Posted | Started | Updated | Runtime |
Duration |
In Waiting |
Machine | Teuthology Branch | OS Type | OS Version | Nodes | Status |
---|---|---|---|---|---|---|---|---|---|---|---|
2016-08-24 02:25:17 | 2016-08-25 23:39:26 | 2016-08-26 00:19:27 | 0:40:01 | 0:29:27 | 0:10:34 | smithi | master | 4 | fail |
Description: knfs/basic/{ceph/base.yaml clusters/extra-client.yaml fs/btrfs.yaml mount/v4.yaml tasks/nfs_workunit_suites_dbench.yaml}
SELinux denials found on ubuntu@smithi015.front.sepia.ceph.com: ['type=AVC msg=audit(1472169100.530:16953): avc: denied { associate } for pid=5514 comm="rpc.mountd" name="channel" scontext=system_u:object_r:sysctl_rpc_t:s0 tcontext=system_u:object_r:proc_t:s0 tclass=filesystem permissive=1', 'type=AVC msg=audit(1472169100.564:16954): avc: denied { write } for pid=5514 comm="rpc.mountd" name="nfsd.export" dev="proc" ino=4026532352 scontext=system_u:system_r:nfsd_t:s0 tcontext=system_u:object_r:sysctl_rpc_t:s0 tclass=dir permissive=1', 'type=AVC msg=audit(1472169100.530:16953): avc: denied { create } for pid=5514 comm="rpc.mountd" name="channel" scontext=system_u:system_r:nfsd_t:s0 tcontext=system_u:object_r:sysctl_rpc_t:s0 tclass=file permissive=1', 'type=AVC msg=audit(1472169100.564:16954): avc: denied { create } for pid=5514 comm="rpc.mountd" name="channel" scontext=system_u:system_r:nfsd_t:s0 tcontext=system_u:object_r:sysctl_rpc_t:s0 tclass=file permissive=1', 'type=AVC msg=audit(1472169100.564:16954): avc: denied { add_name } for pid=5514 comm="rpc.mountd" name="channel" scontext=system_u:system_r:nfsd_t:s0 tcontext=system_u:object_r:sysctl_rpc_t:s0 tclass=dir permissive=1', 'type=AVC msg=audit(1472169100.530:16953): avc: denied { write } for pid=5514 comm="rpc.mountd" name="nfsd.export" dev="proc" ino=4026532352 scontext=system_u:system_r:nfsd_t:s0 tcontext=system_u:object_r:sysctl_rpc_t:s0 tclass=dir permissive=1', 'type=AVC msg=audit(1472169100.530:16953): avc: denied { add_name } for pid=5514 comm="rpc.mountd" name="channel" scontext=system_u:system_r:nfsd_t:s0 tcontext=system_u:object_r:sysctl_rpc_t:s0 tclass=dir permissive=1']