Description of problem: Running the upgrade with selinux enforcing fails if the upgrade run steps gets executed twice. The failure task is: TASK [Make sure Mysql upgrade temporary directory exists] ********************** Wednesday 06 November 2019 09:23:23 -0500 (0:00:00.078) 0:02:59.421 **** changed: [lab-controller01] => {"changed": true, "gid": 0, "group": "root", "mode": "0700", "owner": "root", "path": "/tmp/mariadb-upgrade", "secontext": "unconfined_u:object_r:user_tmp_t:s0", "size": 25, "state": "directory", "uid": 0} TASK [Upgrade Mysql database from a temporary container] *********************** Wednesday 06 November 2019 09:23:23 -0500 (0:00:00.353) 0:02:59.775 **** fatal: [lab-controller01]: FAILED! => {"changed": true, "cmd": "podman run --rm --log-driver=k8s-file -u root --net=host -e \"KOLLA_CONFIG_STRATEGY=COPY_ALWAYS\" -v /etc/hosts:/etc/hosts:ro -v /etc/localtime:/etc/localtime:ro -v /etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro -v /etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro -v /etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro -v /etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro -v /etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro -v /dev/log:/dev/log -v /etc/ssh/ssh_known_hosts:/etc/ssh/ssh_known_hosts:ro -v /etc/puppet:/etc/puppet:ro -v /var/lib/kolla/config_files/mysql.json:/var/lib/kolla/config_files/config.json -v /var/lib/config-data/puppet-generated/mysql/:/var/lib/kolla/config_files/src:ro -v /var/lib/mysql:/var/lib/mysql -v /tmp/mariadb-upgrade:/var/log/mariadb:rw \"172.16.0.1:8787/rhosp15-rhel8/openstack-mariadb:pcmklatest\" /bin/bash -ecx \"kolla_set_configs; if mysqladmin ping --silent; then exit 0; fi; chown -R mysql:mysql /var/lib/mysql; chown -R mysql:mysql /var/log/mariadb; mysqld_safe --user=mysql --wsrep-provider=none --skip-networking --wsrep-on=off & timeout 60 sh -c 'while ! mysqladmin ping --silent; do sleep 1; done'; mysql_upgrade; mysqladmin shutdown\"", "delta": "0:00:00.639782", "end": "2019-11-06 14:23:24.436537", "msg": "non-zero return code", "rc": 1, "start": "2019-11-06 14:23:23.796755", "stderr": "+ kolla_set_configs\nINFO:__main__:Loading config file at /var/lib/kolla/config_files/config.json\nINFO:__main__:Validating config file\nINFO:__main__:Kolla config strategy set to: COPY_ALWAYS\nINFO:__main__:Copying service configuration files\nINFO:__main__:Copying /dev/null to /etc/libqb/force-filesystem-sockets\nINFO:__main__:Setting permission for /etc/libqb/force-filesystem-sockets\nINFO:__main__:Deleting /etc/my.cnf.d/galera.cnf\nINFO:__main__:Copying /var/lib/kolla/config_files/src/etc/my.cnf.d/galera.cnf to /etc/my.cnf.d/galera.cnf\nINFO:__main__:Copying /var/lib/kolla/config_files/src/etc/sysconfig/clustercheck to /etc/sysconfig/clustercheck\nINFO:__main__:Copying /var/lib/kolla/config_files/src/root/.my.cnf to /root/.my.cnf\nINFO:__main__:Writing out command to execute\n+ mysqladmin ping --silent\n+ chown -R mysql:mysql /var/lib/mysql\n+ chown -R mysql:mysql /var/log/mariadb\nchown: cannot read directory '/var/log/mariadb': Permission denied", "stderr_lines": ["+ kolla_set_configs", "INFO:__main__:Loading config file at /var/lib/kolla/config_files/config.json", "INFO:__main__:Validating config file", "INFO:__main__:Kolla config strategy set to: COPY_ALWAYS", "INFO:__main__:Copying service configuration files", "INFO:__main__:Copying /dev/null to /etc/libqb/force-filesystem-sockets", "INFO:__main__:Setting permission for /etc/libqb/force-filesystem-sockets", "INFO:__main__:Deleting /etc/my.cnf.d/galera.cnf", "INFO:__main__:Copying /var/lib/kolla/config_files/src/etc/my.cnf.d/galera.cnf to /etc/my.cnf.d/galera.cnf", "INFO:__main__:Copying /var/lib/kolla/config_files/src/etc/sysconfig/clustercheck to /etc/sysconfig/clustercheck", "INFO:__main__:Copying /var/lib/kolla/config_files/src/root/.my.cnf to /root/.my.cnf", "INFO:__main__:Writing out command to execute", "+ mysqladmin ping --silent", "+ chown -R mysql:mysql /var/lib/mysql", "+ chown -R mysql:mysql /var/log/mariadb", "chown: cannot read directory '/var/log/mariadb': Permission denied"], "stdout": "", "stdout_lines": []} NO MORE HOSTS LEFT ************************************************************* PLAY RECAP ********************************************************************* lab-controller01 : ok=140 changed=45 unreachable=0 failed=1 skipped=256 rescued=0 ignored=1 Wednesday 06 November 2019 09:23:24 -0500 (0:00:00.931) 0:03:00.706 **** =============================================================================== First execution did run fine and created the /tmp/mariadb-upgrade with the mariadb.log on it: [root@lab-controller01 ~]# ls -l /tmp/mariadb-upgrade total 8 -rw-rw----. 1 42434 42434 5833 Nov 6 13:22 mariadb.log But if trying to re-lunch the container, the root user does not haver permissions to access the /var/log/mariadb directory: [root@lab-controller01 ~]# podman run --rm --net=host -u root -it -v /tmp/mariadb-upgrade:/var/log/mariadb:rw 172.16.0.1:8787/rhosp15-rhel8/openstack-mariadb:pcmklatest sh sh: cannot set terminal process group (-1): Inappropriate ioctl for device sh: no job control in this shell ()[root@lab-controller01 /]$ chown -R mysql:mysql /var/log/mariadb/ chown: cannot read directory '/var/log/mariadb/': Permission denied Setting the slinux to permissive fixes the issue: [root@lab-controller01 ~]# getenforce Enforcing [root@lab-controller01 ~]# setenforce 0 [root@lab-controller01 ~]# podman run --rm --net=host -u root -it -v /tmp/mariadb-upgrade:/var/log/mariadb:rw 172.16.0.1:8787/rhosp15-rhel8/openstack-mariadb:pcmklatest sh sh: cannot set terminal process group (-1): Inappropriate ioctl for device sh: no job control in this shell ()[root@lab-controller01 /]$ ls -l /var/log/mariadb/ total 8 -rw-rw----. 1 mysql mysql 5833 Nov 6 13:22 mariadb.log audit.log denied logs: [root@lab-controller01 ~]# grep -ir denied /var/log/audit/audit.log* /var/log/audit/audit.log.1:type=AVC msg=audit(1573046561.569:61697): avc: denied { read } for pid=174403 comm="python" name="mysql.json" dev="vda2" ino=203423842 scontext =system_u:system_r:container_t:s0:c403,c774 tcontext=system_u:object_r:var_lib_t:s0 tclass=file permissive=1 /var/log/audit/audit.log.1:type=AVC msg=audit(1573046561.569:61697): avc: denied { open } for pid=174403 comm="python" path="/var/lib/kolla/config_files/config.json" dev= "vda2" ino=203423842 scontext=system_u:system_r:container_t:s0:c403,c774 tcontext=system_u:object_r:var_lib_t:s0 tclass=file permissive=1 /var/log/audit/audit.log.1:type=AVC msg=audit(1573046561.569:61698): avc: denied { ioctl } for pid=174403 comm="python" path="/var/lib/kolla/config_files/config.json" dev ="vda2" ino=203423842 ioctlcmd=0x5401 scontext=system_u:system_r:container_t:s0:c403,c774 tcontext=system_u:object_r:var_lib_t:s0 tclass=file permissive=1 /var/log/audit/audit.log.1:type=AVC msg=audit(1573046561.590:61699): avc: denied { read } for pid=174405 comm="chown" name="mysql" dev="vda2" ino=184632756 scontext=syste m_u:system_r:container_t:s0:c403,c774 tcontext=system_u:object_r:mysqld_db_t:s0 tclass=dir permissive=1 /var/log/audit/audit.log.1:type=AVC msg=audit(1573046561.590:61700): avc: denied { setattr } for pid=174405 