Posted | Started | Updated | Runtime |
Duration |
In Waiting |
Machine | Teuthology Branch | OS Type | OS Version | Nodes | Status |
---|---|---|---|---|---|---|---|---|---|---|---|
2017-06-12 03:25:46 | 2017-06-12 07:17:28 | 2017-06-12 08:27:28 | 1:10:00 | 0:16:00 | 0:54:00 | smithi | master | 4 | fail |
Description: kcephfs/recovery/{clusters/4-remote-clients.yaml debug/mds_client.yaml dirfrag/frag_enable.yaml mounts/kmounts.yaml objectstore/bluestore.yaml tasks/forward-scrub.yaml}
SELinux denials found on ubuntu@smithi008.front.sepia.ceph.com: ['type=AVC msg=audit(1497255054.067:3362): avc: denied { dac_read_search } for pid=2005 comm="master" capability=2 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:system_r:postfix_master_t:s0 tclass=capability permissive=1', 'type=AVC msg=audit(1497255174.176:3793): avc: denied { dac_read_search } for pid=2005 comm="master" capability=2 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:system_r:postfix_master_t:s0 tclass=capability permissive=1', 'type=AVC msg=audit(1497255714.669:4653): avc: denied { dac_read_search } for pid=2005 comm="master" capability=2 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:system_r:postfix_master_t:s0 tclass=capability permissive=1', 'type=AVC msg=audit(1497255294.267:4130): avc: denied { dac_read_search } for pid=2005 comm="master" capability=2 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:system_r:postfix_master_t:s0 tclass=capability permissive=1', 'type=AVC msg=audit(1497255001.085:3251): avc: denied { dac_read_search } for pid=18378 comm="unix_chkpwd" capability=2 scontext=system_u:system_r:chkpwd_t:s0-s0:c0.c1023 tcontext=system_u:system_r:chkpwd_t:s0-s0:c0.c1023 tclass=capability permissive=1', 'type=AVC msg=audit(1497254994.007:3129): avc: denied { dac_read_search } for pid=2005 comm="master" capability=2 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:system_r:postfix_master_t:s0 tclass=capability permissive=1', 'type=AVC msg=audit(1497254841.650:620): avc: denied { dac_read_search } for pid=7929 comm="unix_chkpwd" capability=2 scontext=system_u:system_r:chkpwd_t:s0-s0:c0.c1023 tcontext=system_u:system_r:chkpwd_t:s0-s0:c0.c1023 tclass=capability permissive=1', 'type=AVC msg=audit(1497255074.018:3664): avc: denied { dac_read_search } for pid=20085 comm="unix_chkpwd" capability=2 scontext=system_u:system_r:chkpwd_t:s0-s0:c0.c1023 tcontext=system_u:system_r:chkpwd_t:s0-s0:c0.c1023 tclass=capability permissive=1', 'type=AVC msg=audit(1497255114.115:3715): avc: denied { dac_read_search } for pid=2005 comm="master" capability=2 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:system_r:postfix_master_t:s0 tclass=capability permissive=1', 'type=AVC msg=audit(1497255654.608:4470): avc: denied { dac_read_search } for pid=2005 comm="master" capability=2 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:system_r:postfix_master_t:s0 tclass=capability permissive=1', 'type=AVC msg=audit(1497255234.206:3854): avc: denied { dac_read_search } for pid=2005 comm="master" capability=2 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:system_r:postfix_master_t:s0 tclass=capability permissive=1', 'type=AVC msg=audit(1497254975.943:2833): avc: denied { dac_read_search } for pid=7808 comm=72733A6D61696E20513A526567 capability=2 scontext=system_u:system_r:syslogd_t:s0 tcontext=system_u:system_r:syslogd_t:s0 tclass=capability permissive=1', 'type=AVC msg=audit(1497254873.966:1099): avc: denied { dac_read_search } for pid=2005 comm="master" capability=2 scontext=system_u:system_r:postfix_master_t:s0 tcontext=system_u:system_r:postfix_master_t:s0 tclass=capability permissive=1', 'type=AVC msg=audit(1497255601.173:4386): avc: denied { dac_read_search } for pid=22452 comm="unix_chkpwd" capability=2 scontext=system_u:system_r:chkpwd_t:s0-s0:c0.c1023 tcontext=system_u:system_r:chkpwd_t:s0-s0:c0.c1023 tclass=capability permissive=1', 'type=AVC msg=audit(1497255587.297:4374): avc: denied { dac_read_search } for pid=22421 comm="systemd-tmpfile" capability=2 scontext=system_u:system_r:systemd_tmpfiles_t:s0 tcontext=system_u:system_r:systemd_tmpfiles_t:s0 tclass=capability permissive=1']