CIFS Connectathon: SELinux prevents mount.cifs, request-key and cifs.idmap

Snippet of test failure

# https://s3.us-east-1.amazonaws.com/arr-cki-prod-datawarehouse-public/datawarehouse-public/3564571069/redhat:740023667/build_x86_64_redhat:740023667_x86_64_debug/tests/2/results_0001/job.01/recipes/13184399/tasks/8/results/1673013549/logs/avc.log
SELinux status:                 enabled
SELinuxfs mount:                /sys/fs/selinux
SELinux root directory:         /etc/selinux
Loaded policy name:             targeted
Current mode:                   permissive
Mode from config file:          permissive
Policy MLS status:              enabled
Policy deny_unknown status:     allowed
Memory protection checking:     actual (secure)
Max kernel policy version:      33
selinux-policy-38.4-1.fc38.noarch
----
time->Fri Jan  6 09:41:56 2023
type=AVC msg=audit(1673016116.240:626): avc:  denied  { write } for  pid=103237 comm="mount.cifs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=key permissive=1
----
time->Fri Jan  6 09:41:56 2023
type=AVC msg=audit(1673016116.268:627): avc:  denied  { view } for  pid=103258 comm="request-key" scontext=system_u:system_r:kernel_generic_helper_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=key permissive=1
...<snip>...

Test logs on DataWarehouse

DataWarehouse issue

Additional details

N/A

In case opening the links above result in a 404 page on DataWarehouse, please make sure you are correctly logged into DataWarehouse via Red Hat SSO.

To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information