comm="chown" name="db.frm" dev="vda2" ino=186739210 scontext=s ystem_u:system_r:container_t:s0:c403,c774 tcontext=unconfined_u:object_r:var_lib_t:s0 tclass=file permissive=1 /var/log/audit/audit.log.1:type=AVC msg=audit(1573046561.590:61701): avc: denied { setattr } for pid=174405 comm="chown" name="mysql" dev="vda2" ino=186739209 scontext=sy stem_u:system_r:container_t:s0:c403,c774 tcontext=unconfined_u:object_r:var_lib_t:s0 tclass=dir permissive=1 /var/log/audit/audit.log.1:type=AVC msg=audit(1573046561.598:61702): avc: denied { setattr } for pid=174405 comm="chown" name="mysql" dev="vda2" ino=184632756 scontext=sy stem_u:system_r:container_t:s0:c403,c774 tcontext=system_u:object_r:mysqld_db_t:s0 tclass=dir permissive=1 /var/log/audit/audit.log.1:type=AVC msg=audit(1573046561.600:61703): avc: denied { setattr } for pid=174406 comm="chown" name="mariadb-upgrade" dev="vda2" ino=205833003 s context=system_u:system_r:container_t:s0:c403,c774 tcontext=unconfined_u:object_r:user_tmp_t:s0 tclass=dir permissive=1 /var/log/audit/audit.log.1:type=AVC msg=audit(1573046561.969:61704): avc: denied { write } for pid=174659 comm="mysqld" name="mysql" dev="vda2" ino=184632756 scontext=sys tem_u:system_r:container_t:s0:c403,c774 tcontext=system_u:object_r:mysqld_db_t:s0 tclass=dir permissive=1 /var/log/audit/audit.log.1:type=AVC msg=audit(1573046561.969:61704): avc: denied { add_name } for pid=174659 comm="mysqld" name="lab-controller01.lower-test" scontext=sys tem_u:system_r:container_t:s0:c403,c774 tcontext=system_u:object_r:mysqld_db_t:s0 tclass=dir permissive=1 /var/log/audit/audit.log.1:type=AVC msg=audit(1573046561.969:61704): avc: denied { create } for pid=174659 comm="mysqld" name="lab-controller01.lower-test" scontext=syste m_u:system_r:container_t:s0:c403,c774 tcontext=system_u:object_r:mysqld_db_t:s0 tclass=file permissive=1 /var/log/audit/audit.log.1:type=AVC msg=audit(1573046561.969:61704): avc: denied { read write open } for pid=174659 comm="mysqld" path="/var/lib/mysql/lab-controller01.lo wer-test" dev="vda2" ino=185309968 scontext=system_u:system_r:container_t:s0:c403,c774 tcontext=system_u:object_r:mysqld_db_t:s0 tclass=file permissive=1 /var/log/audit/audit.log.1:type=AVC msg=audit(1573046561.969:61705): avc: denied { remove_name } for pid=174659 comm="mysqld" name="lab-controller01.lower-test" dev="vda2 " ino=185309968 scontext=system_u:system_r:container_t:s0:c403,c774 tcontext=system_u:object_r:mysqld_db_t:s0 tclass=dir permissive=1 /var/log/audit/audit.log.1:type=AVC msg=audit(1573046561.969:61705): avc: denied { unlink } for pid=174659 comm="mysqld" name="lab-controller01.lower-test" dev="vda2" ino =185309968 scontext=system_u:system_r:container_t:s0:c403,c774 tcontext=system_u:object_r:mysqld_db_t:s0 tclass=file permissive=1 /var/log/audit/audit.log.1:type=AVC msg=audit(1573046561.970:61706): avc: denied { write } for pid=174659 comm="mysqld" name="mariadb-upgrade" dev="vda2" ino=205833003 sc ontext=system_u:system_r:container_t:s0:c403,c774 tcontext=unconfined_u:object_r:user_tmp_t:s0 tclass=dir permissive=1 /var/log/audit/audit.log.1:type=AVC msg=audit(1573046561.970:61706): avc: denied { add_name } for pid=174659 comm="mysqld" name="mariadb.log" scontext=system_u:system_r:c ontainer_t:s0:c403,c774 tcontext=unconfined_u:object_r:user_tmp_t:s0 tclass=dir permissive=1 /var/log/audit/audit.log.1:type=AVC msg=audit(1573046561.970:61706): avc: denied { create } for pid=174659 comm="mysqld" name="mariadb.log" scontext=system_u:system_r:con tainer_t:s0:c403,c774 tcontext=system_u:object_r:user_tmp_t:s0 tclass=file permissive=1 /var/log/audit/audit.log.1:type=AVC msg=audit(1573046561.972:61707): avc: denied { read } for pid=174659 comm="mysqld" name="plugin.frm" dev="vda2" ino=186739241 scontext =system_u:system_r:container_t:s0:c403,c774 tcontext=unconfined_u:object_r:var_lib_t:s0 tclass=file permissive=1 /var/log/audit/audit.log.1:type=AVC msg=audit(1573046561.972:61707): avc: denied { open } for pid=174659 comm="mysqld" path="/var/lib/mysql/mysql/plugin.frm" dev="vda2" i no=186739241 scontext=system_u:system_r:container_t:s0:c403,c774 tcontext=unconfined_u:object_r:var_lib_t:s0 tclass=file permissive=1 /var/log/audit/audit.log.1:type=AVC msg=audit(1573046561.972:61708): avc: denied { write } for pid=174659 comm="mysqld" name="plugin.MYI" dev="vda2" ino=186739242 scontex t=system_u:system_r:container_t:s0:c403,c774 tcontext=unconfined_u:object_r:var_lib_t:s0 tclass=file permissive=1 /var/log/audit/audit.log.1:type=AVC msg=audit(1573046561.982:61709): avc: denied { lock } for pid=174659 comm="mysqld" path="/var/lib/mysql/ibdata1" dev="vda2" ino=184647 075 scontext=system_u:system_r:container_t:s0:c403,c774 tcontext=unconfined_u:object_r:var_lib_t:s0 tclass=file permissive=1 /var/log/audit/audit.log.1:type=AVC msg=audit(1573046561.984:61710): avc: denied { read } for pid=174659 comm="mysqld" name="mysql" dev="vda2" ino=184632756 scontext=syst em_u:system_r:container_t:s0:c403,c774 tcontext=system_u:object_r:mysqld_db_t:s0 tclass=dir permissive=1 /var/log/audit/audit.log.1:type=AVC msg=audit(1573046562.112:61711): avc: denied { write } for pid=174659 comm="mysqld" name="mysql" dev="vda2" ino=184632756 scontext=sys tem_u:system_r:container_t:s0:c403,c774 tcontext=system_u:object_r:mysqld_db_t:s0 tclass=dir permissive=1 /var/log/audit/audit.log.1:type=AVC msg=audit(1573046562.112:61711): avc: denied { remove_name } for pid=174659 comm="mysqld" name="ib_logfile0" dev="vda2" ino=184647077 scontext=system_u:system_r:container_t:s0:c403,c774 tcontext=system_u:object_r:mysqld_db_t:s0 tclass=dir permissive=1 /var/log/audit/audit.log.1:type=AVC msg=audit(1573046562.112:61711): avc: denied { unlink } for pid=174659 comm="mysqld" name="ib_logfile0" dev="vda2" ino=184647077 scont ext=system_u:system_r:container_t:s0:c403,c774 tcontext=unconfined_u:object_r:var_lib_t:s0 tclass=file permissive=1 /var/log/audit/audit.log.1:type=AVC msg=audit(1573046562.120:61712): avc: denied { add_name } for pid=174659 comm="mysqld" name="ib_logfile101" scontext=system_u:system_r :container_t:s0:c403,c774 tcontext=system_u:object_r:mysqld_db_t:s0 tclass=dir permissive=1 /var/log/audit/audit.log.1:type=AVC msg=audit(1573046562.120:61713): avc: denied { lock } for pid=174659 comm="mysqld" path="/var/lib/mysql/ib_logfile101" dev="vda2" ino= 184647076 scontext=system_u:system_r:container_t:s0:c403,c774 tcontext=system_u:object_r:mysqld_db_t:s0 tclass=file permissive=1 /var/log/audit/audit.log.1:type=AVC msg=audit(1573046562.126:61714): avc: denied { rename } for pid=174659 comm="mysqld" name="ib_logfile101" dev="vda2" ino=184647076 sco ntext=system_u:system_r:container_t:s0:c403,c774 tcontext=system_u:object_r:mysqld_db_t:s0 tclass=file permissive=1 /var/log/audit/audit.log.1:type=AVC msg=audit(1573046562.158:61715): avc: denied { create } for pid=174659 comm="mysqld" name="mysql.sock" scontext=system_u:system_r:cont ainer_t:s0:c403,c774 tcontext=system_u:object_r:mysqld_db_t:s0 tclass=sock_file permissive=1 /var/log/audit/audit.log.1:type=AVC msg=audit(1573046562.618:61716): avc: denied { write } for pid=174690 comm="mysqladmin" name="mysql.sock" dev="vda2" ino=184658862 sco ntext=system_u:system_r:container_t:s0:c403,c774 