Posted | Started | Updated | Runtime |
Duration |
In Waiting |
Machine | Teuthology Branch | OS Type | OS Version | Nodes | Status |
---|---|---|---|---|---|---|---|---|---|---|---|
2017-03-17 15:43:50 | 2017-03-17 20:45:27 | 2017-03-17 22:33:29 | 1:48:02 | 0:28:22 | 1:19:40 | mira | master | centos | 2 | fail |
Description: rgw/verify/{clusters/fixed-2.yaml frontend/civetweb.yaml fs/xfs.yaml msgr-failures/few.yaml objectstore/bluestore.yaml overrides.yaml rgw_pool_type/ec-cache.yaml tasks/rgw_swift.yaml validater/lockdep.yaml}
SELinux denials found on ubuntu@mira054.front.sepia.ceph.com: ['type=AVC msg=audit(1489788790.594:4091): avc: denied { read } for pid=22066 comm="ceph-mon" name="psched" dev="proc" ino=4026531980 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:proc_net_t:s0 tclass=file permissive=1', 'type=AVC msg=audit(1489788770.173:4024): avc: denied { open } for pid=21822 comm="ceph-mon" path="/proc/21822/net/psched" dev="proc" ino=4026531980 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:proc_net_t:s0 tclass=file permissive=1', 'type=AVC msg=audit(1489788770.173:4024): avc: denied { read } for pid=21822 comm="ceph-mon" name="psched" dev="proc" ino=4026531980 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:proc_net_t:s0 tclass=file permissive=1', 'type=AVC msg=audit(1489788790.594:4092): avc: denied { getattr } for pid=22066 comm="ceph-mon" path="/proc/22066/net/psched" dev="proc" ino=4026531980 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:proc_net_t:s0 tclass=file permissive=1', 'type=AVC msg=audit(1489788770.173:4025): avc: denied { getattr } for pid=21822 comm="ceph-mon" path="/proc/21822/net/psched" dev="proc" ino=4026531980 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:proc_net_t:s0 tclass=file permissive=1', 'type=AVC msg=audit(1489788790.594:4091): avc: denied { open } for pid=22066 comm="ceph-mon" path="/proc/22066/net/psched" dev="proc" ino=4026531980 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:proc_net_t:s0 tclass=file permissive=1']