Description of problem: SELinux is preventing /usr/sbin/glusterfsd from 'write' accesses on the file /var/lib/glusterd/glusterd.info. ***** Plugin catchall_labels (83.8 confidence) suggests ******************** If you want to allow glusterfsd to have write access on the glusterd.info file Then e' necessario modificare l'etichetta su /var/lib/glusterd/glusterd.info Do # semanage fcontext -a -t TIPO_FILE '/var/lib/glusterd/glusterd.info' dove TIPO_FILE è uno dei seguenti: glusterd_var_lib_t, glusterd_var_run_t, puppet_tmp_t, initrc_tmp_t, puppet_tmp_t, glusterd_etc_t, glusterd_log_t, glusterd_t, mnt_t, tmp_t, glusterd_tmp_t, afs_cache_t, initrc_tmp_t, user_cron_spool_t. Quindi eseguire: restorecon -v '/var/lib/glusterd/glusterd.info' ***** Plugin catchall (17.1 confidence) suggests *************************** If si crede che glusterfsd dovrebbe avere possibilità di accesso write sui glusterd.info file in modo predefinito. Then si dovrebbe riportare il problema come bug. E' possibile generare un modulo di politica locale per consentire questo accesso. Do consentire questo accesso per il momento eseguendo: # grep glusterd /var/log/audit/audit.log | audit2allow -M mypol # semodule -i mypol.pp Additional Information: Source Context system_u:system_r:glusterd_t:s0 Target Context unconfined_u:object_r:var_lib_t:s0 Target Objects /var/lib/glusterd/glusterd.info [ file ] Source glusterd Source Path /usr/sbin/glusterfsd Port <Unknown> Host (removed) Source RPM Packages glusterfs-3.3.1-8.fc18.x86_64 Target RPM Packages glusterfs-server-3.3.1-8.fc18.x86_64 Policy RPM selinux-policy-3.11.1-76.fc18.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Permissive Host Name (removed) Platform Linux (removed) 3.7.6-201.fc18.x86_64 #1 SMP Mon Feb 4 15:54:08 UTC 2013 x86_64 x86_64 Alert Count 2 First Seen 2013-02-14 07:57:50 CET Last Seen 2013-02-15 07:56:25 CET Local ID 9fc852d2-f0b6-4096-90ae-c37d61476e6e Raw Audit Messages type=AVC msg=audit(1360911385.597:99): avc: denied { write } for pid=2595 comm="glusterd" name="glusterd.info" dev="dm-2" ino=2230949 scontext=system_u:system_r:glusterd_t:s0 tcontext=unconfined_u:object_r:var_lib_t:s0 tclass=file type=SYSCALL msg=audit(1360911385.597:99): arch=x86_64 syscall=open success=yes exit=EBADF a0=253bbf0 a1=2 a2=7fffe7dcb620 a3=20 items=0 ppid=1 pid=2595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=4294967295 tty=(none) comm=glusterd exe=/usr/sbin/glusterfsd subj=system_u:system_r:glusterd_t:s0 key=(null) Hash: glusterd,glusterd_t,var_lib_t,file,write audit2allow #============= glusterd_t ============== allow glusterd_t var_lib_t:file write; audit2allow -R #============= glusterd_t ============== allow glusterd_t var_lib_t:file write; Additional info: hashmarkername: setroubleshoot kernel: 3.7.6-201.fc18.x86_64 type: libreport
*** Bug 911481 has been marked as a duplicate of this bug. ***
chcon -R -t glusterd_var_lib_t /var/lib/glusterd will fix for now.
selinux-policy-3.11.1-79.fc18 has been submitted as an update for Fedora 18. https://admin.fedoraproject.org/updates/selinux-policy-3.11.1-79.fc18
selinux-policy-3.11.1-79.fc18 has been pushed to the Fedora 18 stable repository. If problems still persist, please make note of it in this bug report.