tcontext=system_u:object_r:mysqld_db_t:s0 tclass=sock_file permissive=1 /var/log/audit/audit.log.1:type=AVC msg=audit(1573046562.721:61717): avc: denied { write } for pid=174659 comm="mysqld" name="mysql" dev="vda2" ino=186739209 scontext=sys tem_u:system_r:container_t:s0:c403,c774 tcontext=unconfined_u:object_r:var_lib_t:s0 tclass=dir permissive=1 /var/log/audit/audit.log.1:type=AVC msg=audit(1573046562.721:61717): avc: denied { add_name } for pid=174659 comm="mysqld" name="transaction_registry.frm" scontext=system _u:system_r:container_t:s0:c403,c774 tcontext=unconfined_u:object_r:var_lib_t:s0 tclass=dir permissive=1 /var/log/audit/audit.log.1:type=AVC msg=audit(1573046562.721:61717): avc: denied { create } for pid=174659 comm="mysqld" name="transaction_registry.frm" scontext=system_u :system_r:container_t:s0:c403,c774 tcontext=system_u:object_r:var_lib_t:s0 tclass=file permissive=1 /var/log/audit/audit.log.1:type=AVC msg=audit(1573046562.721:61717): avc: denied { write } for pid=174659 comm="mysqld" path="/var/lib/mysql/mysql/transaction_registry.fr m" dev="vda2" ino=186739225 scontext=system_u:system_r:container_t:s0:c403,c774 tcontext=system_u:object_r:var_lib_t:s0 tclass=file permissive=1 /var/log/audit/audit.log.1:type=AVC msg=audit(1573046562.724:61718): avc: denied { lock } for pid=174659 comm="mysqld" path="/var/lib/mysql/mysql/transaction_registry.ibd " dev="vda2" ino=186739226 scontext=system_u:system_r:container_t:s0:c403,c774 tcontext=system_u:object_r:var_lib_t:s0 tclass=file permissive=1 /var/log/audit/audit.log.1:type=AVC msg=audit(1573046562.731:61719): avc: denied { remove_name } for pid=174659 comm="mysqld" name="user.MYI" dev="vda2" ino=186739217 sco ntext=system_u:system_r:container_t:s0:c403,c774 tcontext=unconfined_u:object_r:var_lib_t:s0 tclass=dir permissive=1 /var/log/audit/audit.log.1:type=AVC msg=audit(1573046562.731:61719): avc: denied { rename } for pid=174659 comm="mysqld" name="user.MYI" dev="vda2" ino=186739217 scontext =system_u:system_r:container_t:s0:c403,c774 tcontext=unconfined_u:object_r:var_lib_t:s0 tclass=file permissive=1 /var/log/audit/audit.log.1:type=AVC msg=audit(1573046562.732:61720): avc: denied { rename } for pid=174659 comm="mysqld" name="#sql-107_f.MYI" dev="vda2" ino=186[21/1978] ontext=system_u:system_r:container_t:s0:c403,c774 tcontext=system_u:object_r:var_lib_t:s0 tclass=file permissive=1 /var/log/audit/audit.log.1:type=AVC msg=audit(1573046562.735:61721): avc: denied { unlink } for pid=174659 comm="mysqld" name="#sql2-107-f.frm" dev="vda2" ino=186739216 s context=system_u:system_r:container_t:s0:c403,c774 tcontext=system_u:object_r:var_lib_t:s0 tclass=file permissive=1 /var/log/audit/audit.log.1:type=AVC msg=audit(1573046562.954:61722): avc: denied { rmdir } for pid=174659 comm="mysqld" name="performance_schema" dev="vda2" ino=189100549 scontext=system_u:system_r:container_t:s0:c403,c774 tcontext=unconfined_u:object_r:var_lib_t:s0 tclass=dir permissive=1 /var/log/audit/audit.log.1:type=AVC msg=audit(1573046562.954:61723): avc: denied { create } for pid=174659 comm="mysqld" name="performance_schema" scontext=system_u:syste m_r:container_t:s0:c403,c774 tcontext=system_u:object_r:mysqld_db_t:s0 tclass=dir permissive=1 /var/log/audit/audit.log.1:type=AVC msg=audit(1573046563.347:61724): avc: denied { unlink } for pid=174659 comm="mysqld" name="mysql.sock" dev="vda2" ino=184658862 sconte xt=system_u:system_r:container_t:s0:c403,c774 tcontext=system_u:object_r:mysqld_db_t:s0 tclass=sock_file permissive=1 /var/log/audit/audit.log.3:type=AVC msg=audit(1572975171.665:25): avc: denied { name_bind } for