Note: This bug is displayed in read-only format because
the product is no longer active in Red Hat Bugzilla.
RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.
Description of problem: AVC denials seen in quickinstall job for ipa-server installation Version-Release number of selected component (if applicable): selinux-policy-3.13.1-242.el7.noarch How reproducible: Always Steps to Reproduce: 1. Run Quickinstall job for IPA-server installation Actual results: Info: Searching AVC errors produced since 1554195565.38 (Tue Apr 2 04:59:25 2019) Searching logs... Running '/usr/bin/env LC_ALL=en_US.UTF-8 /sbin/ausearch -m AVC -m USER_AVC -m SELINUX_ERR -ts 04/02/2019 04:59:25 < /dev/null >/mnt/testarea/tmp.rhts-db-submit-result.hz8Vqz 2>&1' ---- time->Tue Apr 2 05:00:38 2019 type=USER_AVC msg=audit(1554195638.224:274): pid=692 uid=81 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc: received policyload notice (seqno=2) exe="/usr/bin/dbus-daemon" sauid=81 hostname=? addr=? terminal=?' ---- time->Tue Apr 2 05:00:39 2019 type=USER_AVC msg=audit(1554195639.374:276): pid=692 uid=81 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc: received policyload notice (seqno=3) exe="/usr/bin/dbus-daemon" sauid=81 hostname=? addr=? terminal=?' ---- time->Tue Apr 2 05:00:39 2019 type=USER_AVC msg=audit(1554195639.488:277): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='avc: received policyload notice (seqno=2) exe="/usr/lib/systemd/systemd" sauid=0 hostname=? addr=? terminal=?' ---- time->Tue Apr 2 05:00:39 2019 type=USER_AVC msg=audit(1554195639.488:278): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='avc: received policyload notice (seqno=3) exe="/usr/lib/systemd/systemd" sauid=0 hostname=? addr=? terminal=?' ---- time->Tue Apr 2 05:04:00 2019 type=PROCTITLE msg=audit(1554195840.845:433): proctitle=2F7573722F6C6962657865632F636572746D6F6E6765722F646F677461672D7375626D6974002D2D636166696C65002F7661722F6C69622F6970612F746D706632325F4630002D2D65652D75726C00687474703A2F2F6175746F2D68762D30312D677565737430362E7465737472656C6D2E746573743A383038302F63612F65 type=PATH msg=audit(1554195840.845:433): item=0 name="/etc/pki/nssdb/cert9.db" inode=67615560 dev=fd:00 mode=0100644 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:cert_t:s0 objtype=NORMAL cap_fp=0000000000000000 cap_fi=0000000000000000 cap_fe=0 cap_fver=0 type=CWD msg=audit(1554195840.845:433): cwd="/" type=SYSCALL msg=audit(1554195840.845:433): arch=c000003e syscall=137 success=no exit=-13 a0=5651a59a2758 a1=7ffd66f797f0 a2=0 a3=7f74e74457b8 items=1 ppid=18713 pid=18989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dogtag-submit" exe="/usr/libexec/certmonger/dogtag-submit" subj=system_u:system_r:certmonger_t:s0 key=(null) type=AVC msg=audit(1554195840.845:433): avc: denied { getattr } for pid=18989 comm="dogtag-submit" name="/" dev="dm-0" ino=64 scontext=system_u:system_r:certmonger_t:s0 tcontext=system_u:object_r:fs_t:s0 tclass=filesystem permissive=0 ---- time->Tue Apr 2 05:04:00 2019 type=PROCTITLE msg=audit(1554195840.926:434): proctitle=2F7573722F6C6962657865632F636572746D6F6E6765722F646F677461672D7375626D6974002D2D636166696C65002F7661722F6C69622F6970612F746D706632325F4630002D2D65652D75726C00687474703A2F2F6175746F2D68762D30312D677565737430362E7465737472656C6D2E746573743A383038302F63612F65 type=PATH msg=audit(1554195840.926:434): item=0 name="/etc/pki/nssdb/key4.db" inode=67615562 dev=fd:00 mode=0100644 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:cert_t:s0 objtype=NORMAL cap_fp=0000000000000000 cap_fi=0000000000000000 cap_fe=0 cap_fver=0 type=CWD msg=audit(1554195840.926:434): cwd="/" type=SYSCALL msg=audit(1554195840.926:434): arch=c000003e syscall=137 success=no exit=-13 a0=5651a5982f38 a1=7ffd66f797f0 a2=0 a3=0 items=1 ppid=18713 pid=18989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dogtag-submit" exe="/usr/libexec/certmonger/dogtag-submit" subj=system_u:system_r:certmonger_t:s0 key=(null) type=AVC msg=audit(1554195840.926:434): avc: denied { getattr } for pid=18989 comm="dogtag-submit" name="/" dev="dm-0" ino=64 scontext=system_u:system_r:certmonger_t:s0 tcontext=system_u:object_r:fs_t:s0 tclass=filesystem permissive=0 ---- time->Tue Apr 2 05:05:18 2019 type=PROCTITLE msg=audit(1554195918.202:440): proctitle=2F7573722F6C6962657865632F636572746D6F6E6765722F646F677461672D7375626D6974002D2D65652D75726C0068747470733A2F2F6175746F2D68762D30312D677565737430362E7465737472656C6D2E746573743A383434332F63612F65652F6361002D2D6365727466696C65002F7661722F6C69622F6970612F7261 type=PATH msg=audit(1554195918.202:440): item=0 name="/etc/pki/nssdb/cert9.db" inode=67615560 dev=fd:00 mode=0100644 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:cert_t:s0 objtype=NORMAL cap_fp=0000000000000000 cap_fi=0000000000000000 cap_fe=0 cap_fver=0 type=CWD msg=audit(1554195918.202:440): cwd="/" type=SYSCALL msg=audit(1554195918.202:440): arch=c000003e syscall=137 success=no exit=-13 a0=55a91462bc38 a1=7ffd07cf4fd0 a2=0 a3=7f22191d37b8 items=1 ppid=18713 pid=20275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dogtag-submit" exe="/usr/libexec/certmonger/dogtag-submit" subj=system_u:system_r:certmonger_t:s0 key=(null) type=AVC msg=audit(1554195918.202:440): avc: denied { getattr } for pid=20275 comm="dogtag-submit" name="/" dev="dm-0" ino=64 scontext=system_u:system_r:certmonger_t:s0 tcontext=system_u:object_r:fs_t:s0 tclass=filesystem permissive=0 ---- time->Tue Apr 2 05:05:18 2019 type=PROCTITLE msg=audit(1554195918.203:441): proctitle=2F7573722F6C6962657865632F636572746D6F6E6765722F646F677461672D7375626D6974002D2D65652D75726C0068747470733A2F2F6175746F2D68762D30312D677565737430362E7465737472656C6D2E746573743A383434332F63612F65652F6361002D2D6365727466696C65002F7661722F6C69622F6970612F7261 type=PATH msg=audit(1554195918.203:441): item=0 name="/etc/pki/nssdb/key4.db" inode=67615562 dev=fd:00 mode=0100644 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:cert_t:s0 objtype=NORMAL cap_fp=0000000000000000 cap_fi=0000000000000000 cap_fe=0 cap_fver=0 type=CWD msg=audit(1554195918.203:441): cwd="/" type=SYSCALL msg=audit(1554195918.203:441): arch=c000003e syscall=137 success=no exit=-13 a0=55a91464b668 a1=7ffd07cf4fd0 a2=0 a3=0 items=1 ppid=18713 pid=20275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dogtag-submit" exe="/usr/libexec/certmonger/dogtag-submit" subj=system_u:system_r:certmonger_t:s0 key=(null) type=AVC msg=audit(1554195918.203:441): avc: denied { getattr } for pid=20275 comm="dogtag-submit" name="/" dev="dm-0" ino=64 scontext=system_u:system_r:certmonger_t:s0 tcontext=system_u:object_r:fs_t:s0 tclass=filesystem permissive=0 ---- time->Tue Apr 2 05:05:18 2019 type=PROCTITLE msg=audit(1554195918.631:442): proctitle=2F7573722F6C6962657865632F636572746D6F6E6765722F646F677461672D7375626D6974002D2D65652D75726C0068747470733A2F2F6175746F2D68762D30312D677565737430362E7465737472656C6D2E746573743A383434332F63612F65652F6361002D2D6365727466696C65002F7661722F6C69622F6970612F7261 