Bug 1769441

Summary: Upgrade run re-execution is not indempotent in mysql upgrade_tasks: cannot read directory '/var/log/mariadb': Permission denied
Product: Red Hat OpenStack Reporter: Jose Luis Franco <jfrancoa>
Component: openstack-tripleo-heat-templatesAssignee: RHOS Maint <rhos-maint>
Status: CLOSED DUPLICATE QA Contact: Sasha Smolyak <ssmolyak>
Severity: high Docs Contact:
Priority: high    
Version: 15.0 (Stein)CC: mburns, michele
Target Milestone: ---Keywords: Triaged, ZStream
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-12-02 15:21:29 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Jose Luis Franco 2019-11-06 16:05:36 UTC
Description of problem:

Running the upgrade with selinux enforcing fails if the upgrade run steps gets executed twice. The failure task is:

TASK [Make sure Mysql upgrade temporary directory exists] **********************
Wednesday 06 November 2019  09:23:23 -0500 (0:00:00.078)       0:02:59.421 ****
changed: [lab-controller01] => {"changed": true, "gid": 0, "group": "root", "mode": "0700", "owner": "root", "path": "/tmp/mariadb-upgrade", "secontext": "unconfined_u:object_r:user_tmp_t:s0", "size": 25, "state": "directory", "uid": 0}

TASK [Upgrade Mysql database from a temporary container] ***********************
Wednesday 06 November 2019  09:23:23 -0500 (0:00:00.353)       0:02:59.775 ****
fatal: [lab-controller01]: FAILED! => {"changed": true, "cmd": "podman run --rm --log-driver=k8s-file -u root --net=host -e \"KOLLA_CONFIG_STRATEGY=COPY_ALWAYS\" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro -v /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro -v /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro -v /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro -v /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro -v /dev/log:/dev/log -v /etc/ssh/ssh_known_hosts:/etc/ssh/ssh_known_hosts:ro -v /etc/puppet:/etc/puppet:ro -v /var/lib/kolla/config_files/mysql.json:/var/lib/kolla/config_files/config.json -v /var/lib/config-data/puppet-generated/mysql/:/var/lib/kolla/config_files/src:ro -v /var/lib/mysql:/var/lib/mysql -v /tmp/mariadb-upgrade:/var/log/mariadb:rw \"172.16.0.1:8787/rhosp15-rhel8/openstack-mariadb:pcmklatest\" /bin/bash -ecx \"kolla_set_configs; if mysqladmin ping --silent; then exit 0; fi; chown -R mysql:mysql /var/lib/mysql; chown -R mysql:mysql /var/log/mariadb; mysqld_safe --user=mysql --wsrep-provider=none --skip-networking --wsrep-on=off & timeout 60 sh -c 'while ! mysqladmin ping --silent; do sleep 1; done'; mysql_upgrade; mysqladmin shutdown\"", "delta": "0:00:00.639782", "end": "2019-11-06 14:23:24.436537", "msg": "non-zero return code", "rc": 1, "start": "2019-11-06 14:23:23.796755", "stderr": "+ kolla_set_configs\nINFO:__main__:Loading config file at /var/lib/kolla/config_files/config.json\nINFO:__main__:Validating config file\nINFO:__main__:Kolla config strategy set to: COPY_ALWAYS\nINFO:__main__:Copying service configuration files\nINFO:__main__:Copying /dev/null to /etc/libqb/force-filesystem-sockets\nINFO:__main__:Setting permission for /etc/libqb/force-filesystem-sockets\nINFO:__main__:Deleting /etc/my.cnf.d/galera.cnf\nINFO:__main__:Copying /var/lib/kolla/config_files/src/etc/my.cnf.d/galera.cnf to /etc/my.cnf.d/galera.cnf\nINFO:__main__:Copying /var/lib/kolla/config_files/src/etc/sysconfig/clustercheck to /etc/sysconfig/clustercheck\nINFO:__main__:Copying /var/lib/kolla/config_files/src/root/.my.cnf to /root/.my.cnf\nINFO:__main__:Writing out command to execute\n+ mysqladmin ping --silent\n+ chown -R mysql:mysql /var/lib/mysql\n+ chown -R mysql:mysql /var/log/mariadb\nchown: cannot read directory '/var/log/mariadb': Permission denied", "stderr_lines": ["+ kolla_set_configs", "INFO:__main__:Loading config file at /var/lib/kolla/config_files/config.json", "INFO:__main__:Validating config file", "INFO:__main__:Kolla config strategy set to: COPY_ALWAYS", "INFO:__main__:Copying service configuration files", "INFO:__main__:Copying /dev/null to /etc/libqb/force-filesystem-sockets", "INFO:__main__:Setting permission for /etc/libqb/force-filesystem-sockets", "INFO:__main__:Deleting /etc/my.cnf.d/galera.cnf", "INFO:__main__:Copying /var/lib/kolla/config_files/src/etc/my.cnf.d/galera.cnf to /etc/my.cnf.d/galera.cnf", "INFO:__main__:Copying /var/lib/kolla/config_files/src/etc/sysconfig/clustercheck to /etc/sysconfig/clustercheck", "INFO:__main__:Copying /var/lib/kolla/config_files/src/root/.my.cnf to /root/.my.cnf", "INFO:__main__:Writing out command to execute", "+ mysqladmin ping --silent", "+ chown -R mysql:mysql /var/lib/mysql", "+ chown -R mysql:mysql /var/log/mariadb", "chown: cannot read directory '/var/log/mariadb': Permission denied"], "stdout": "", "stdout_lines": []}