pid=1629 comm="ovsdb-server" src=6640 scontext=system_u:system_r:openvswit ch_t:s0 tcontext=system_u:object_r:ovsdb_port_t:s0 tclass=tcp_socket permissive=1 /var/log/audit/audit.log.3:type=AVC msg=audit(1572975171.804:32): avc: denied { map } for pid=1740 comm="modprobe" path="/usr/lib/modules/4.18.0-147.0.2.el8_1.x86_64/modu les.dep.bin" dev="vda2" ino=138615999 scontext=system_u:system_r:openvswitch_t:s0 tcontext=system_u:object_r:modules_dep_t:s0 tclass=file permissive=1 /var/log/audit/audit.log.3:type=AVC msg=audit(1572975199.712:95): avc: denied { execute } for pid=3400 comm="(leapp3)" name="leapp3" dev="vda2" ino=102844187 scontext=sys tem_u:system_r:init_t:s0 tcontext=system_u:object_r:admin_home_t:s0 tclass=file permissive=1 /var/log/audit/audit.log.3:type=AVC msg=audit(1572975199.712:95): avc: denied { read open } for pid=3400 comm="(leapp3)" path="/root/tmp_leapp_py3/leapp3" dev="vda2" ino= 102844187 scontext=system_u:system_r:init_t:s0 tcontext=system_u:object_r:admin_home_t:s0 tclass=file permissive=1 /var/log/audit/audit.log.3:type=AVC msg=audit(1572975199.712:95): avc: denied { execute_no_trans } for pid=3400 comm="(leapp3)" path="/root/tmp_leapp_py3/leapp3" dev="vda 2" ino=102844187 scontext=system_u:system_r:init_t:s0 tcontext=system_u:object_r:admin_home_t:s0 tclass=file permissive=1 /var/log/audit/audit.log.3:type=AVC msg=audit(1572975199.734:99): avc: denied { ioctl } for pid=3400 comm="leapp3" path="/root/tmp_leapp_py3/leapp3" dev="vda2" ino=102844 187 ioctlcmd=0x5451 scontext=system_u:system_r:init_t:s0 tcontext=system_u:object_r:admin_home_t:s0 tclass=file permissive=1 /var/log/audit/audit.log.3:type=AVC msg=audit(1572975203.248:109): avc: denied { create } for pid=5391 comm="leapp3" name="listener-kso2iy15" scontext=system_u:system_r:i nit_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=sock_file permissive=1 /var/log/audit/audit.log.3:type=AVC msg=audit(1572975203.248:110): avc: denied { write } for pid=3400 comm="leapp3" name="listener-kso2iy15" dev="vda2" ino=21062891 scont ext=system_u:system_r:init_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=sock_file permissive=1 /var/log/audit/audit.log.3:type=AVC msg=audit(1572975203.535:111): avc: denied { unlink } for pid=5396 comm="leapp3" name="listener-vqmmvuyi" dev="vda2" ino=23069288 scon text=system_u:system_r:init_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=sock_file permissive=1 /var/log/audit/audit.log.3:type=AVC msg=audit(1572975222.967:129): avc: denied { write } for pid=5457 comm="leapp3" name="listener-f4cg6rt0" dev="vda2" ino=27481346 scont ext=system_u:system_r:init_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=sock_file permissive=1 /var/log/audit/audit.log.3:type=AVC msg=audit(1572975222.993:130): avc: denied { create } for pid=7444 comm="leapp3" name="listener-kqzex19u" scontext=system_u:system_r:i nit_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=sock_file permissive=1 /var/log/audit/audit.log.3:type=AVC msg=audit(1572975223.013:131): avc: denied { unlink } for pid=5432 comm="leapp3" name="listener-f4cg6rt0" dev="vda2" ino=27481346 scon text=system_u:system_r:init_t:s0 tcontext=system_u:object_r:tmp_t:s0 tclass=sock_file permissive=1 /var/log/audit/audit.log.3:type=AVC msg=audit(1572975223.252:132): avc: denied { create } for pid=3400 comm="leapp3" name="leapp-report.json" scontext=system_u:system_r:i nit_t:s0 tcontext=system_u:object_r:var_log_t:s0 tclass=file permissive=1 Version-Release number of selected component (if applicable): How reproducible: Steps to Reproduce: 1. 2. 3. Actual results: Expected results: Additional info: