storage: software RAID testing: SELinux prevents mdadm
Snippet of test failure
# https://beaker-archive.host.prod.eng.bos.redhat.com/beaker-logs/2022/06/67267/6726796/12151973/146241821/682026853/avc.log
SELinux status: enabled
SELinuxfs mount: /sys/fs/selinux
SELinux root directory: /etc/selinux
Loaded policy name: targeted
Current mode: permissive
Mode from config file: permissive
Policy MLS status: enabled
Policy deny_unknown status: allowed
Memory protection checking: actual (secure)
Max kernel policy version: 33
selinux-policy-37.4-1.fc37.noarch
----
time->Thu Jun 16 21:22:01 2022
type=AVC msg=audit(1655428921.263:4146): avc: denied { read } for pid=258739 comm="mdadm" name="/" dev="mqueue" ino=14325 scontext=system_u:system_r:mdadm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:container_file_t:s0:c1022,c1023 tclass=dir permissive=1
----
time->Thu Jun 16 21:22:01 2022
type=AVC msg=audit(1655428921.263:4147): avc: denied { open } for pid=258739 comm="mdadm" path="/dev/mqueue" dev="mqueue" ino=14325 scontext=system_u:system_r:mdadm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:container_file_t:s0:c1022,c1023 tclass=dir permissive=1
Test logs on DataWarehouse
DataWarehouse issue
-
DW issue : https://datawarehouse.cki-project.org/issue/1338
-
Regex
: https://datawarehouse.cki-project.org/issue/-/regex/1294- Text Match :
avc: denied { \S+ } for pid=258739 comm="mdadm" name="\S+" dev="mqueue" ino=\d+ scontext=system_u:system_r:mdadm_t
- (Log) File Name Match :
avc.log
- Test Name Match :
storage: software RAID testing
- KPET Tree Name Match :
(upstream|rawhide|eln)
- Text Match :
-
Additional details
- If you don't know how to look into such kind of issue, please take a look at: #1202 (closed)
In case opening the links above result in a 404 page on DataWarehouse, please make sure you are correctly logged into DataWarehouse via Red Hat SSO.