NO MORE HOSTS LEFT *************************************************************

PLAY RECAP *********************************************************************
lab-controller01           : ok=140  changed=45   unreachable=0    failed=1    skipped=256  rescued=0    ignored=1

Wednesday 06 November 2019  09:23:24 -0500 (0:00:00.931)       0:03:00.706 ****
===============================================================================

First execution did run fine and created the /tmp/mariadb-upgrade with the mariadb.log on it:

[root@lab-controller01 ~]# ls -l /tmp/mariadb-upgrade                                                                                                                       
total 8                                                                                                                                                                      -rw-rw----. 1 42434 42434 5833 Nov  6 13:22 mariadb.log

But if trying to re-lunch the container, the root user does not haver permissions to access the /var/log/mariadb directory:

[root@lab-controller01 ~]# podman run --rm --net=host -u root -it -v /tmp/mariadb-upgrade:/var/log/mariadb:rw 172.16.0.1:8787/rhosp15-rhel8/openstack-mariadb:pcmklatest sh  
sh: cannot set terminal process group (-1): Inappropriate ioctl for device                                                                                                  
sh: no job control in this shell                                                                                                                                             
()[root@lab-controller01 /]$ chown -R mysql:mysql /var/log/mariadb/                                                                                                         
chown: cannot read directory '/var/log/mariadb/': Permission denied   

Setting the slinux to permissive fixes the issue:

[root@lab-controller01 ~]# getenforce
Enforcing
[root@lab-controller01 ~]# setenforce 0
[root@lab-controller01 ~]# podman run --rm --net=host -u root -it -v /tmp/mariadb-upgrade:/var/log/mariadb:rw 172.16.0.1:8787/rhosp15-rhel8/openstack-mariadb:pcmklatest sh
sh: cannot set terminal process group (-1): Inappropriate ioctl for device
sh: no job control in this shell
()[root@lab-controller01 /]$ ls -l /var/log/mariadb/
total 8
-rw-rw----. 1 mysql mysql 5833 Nov  6 13:22 mariadb.log


audit.log denied logs:

[root@lab-controller01 ~]# grep -ir denied /var/log/audit/audit.log*
/var/log/audit/audit.log.1:type=AVC msg=audit(1573046561.569:61697): avc:  denied  { read } for  pid=174403 comm="python" name="mysql.json" dev="vda2" ino=203423842 scontext
=system_u:system_r:container_t:s0:c403,c774 tcontext=system_u:object_r:var_lib_t:s0 tclass=file permissive=1
/var/log/audit/audit.log.1:type=AVC msg=audit(1573046561.569:61697): avc:  denied  { open } for  pid=174403 comm="python" path="/var/lib/kolla/config_files/config.json" dev=
"vda2" ino=203423842 scontext=system_u:system_r:container_t:s0:c403,c774 tcontext=system_u:object_r:var_lib_t:s0 tclass=file permissive=1
/var/log/audit/audit.log.1:type=AVC msg=audit(1573046561.569:61698): avc:  denied  { ioctl } for  pid=174403 comm="python" path="/var/lib/kolla/config_files/config.json" dev
="vda2" ino=203423842 ioctlcmd=0x5401 scontext=system_u:system_r:container_t:s0:c403,c774 tcontext=system_u:object_r:var_lib_t:s0 tclass=file permissive=1
/var/log/audit/audit.log.1:type=AVC msg=audit(1573046561.590:61699): avc:  denied  { read } for  pid=174405 comm="chown" name="mysql" dev="vda2" ino=184632756 scontext=syste
m_u:system_r:container_t:s0:c403,c774 tcontext=system_u:object_r:mysqld_db_t:s0 tclass=dir permissive=1
/var/log/audit/audit.log.1:type=AVC msg=audit(1573046561.590:61700): avc:  denied  { setattr } for  pid=174405 comm="chown" name="db.frm" dev="vda2" ino=186739210 scontext=s
ystem_u:system_r:container_t:s0:c403,c774 tcontext=unconfined_u:object_r:var_lib_t:s0 tclass=file permissive=1
/var/log/audit/audit.log.1:type=AVC msg=audit(1573046561.590:61701): avc:  denied  { setattr } for  pid=174405 comm="chown" name="mysql" dev="vda2" ino=186739209 scontext=sy
stem_u:system_r:container_t:s0:c403,c774 tcontext=unconfined_u:object_r:var_lib_t:s0 tclass=dir permissive=1
/var/log/audit/audit.log.1:type=AVC msg=audit(1573046561.598:61702): avc:  denied  { setattr } for  pid=174405 comm="chown" name="mysql" dev="vda2" ino=184632756 scontext=sy
stem_u:system_r:container_t:s0:c403,c774 tcontext=system_u:object_r:mysqld_db_t:s0 tclass=dir permissive=1
/var/log/audit/audit.log.1:type=AVC msg=audit(1573046561.600:61703): avc:  denied  { setattr } for  pid=174406 comm="chown" name="mariadb-upgrade" dev="vda2" ino=205833003 s
context=system_u:system_r:container_t:s0:c403,c774 tcontext=unconfined_u:object_r:user_tmp_t:s0 tclass=dir permissive=1
/var/log/audit/audit.log.1:type=AVC msg=audit(1573046561.969:61704): avc:  denied  { write } for  pid=174659 comm="mysqld" name="mysql" dev="vda2" ino=184632756 scontext=sys
tem_u:system_r:container_t:s0:c403,c774 tcontext=system_u:object_r:mysqld_db_t:s0 tclass=dir permissive=1
/var/log/audit/audit.log.1:type=AVC msg=audit(1573046561.969:61704): avc:  denied  { add_name } for  pid=174659 comm="mysqld" name="lab-controller01.lower-test" scontext=sys
tem_u:system_r:container_t:s0:c403,c774 tcontext=system_u:object_r:mysqld_db_t:s0 tclass=dir permissive=1
/var/log/audit/audit.log.1:type=AVC msg=audit(1573046561.969:61704): avc:  denied  { create } for  pid=174659 comm="mysqld" name="lab-controller01.lower-test" scontext=syste
m_u:system_r:container_t:s0:c403,c774 tcontext=system_u:object_r:mysqld_db_t:s0 tclass=file permissive=1
/var/log/audit/audit.log.1:type=AVC msg=audit(1573046561.969:61704): avc:  denied  { read write open } for  pid=174659 comm="mysqld" path="/var/lib/mysql/lab-controller01.lo
wer-test" dev="vda2" ino=185309968 scontext=system_u:system_r:container_t:s0:c403,c774 tcontext=system_u:object_r:mysqld_db_t:s0 tclass=file permissive=1
/var/log/audit/audit.log.1:type=AVC msg=audit(1573046561.969:61705): avc:  denied  { remove_name } for  pid=174659 comm="mysqld" name="lab-controller01.lower-test" dev="vda2
" ino=185309968 scontext=system_u:system_r:container_t:s0:c403,c774 tcontext=system_u:object_r:mysqld_db_t:s0 tclass=dir permissive=1
/var/log/audit/audit.log.1:type=AVC msg=audit(1573046561.969:61705): avc:  denied  { unlink } for  pid=174659 comm="mysqld" name="lab-controller01.lower-test" dev="vda2" ino
=185309968 scontext=system_u:system_r:container_t:s0:c403,c774 tcontext=system_u:object_r:mysqld_db_t:s0 tclass=file permissive=1
/var/log/audit/audit.log.1:type=AVC msg=audit(1573046561.970:61706): avc:  denied  { write } for  pid=174659 comm="mysqld" name="mariadb-upgrade" dev="vda2" ino=205833003 sc
ontext=system_u:system_r:container_t:s0:c403,c774 tcontext=unconfined_u:object_r:user_tmp_t:s0 tclass=dir permissive=1
/var/log/audit/audit.log.1:type=AVC msg=audit(1573046561.970:61706): avc:  denied  { add_name } for  pid=174659 comm="mysqld" name="mariadb.log" scontext=system_u:system_r:c
ontainer_t:s0:c403,c774 tcontext=unconfined_u:object_r:user_tmp_t:s0 tclass=dir permissive=1
/var/log/audit/audit.log.1:type=AVC msg=audit(1573046561.970:61706): avc:  denied  { create } for  pid=174659 comm="mysqld" name="mariadb.log" scontext=system_u:system_r:con
tainer_t:s0:c403,c774 tcontext=system_u:object_r:user_tmp_t:s0 tclass=file permissive=1
/var/log/audit/audit.log.1:type=AVC msg=audit(1573046561.972:61707): avc:  denied  { read } for  pid=174659 comm="mysqld" name="plugin.frm" dev="vda2" ino=186739241 scontext
=system_u:system_r:container_t:s0:c403,c774 tcontext=unconfined_u:object_r:var_lib_t:s0 tclass=file permissive=1
/var/log/audit/audit.log.1:type=AVC msg=audit(1573046561.972:61707): avc:  denied  { open } for  pid=174659 comm="mysqld" path="/var/lib/mysql/mysql/plugin.frm" dev="vda2" i
no=186739241 scontext=system_u:system_r:container_t:s0:c403,c774 tcontext=unconfined_u:object_r:var_lib_t:s0 tclass=file permissive=1
/var/log/audit/audit.log.1:type=AVC msg=audit(1573046561.972:61708): avc:  denied  { write } for  pid=174659 comm="mysqld" name="plugin.MYI" dev="vda2" ino=186739242 scontex
t=system_u:system_r:container_t:s0:c403,c774 tcontext=unconfined_u:object_r:var_lib_t:s0 tclass=file permissive=1
/var/log/audit/audit.log.1:type=AVC msg=audit(1573046561.982:61709): avc:  denied  { lock } for  pid=174659 comm="mysqld" path="/var/lib/mysql/ibdata1" dev="vda2" ino=184647
075 scontext=system_u:system_r:container_t:s0:c403,c774 tcontext=unconfined_u:object_r:var_lib_t:s0 tclass=file permissive=1
/var/log/audit/audit.log.1:type=AVC msg=audit(1573046561.984:61710): avc:  denied  { read } for  pid=174659 comm="mysqld" name="mysql" dev="vda2" ino=184632756 scontext=syst
em_u:system_r:container_t:s0:c403,c774 tcontext=system_u:object_r:mysqld_db_t:s0 tclass=dir permissive=1
/var/log/audit/audit.log.1:type=AVC msg=audit(1573046562.112:61711): avc:  denied  { write } for  pid=174659 comm="mysqld" name="mysql" dev="vda2" ino=184632756 scontext=sys
tem_u:system_r:container_t:s0:c403,c774 tcontext=system_u:object_r:mysqld_db_t:s0 tclass=dir permissive=1
/var/log/audit/audit.log.1:type=AVC msg=audit(1573046562.112:61711): avc:  denied  { remove_name } for  pid=174659 comm="mysqld" name="ib_logfile0" dev="vda2" ino=184647077
scontext=system_u:system_r:container_t:s0:c403,c774 tcontext=system_u:object_r:mysqld_db_t:s0 tclass=dir permissive=1
/var/log/audit/audit.log.1:type=AVC msg=audit(1573046562.112:61711): avc:  denied  { unlink } for  pid=174659 comm="mysqld" name="ib_logfile0" dev="vda2" ino=184647077 scont
ext=system_u:system_r:container_t:s0:c403,c774 tcontext=unconfined_u:object_r:var_lib_t:s0 tclass=file permissive=1
/var/log/audit/audit.log.1:type=AVC msg=audit(1573046562.120:61712): avc:  denied  { add_name } for  pid=174659 comm="mysqld" name="ib_logfile101" scontext=system_u:system_r
:container_t:s0:c403,c774 tcontext=system_u:object_r:mysqld_db_t:s0 tclass=dir permissive=1
/var/log/audit/audit.log.1:type=AVC msg=audit(1573046562.120:61713): avc:  denied  { lock } for  pid=174659 comm="mysqld" path="/var/lib/mysql/ib_logfile101" dev="vda2" ino=
184647076 scontext=system_u:system_r:container_t:s0:c403,c774 tcontext=system_u:object_r:mysqld_db_t:s0 tclass=file permissive=1
/var/log/audit/audit.log.1:type=AVC msg=audit(1573046562.126:61714): avc:  denied  { rename } for  pid=174659 comm="mysqld" name="ib_logfile101" dev="vda2" ino=184647076 sco
ntext=system_u:system_r:container_t:s0:c403,c774 tcontext=system_u:object_r:mysqld_db_t:s0 tclass=file permissive=1
/var/log/audit/audit.log.1:type=AVC msg=audit(1573046562.158:61715): avc:  denied  { create } for  pid=174659 comm="mysqld" name="mysql.sock" scontext=system_u:system_r:cont
ainer_t:s0:c403,c774 tcontext=system_u:object_r:mysqld_db_t:s0 tclass=sock_file permissive=1
/var/log/audit/audit.log.1:type=AVC msg=audit(1573046562.618:61716): avc:  denied  { write } for  pid=174690 comm="mysqladmin" name="mysql.sock" dev="vda2" ino=184658862 sco
ntext=system_u:system_r:container_t:s0:c403,c774 tcontext=system_u:object_r:mysqld_db_t:s0 tclass=sock_file permissive=1
/var/log/audit/audit.log.1:type=AVC msg=audit(1573046562.721:61717): avc:  denied  { write } for  pid=174659 comm="mysqld" name="mysql" dev="vda2" ino=186739209 scontext=sys
tem_u:system_r:container_t:s0:c403,c774 tcontext=unconfined_u:object_r:var_lib_t:s0 tclass=dir permissive=1
/var/log/audit/audit.log.1:type=AVC msg=audit(1573046562.721:61717): avc:  denied  { add_name } for  pid=174659 comm="mysqld" name="transaction_registry.frm" scontext=system
_u:system_r:container_t:s0:c403,c774 tcontext=unconfined_u:object_r:var_lib_t:s0 tclass=dir permissive=1
/var/log/audit/audit.log.1:type=AVC msg=audit(1573046562.721:61717): avc:  denied  { create } for  pid=174659 comm="mysqld" name="transaction_registry.frm" scontext=system_u
:system_r:container_t:s0:c403,c774 tcontext=system_u:object_r:var_lib_t:s0 tclass=file permissive=1
/var/log/audit/audit.log.1:type=AVC msg=audit(1573046562.721:61717): avc:  denied  { write } for  pid=174659 comm="mysqld" path="/var/lib/mysql/mysql/transaction_registry.fr
m" dev="vda2" ino=186739225 scontext=system_u:system_r:container_t:s0:c403,c774 tcontext=system_u:object_r:var_lib_t:s0 tclass=file permissive=1
/var/log/audit/audit.log.1:type=AVC msg=audit(1573046562.724:61718): avc:  denied  { lock } for  pid=174659 comm="mysqld" path="/var/lib/mysql/mysql/transaction_registry.ibd
" dev="vda2" ino=186739226 scontext=system_u:system_r:container_t:s0:c403,c774 tcontext=system_u:object_r:var_lib_t:s0 tclass=file permissive=1
/var/log/audit/audit.log.1:type=AVC msg=audit(1573046562.731:61719): avc:  denied  { remove_name } for  pid=174659 comm="mysqld" name="user.MYI" dev="vda2" ino=186739217 sco
ntext=system_u:system_r:container_t:s0:c403,c774 tcontext=unconfined_u:object_r:var_lib_t:s0 tclass=dir permissive=1
/var/log/audit/audit.log.1:type=AVC msg=audit(1573046562.731:61719): avc:  denied  { rename } for  pid=174659 comm="mysqld" name="user.MYI" dev="vda2" ino=186739217 scontext
=system_u:system_r:container_t:s0:c403,c774 tcontext=unconfined_u:object_r:var_lib_t:s0 tclass=file permissive=1
/var/log/audit/audit.log.1:type=AVC msg=audit(1573046562.732:61720): avc:  denied  { rename } for  pid=174659 comm="mysqld" name="#sql-107_f.MYI" dev="vda2" ino=186[21/1978]
ontext=system_u:system_r:container_t:s0:c403,c774 tcontext=system_u:object_r:var_lib_t:s0 tclass=file permissive=1
/var/log/audit/audit.log.1:type=AVC msg=audit(1573046562.735:61721): avc:  denied  { unlink } for  pid=174659 comm="mysqld" name="#sql2-107-f.frm" dev="vda2" ino=186739216 s
context=system_u:system_r:container_t:s0:c403,c774 tcontext=system_u:object_r:var_lib_t:s0 tclass=file permissive=1
/var/log/audit/audit.log.1:type=AVC msg=audit(1573046562.954:61722): avc:  denied  { rmdir } for  pid=174659 comm="mysqld" name="performance_schema" dev="vda2" ino=189100549
 scontext=system_u:system_r:container_t:s0:c403,c774 tcontext=unconfined_u:object_r:var_lib_t:s0 tclass=dir permissive=1
/var/log/audit/audit.log.1:type=AVC msg=audit(1573046562.954:61723): avc:  denied  { create } for  pid=174659 comm="mysqld" name="performance_schema" scontext=system_u:syste
m_r:container_t:s0:c403,c774 tcontext=system_u:object_r:mysqld_db_t:s0 tclass=dir permissive=1
/var/log/audit/audit.log.1:type=AVC msg=audit(1573046563.347:61724): avc:  denied  { unlink } for  pid=174659 comm="mysqld" name="mysql.sock" dev="vda2" ino=184658862 sconte
xt=system_u:system_r:container_t:s0:c403,c774 tcontext=system_u:object_r:mysqld_db_t:s0 tclass=sock_file permissive=1
/var/log/audit/audit.log.3:type=AVC msg=audit(1572975171.665:25): avc:  denied  { name_bind } for  pid=1629 comm="ovsdb-server" src=6640 scontext=system_u:system_r:openvswit
ch_t:s0 tcontext=system_u:object_r:ovsdb_port_t:s0 tclass=tcp_socket permissive=1
/var/log/audit/audit.log.3:type=AVC msg=audit(1572975171.804:32): avc:  denied  { map } for  pid=1740 comm="modprobe" path="/usr/lib/modules/4.18.0-147.0.2.el8_1.x86_64/modu
les.dep.bin" dev="vda2" ino=138615999 scontext=system_u:system_r:openvswitch_t:s0 tcontext=system_u:object_r:modules_dep_t:s0 tclass=file permissive=1
/var/log/audit/audit.log.3:type=AVC msg=audit(1572975199.712:95): avc:  denied  { execute } for  pid=3400 comm="(leapp3)" name="leapp3" dev="vda2" ino=102844187 scontext=sys
tem_u:system_r:init_t:s0 tcontext=system_u:object_r:admin_home_t:s0 tclass=file permissive=1
/var/log/audit/audit.log.3:type=AVC msg=audit(1572975199.712:95): avc:  denied  { read open } for  pid=3400 comm="(leapp3)" path="/root/tmp_leapp_py3/leapp3" dev="vda2" ino=
102844187 scontext=system_u:system_r:init_t:s0 tcontext=system_u:object_r:admin_home_t:s0 tclass=file permissive=1
/var/log/audit/audit.log.3:type=AVC msg=audit(1572975199.712:95): avc:  denied  { execute_no_trans } for  pid=3400 comm="(leapp3)" path="/root/tmp_leapp_py3/leapp3" dev="vda
2" ino=102844187 scontext=system_u:system_r:init_t:s0 tcontext=system_u:object_r:admin_home_t:s0 tclass=file permissive=1
/var/log/audit/audit.log.3:type=AVC msg=audit(1572975199.734:99): avc:  denied  { ioctl } for  pid=3400 comm="leapp3" path="/root/tmp_leapp_py3/leapp3" dev="vda2" ino=102844
187 ioctlcmd=0x5451 scontext=system_u:system_r:init_t:s0 tcontext=system_u:object_r:admin_home_t:s0 tclass=file permissive=1
/var/log/audit/audit.log.3:type=AVC msg=audit(1572975203.248:109): avc:  denied  { create } for  pid=5391 comm="leapp3" name="listener-kso2iy15" scontext=system_u:system_r:i
nit_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=sock_file permissive=1
/var/log/audit/audit.log.3:type=AVC msg=audit(1572975203.248:110): avc:  denied  { write } for  pid=3400 comm="leapp3" name="listener-kso2iy15" dev="vda2" ino=21062891 scont
ext=system_u:system_r:init_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=sock_file permissive=1
/var/log/audit/audit.log.3:type=AVC msg=audit(1572975203.535:111): avc:  denied  { unlink } for  pid=5396 comm="leapp3" name="listener-vqmmvuyi" dev="vda2" ino=23069288 scon
text=system_u:system_r:init_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=sock_file permissive=1
/var/log/audit/audit.log.3:type=AVC msg=audit(1572975222.967:129): avc:  denied  { write } for  pid=5457 comm="leapp3" name="listener-f4cg6rt0" dev="vda2" ino=27481346 scont
ext=system_u:system_r:init_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=sock_file permissive=1
/var/log/audit/audit.log.3:type=AVC msg=audit(1572975222.993:130): avc:  denied  { create } for  pid=7444 comm="leapp3" name="listener-kqzex19u" scontext=system_u:system_r:i
nit_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=sock_file permissive=1
/var/log/audit/audit.log.3:type=AVC msg=audit(1572975223.013:131): avc:  denied  { unlink } for  pid=5432 comm="leapp3" name="listener-f4cg6rt0" dev="vda2" ino=27481346 scon
text=system_u:system_r:init_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=sock_file permissive=1
/var/log/audit/audit.log.3:type=AVC msg=audit(1572975223.252:132): avc:  denied  { create } for  pid=3400 comm="leapp3" name="leapp-report.json" scontext=system_u:system_r:i
nit_t:s0 tcontext=system_u:object_r:var_log_t:s0 tclass=file permissive=1
  

Version-Release number of selected component (if applicable):


How reproducible:


Steps to Reproduce:
1.
2.
3.

Actual results:


Expected results:


Additional info: