CIFS Connectathon: SELinux prevents mount.cifs, request-key and cifs.idmap
Snippet of test failure
# https://s3.us-east-1.amazonaws.com/arr-cki-prod-datawarehouse-public/datawarehouse-public/3564571069/redhat:740023667/build_x86_64_redhat:740023667_x86_64_debug/tests/2/results_0001/job.01/recipes/13184399/tasks/8/results/1673013549/logs/avc.log
SELinux status: enabled
SELinuxfs mount: /sys/fs/selinux
SELinux root directory: /etc/selinux
Loaded policy name: targeted
Current mode: permissive
Mode from config file: permissive
Policy MLS status: enabled
Policy deny_unknown status: allowed
Memory protection checking: actual (secure)
Max kernel policy version: 33
selinux-policy-38.4-1.fc38.noarch
----
time->Fri Jan 6 09:41:56 2023
type=AVC msg=audit(1673016116.240:626): avc: denied { write } for pid=103237 comm="mount.cifs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=key permissive=1
----
time->Fri Jan 6 09:41:56 2023
type=AVC msg=audit(1673016116.268:627): avc: denied { view } for pid=103258 comm="request-key" scontext=system_u:system_r:kernel_generic_helper_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=key permissive=1
...<snip>...
Test logs on DataWarehouse
DataWarehouse issue
Additional details
N/A
In case opening the links above result in a 404 page on DataWarehouse, please make sure you are correctly logged into DataWarehouse via Red Hat SSO.