few days. If that works stable I will request to back-port the fix from BZ576207 to RHEL6. Since RHEL 6.2 External Beta has begun, and this bug remains unresolved, it has been rejected as it is not proposed as exception or blocker. Red Hat invites you to ask your support representative to propose this request, if appropriate and relevant, in the next release of Red Hat Enterprise Linux. Supposedly, this bug has been fixed in RHEL6 though I don't know the BZ# right offhand. Are you still able to reproduce this on more recent kernels? Ok, for the record this is probably the same as bug 656458, and should be fixed in 6.2. I'll go ahead and close this as a duplicate. Please reopen if it's not fixed in 6.2. *** This bug has been marked as a duplicate of bug 656458 *** |