Posted | Started | Updated | Runtime |
Duration |
In Waiting |
Machine | Teuthology Branch | OS Type | OS Version | Nodes | Status |
---|---|---|---|---|---|---|---|---|---|---|---|
2021-02-06 13:15:58 | 2021-02-06 16:59:21 | 2021-02-06 18:49:05 | 1:49:44 | 1:10:42 | 0:39:02 | gibba | master | rhel | 8.3 | 3 | fail |
Description: fs/workload/{begin clusters/1a5s-mds-1c-client-3node conf/{client mds mon osd} distro/{rhel_8} mount/kclient/{mount overrides/{distro/stock/{k-stock rhel_8} ms-die-on-skipped}} objectstore-ec/bluestore-comp-ec-root omap_limit/10000 overrides/{frag_enable osd-asserts session_timeout whitelist_health whitelist_wrongly_marked_down} ranks/3 scrub/yes tasks/{0-check-counter workunit/suites/iogen}}
SELinux denials found on ubuntu@gibba004.front.sepia.ceph.com: ['type=AVC msg=audit(1612634409.975:8472): avc: denied { read write open } for pid=15643 comm="cachefilesd" path="/home/ubuntu/cephtest/archive/coredump/1612634407.15643.core" dev="sda1" ino=524499 scontext=system_u:system_r:cachefilesd_t:s0 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1', 'type=AVC msg=audit(1612634408.842:8468): avc: denied { add_name } for pid=15643 comm="cachefilesd" name="1612634407.15643.core" scontext=system_u:system_r:cachefilesd_t:s0 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=1', 'type=AVC msg=audit(1612634407.838:8463): avc: denied { search } for pid=15643 comm="cachefilesd" name="ubuntu" dev="sda1" ino=2387 scontext=system_u:system_r:cachefilesd_t:s0 tcontext=unconfined_u:object_r:user_home_dir_t:s0 tclass=dir permissive=1', 'type=AVC msg=audit(1612634408.842:8469): avc: denied { create } for pid=15643 comm="cachefilesd" name="1612634407.15643.core" scontext=system_u:system_r:cachefilesd_t:s0 tcontext=system_u:object_r:user_home_t:s0 tclass=file permissive=1', 'type=AVC msg=audit(1612634408.842:8467): avc: denied { write } for pid=15643 comm="cachefilesd" name="coredump" dev="sda1" ino=524299 scontext=system_u:system_r:cachefilesd_t:s0 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=1']