type=PATH msg=audit(1554195918.631:442): item=0 name="/etc/pki/nssdb/cert9.db" inode=67615560 dev=fd:00 mode=0100644 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:cert_t:s0 objtype=NORMAL cap_fp=0000000000000000 cap_fi=0000000000000000 cap_fe=0 cap_fver=0 type=CWD msg=audit(1554195918.631:442): cwd="/" type=SYSCALL msg=audit(1554195918.631:442): arch=c000003e syscall=137 success=no exit=-13 a0=5561edb196e8 a1=7ffd9b67a530 a2=0 a3=7fa3359967b8 items=1 ppid=18713 pid=20295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dogtag-submit" exe="/usr/libexec/certmonger/dogtag-submit" subj=system_u:system_r:certmonger_t:s0 key=(null) type=AVC msg=audit(1554195918.631:442): avc: denied { getattr } for pid=20295 comm="dogtag-submit" name="/" dev="dm-0" ino=64 scontext=system_u:system_r:certmonger_t:s0 tcontext=system_u:object_r:fs_t:s0 tclass=filesystem permissive=0 ---- time->Tue Apr 2 05:05:18 2019 type=PROCTITLE msg=audit(1554195918.631:443): proctitle=2F7573722F6C6962657865632F636572746D6F6E6765722F646F677461672D7375626D6974002D2D65652D75726C0068747470733A2F2F6175746F2D68762D30312D677565737430362E7465737472656C6D2E746573743A383434332F63612F65652F6361002D2D6365727466696C65002F7661722F6C69622F6970612F7261 type=PATH msg=audit(1554195918.631:443): item=0 name="/etc/pki/nssdb/key4.db" inode=67615562 dev=fd:00 mode=0100644 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:cert_t:s0 objtype=NORMAL cap_fp=0000000000000000 cap_fi=0000000000000000 cap_fe=0 cap_fver=0 type=CWD msg=audit(1554195918.631:443): cwd="/" type=SYSCALL msg=audit(1554195918.631:443): arch=c000003e syscall=137 success=no exit=-13 a0=5561edb3e158 a1=7ffd9b67a530 a2=0 a3=0 items=1 ppid=18713 pid=20295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dogtag-submit" exe="/usr/libexec/certmonger/dogtag-submit" subj=system_u:system_r:certmonger_t:s0 key=(null) type=AVC msg=audit(1554195918.631:443): avc: denied { getattr } for pid=20295 comm="dogtag-submit" name="/" dev="dm-0" ino=64 scontext=system_u:system_r:certmonger_t:s0 tcontext=system_u:object_r:fs_t:s0 tclass=filesystem permissive=0 ---- time->Tue Apr 2 05:05:58 2019 type=PROCTITLE msg=audit(1554195958.174:458): proctitle=2F7573722F6C6962657865632F636572746D6F6E6765722F646F677461672D7375626D6974002D2D65652D75726C0068747470733A2F2F6175746F2D68762D30312D677565737430362E7465737472656C6D2E746573743A383434332F63612F65652F6361002D2D6365727466696C65002F7661722F6C69622F6970612F7261 type=PATH msg=audit(1554195958.174:458): item=0 name="/etc/pki/nssdb/cert9.db" inode=67615560 dev=fd:00 mode=0100644 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:cert_t:s0 objtype=NORMAL cap_fp=0000000000000000 cap_fi=0000000000000000 cap_fe=0 cap_fver=0 type=CWD msg=audit(1554195958.174:458): cwd="/" type=SYSCALL msg=audit(1554195958.174:458): arch=c000003e syscall=137 success=no exit=-13 a0=5622e52ddc38 a1=7ffd94405ec0 a2=0 a3=7f32d6c427b8 items=1 ppid=18713 pid=21137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dogtag-submit" exe="/usr/libexec/certmonger/dogtag-submit" subj=system_u:system_r:certmonger_t:s0 key=(null) type=AVC msg=audit(1554195958.174:458): avc: denied { getattr } for pid=21137 comm="dogtag-submit" name="/" dev="dm-0" ino=64 scontext=system_u:system_r:certmonger_t:s0 tcontext=system_u:object_r:fs_t:s0 tclass=filesystem permissive=0 ---- time->Tue Apr 2 05:05:58 2019 type=PROCTITLE msg=audit(1554195958.174:459): proctitle=2F7573722F6C6962657865632F636572746D6F6E6765722F646F677461672D7375626D6974002D2D65652D75726C0068747470733A2F2F6175746F2D68762D30312D677565737430362E7465737472656C6D2E746573743A383434332F63612F65652F6361002D2D6365727466696C65002F7661722F6C69622F6970612F7261 type=PATH msg=audit(1554195958.174:459): item=0 name="/etc/pki/nssdb/key4.db" inode=67615562 dev=fd:00 mode=0100644 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:cert_t:s0 objtype=NORMAL cap_fp=0000000000000000 cap_fi=0000000000000000 cap_fe=0 cap_fver=0 type=CWD msg=audit(1554195958.174:459): cwd="/" type=SYSCALL msg=audit(1554195958.174:459): arch=c000003e syscall=137 success=no exit=-13 a0=5622e52fd668 a1=7ffd94405ec0 a2=0 a3=0 items=1 ppid=18713 pid=21137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dogtag-submit" exe="/usr/libexec/certmonger/dogtag-submit" subj=system_u:system_r:certmonger_t:s0 key=(null) type=AVC msg=audit(1554195958.174:459): avc: denied { getattr } for pid=21137 comm="dogtag-submit" name="/" dev="dm-0" ino=64 scontext=system_u:system_r:certmonger_t:s0 tcontext=system_u:object_r:fs_t:s0 tclass=filesystem permissive=0 ---- time->Tue Apr 2 05:05:58 2019 type=PROCTITLE msg=audit(1554195958.645:460): proctitle=2F7573722F6C6962657865632F636572746D6F6E6765722F646F677461672D7375626D6974002D2D65652D75726C0068747470733A2F2F6175746F2D68762D30312D677565737430362E7465737472656C6D2E746573743A383434332F63612F65652F6361002D2D6365727466696C65002F7661722F6C69622F6970612F7261 type=PATH msg=audit(1554195958.645:460): item=0 name="/etc/pki/nssdb/cert9.db" inode=67615560 dev=fd:00 mode=0100644 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:cert_t:s0 objtype=NORMAL cap_fp=0000000000000000 cap_fi=0000000000000000 cap_fe=0 cap_fver=0 type=CWD msg=audit(1554195958.645:460): cwd="/" type=SYSCALL msg=audit(1554195958.645:460): arch=c000003e syscall=137 success=no exit=-13 a0=55add6b596e8 a1=7ffe6b02aba0 a2=0 a3=7f300aa2f7b8 items=1 ppid=18713 pid=21161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dogtag-submit" exe="/usr/libexec/certmonger/dogtag-submit" subj=system_u:system_r:certmonger_t:s0 key=(null) type=AVC msg=audit(1554195958.645:460): avc: denied { getattr } for pid=21161 comm="dogtag-submit" name="/" dev="dm-0" ino=64 scontext=system_u:system_r:certmonger_t:s0 tcontext=system_u:object_r:fs_t:s0 tclass=filesystem permissive=0 ---- time->Tue Apr 2 05:05:58 2019 type=PROCTITLE msg=audit(1554195958.646:461): proctitle=2F7573722F6C6962657865632F636572746D6F6E6765722F646F677461672D7375626D6974002D2D65652D75726C0068747470733A2F2F6175746F2D68762D30312D677565737430362E7465737472656C6D2E746573743A383434332F63612F65652F6361002D2D6365727466696C65002F7661722F6C69622F6970612F7261 type=PATH msg=audit(1554195958.646:461): item=0 name="/etc/pki/nssdb/key4.db" inode=67615562 dev=fd:00 mode=0100644 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:cert_t:s0 objtype=NORMAL cap_fp=0000000000000000 cap_fi=0000000000000000 cap_fe=0 cap_fver=0 type=CWD msg=audit(1554195958.646:461): cwd="/" type=SYSCALL msg=audit(1554195958.646:461): arch=c000003e syscall=137 success=no exit=-13 a0=55add6b7e0a8 a1=7ffe6b02aba0 a2=0 a3=0 items=1 ppid=18713 pid=21161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dogtag-submit" exe="/usr/libexec/certmonger/dogtag-submit" subj=system_u:system_r:certmonger_t:s0 key=(null) type=AVC msg=audit(1554195958.646:461): avc: denied { getattr } for pid=21161 comm="dogtag-submit" name="/" dev="dm-0" ino=64 scontext=system_u:system_r:certmonger_t:s0 tcontext=system_u:object_r:fs_t:s0 tclass=filesystem permissive=0 ---- time->Tue Apr 2 05:06:06 2019 type=USER_AVC msg=audit(1554195966.777:463): pid=692 uid=81 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc: received policyload notice (seqno=4) exe="/usr/bin/dbus-daemon" sauid=81 hostname=? addr=? terminal=?' ---- time->Tue Apr 2 05:06:07 2019 type=USER_AVC msg=audit(1554195967.923:464): pid=692 uid=81 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc: received policyload notice (seqno=5) exe="/usr/bin/dbus-daemon" sauid=81 hostname=? addr=? terminal=?' ---- time->Tue Apr 2 05:06:08 2019 type=USER_AVC msg=audit(1554195968.036:466): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='avc: received policyload notice (seqno=4) exe="/usr/lib/systemd/systemd" sauid=0 hostname=? addr=? terminal=?' ---- time->Tue Apr 2 05:06:08 2019 type=USER_AVC msg=audit(1554195968.036:467): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='avc: received policyload notice (seqno=5) exe="/usr/lib/systemd/systemd" sauid=0 hostname=? addr=? terminal=?' ---- time->Tue Apr 2 05:06:11 2019 type=PROCTITLE msg=audit(1554195971.650:470): proctitle=2F7573722F6C6962657865632F636572746D6F6E6765722F646F677461672D7375626D6974002D2D65652D75726C0068747470733A2F2F6175746F2D68762D30312D677565737430362E7465737472656C6D2E746573743A383434332F63612F65652F6361002D2D6365727466696C65002F7661722F6C69622F6970612F7261 type=PATH msg=audit(1554195971.650:470): item=0 name="/etc/pki/nssdb/cert9.db" inode=67615560 dev=fd:00 mode=0100644 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:cert_t:s0 objtype=NORMAL cap_fp=0000000000000000 cap_fi=0000000000000000 cap_fe=0 cap_fver=0 type=CWD msg=audit(1554195971.650:470): cwd="/" type=SYSCALL msg=audit(1554195971.650:470): arch=c000003e syscall=137 success=no exit=-13 a0=55640a2bb068 a1=7ffce882cb40 a2=0 a3=7f58797557b8 items=1 ppid=18713 pid=21434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dogtag-submit" exe="/usr/libexec/certmonger/dogtag-submit" subj=system_u:system_r:certmonger_t:s0 key=(null) type=AVC msg=audit(1554195971.650:470): avc: denied { getattr } for pid=21434 comm="dogtag-submit" name="/" dev="dm-0" ino=64 scontext=system_u:system_r:certmonger_t:s0 tcontext=system_u:object_r:fs_t:s0 tclass=filesystem permissive=0 ---- time->Tue Apr 2 05:06:11 2019 type=PROCTITLE msg=audit(1554195971.650:471): proctitle=2F7573722F6C6962657865632F636572746D6F6E6765722F646F677461672D7375626D6974002D2D65652D75726C0068747470733A2F2F6175746F2D68762D30312D677565737430362E7465737472656C6D2E746573743A383434332F63612F65652F6361002D2D6365727466696C65002F7661722F6C69622F6970612F7261 type=PATH msg=audit(1554195971.650:471): item=0 name="/etc/pki/nssdb/key4.db" inode=67615562 dev=fd:00 mode=0100644 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:cert_t:s0 objtype=NORMAL cap_fp=0000000000000000 cap_fi=0000000000000000 cap_fe=0 cap_fver=0 type=CWD msg=audit(1554195971.650:471): cwd="/" type=SYSCALL msg=audit(1554195971.650:471): arch=c000003e syscall=137 success=no exit=-13 a0=55640a2da678 a1=7ffce882cb40 a2=0 a3=0 items=1 ppid=18713 pid=21434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dogtag-submit" exe="/usr/libexec/certmonger/dogtag-submit" subj=system_u:system_r:certmonger_t:s0 key=(null) type=AVC msg=audit(1554195971.650:471): avc: denied { getattr } for pid=21434 comm="dogtag-submit" name="/" dev="dm-0" ino=64 scontext=system_u:system_r:certmonger_t:s0 tcontext=system_u:object_r:fs_t:s0 tclass=filesystem permissive=0 ---- time->Tue Apr 2 05:06:13 2019 type=PROCTITLE msg=audit(1554195973.170:472): proctitle=2F7573722F6C6962657865632F636572746D6F6E6765722F646F677461672D7375626D6974002D2D65652D75726C0068747470733A2F2F6175746F2D68762D30312D677565737430362E7465737472656C6D2E746573743A383434332F63612F65652F6361002D2D6365727466696C65002F7661722F6C69622F6970612F7261 type=PATH msg=audit(1554195973.170:472): item=0 name="/etc/pki/nssdb/cert9.db" inode=67615560 dev=fd:00 mode=0100644 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:cert_t:s0 objtype=NORMAL cap_fp=0000000000000000 cap_fi=0000000000000000 cap_fe=0 cap_fver=0 type=CWD msg=audit(1554195973.170:472): cwd="/" type=SYSCALL msg=audit(1554195973.170:472): arch=c000003e syscall=137 success=no exit=-13 a0=563dd21dd4a8 a1=7ffc83c19750 a2=0 a3=7f835c6717b8 items=1 ppid=18713 pid=21463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dogtag-submit" exe="/usr/libexec/certmonger/dogtag-submit" subj=system_u:system_r:certmonger_t:s0 key=(null) type=AVC msg=audit(1554195973.170:472): avc: denied { getattr } for pid=21463 comm="dogtag-submit" name="/" dev="dm-0" ino=64 scontext=system_u:system_r:certmonger_t:s0 tcontext=system_u:object_r:fs_t:s0 tclass=filesystem permissive=0 ---- time->Tue Apr 2 05:06:13 2019 type=PROCTITLE msg=audit(1554195973.171:473): proctitle=2F7573722F6C6962657865632F636572746D6F6E6765722F646F677461672D7375626D6974002D2D65652D75726C0068747470733A2F2F6175746F2D68762D30312D677565737430362E7465737472656C6D2E746573743A383434332F63612F65652F6361002D2D6365727466696C65002F7661722F6C69622F6970612F7261 type=PATH msg=audit(1554195973.171:473): item=0 name="/etc/pki/nssdb/key4.db" inode=67615562 dev=fd:00 mode=0100644 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:cert_t:s0 objtype=NORMAL cap_fp=0000000000000000 cap_fi=0000000000000000 cap_fe=0 cap_fver=0 type=CWD msg=audit(1554195973.171:473): cwd="/" type=SYSCALL msg=audit(1554195973.171:473): arch=c000003e syscall=137 success=no exit=-13 a0=563dd21dd4d8 a1=7ffc83c19750 a2=0 a3=0 items=1 ppid=18713 pid=21463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dogtag-submit" exe="/usr/libexec/certmonger/dogtag-submit" subj=system_u:system_r:certmonger_t:s0 key=(null) type=AVC msg=audit(1554195973.171:473): avc: denied { getattr } for pid=21463 comm="dogtag-submit" name="/" dev="dm-0" ino=64 scontext=system_u:system_r:certmonger_t:s0 tcontext=system_u:object_r:fs_t:s0 tclass=filesystem permissive=0 Fail: AVC messages found. Checking for errors... Using stronger AVC checks. Define empty RHTS_OPTION_STRONGER_AVC parameter if this causes any problems. Running 'cat /mnt/testarea/tmp.rhts-db-submit-result.hz8Vqz | /sbin/ausearch -m AVC -m SELINUX_ERR' Fail: AVC messages found. Running 'cat %s | /sbin/ausearch -m USER_AVC >/mnt/testarea/tmp.rhts-db-submit-result.xd6RQu 2>&1' Info: No AVC messages found. /bin/grep 'avc: ' /mnt/testarea/dmesg.log | /bin/grep --invert-match TESTOUT.log No AVC messages found in dmesg Running '/usr/sbin/sestatus' SELinux status: enabled SELinuxfs mount: /sys/fs/selinux SELinux root directory: /etc/selinux Loaded policy name: targeted Current mode: enforcing Mode from config file: enforcing Policy MLS status: enabled Policy deny_unknown status: allowed Max kernel policy version: 31 Running 'rpm -q selinux-policy || true' selinux-policy-3.13.1-242.el7.noarch Expected results: AVC denials should not be observed