Status Job ID Links Posted Started Updated
Runtime
Duration
In Waiting
Machine Teuthology Branch OS Type OS Version Description Nodes
fail 4990336 2020-04-27 05:15:20 2020-04-29 02:41:40 2020-04-29 05:07:42 2:26:02 2:13:06 0:12:56 smithi py2 centos 8.1 ceph-ansible/smoke/basic/{0-clusters/3-node.yaml 1-distros/centos_latest.yaml 2-ceph/ceph_ansible.yaml 3-config/bluestore_with_dmcrypt.yaml 4-tasks/ceph-admin-commands.yaml} 3
Failure Reason:

SELinux denials found on ubuntu@smithi067.front.sepia.ceph.com: [u'type=AVC msg=audit(1588136535.265:6500): avc: denied { read } for pid=30430 comm="unix_chkpwd" name="shadow" dev="sda1" ino=60366 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588136535.264:6499): avc: denied { execute_no_trans } for pid=30430 comm="sudo" path="/usr/sbin/unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588136535.265:6501): avc: denied { getattr } for pid=30430 comm="unix_chkpwd" path="/etc/shadow" dev="sda1" ino=60366 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588136535.366:6515): avc: denied { read } for pid=30427 comm="sudo" name="utmp" dev="tmpfs" ino=17430 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588136535.265:6500): avc: denied { open } for pid=30430 comm="unix_chkpwd" path="/etc/shadow" dev="sda1" ino=60366 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588136535.208:6497): avc: denied { map } for pid=30427 comm="sudo" path="/usr/bin/sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588136535.367:6520): avc: denied { sys_resource } for pid=30441 comm="sudo" capability=24 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1', u'type=AVC msg=audit(1588136535.366:6518): avc: denied { nlmsg_relay } for pid=30427 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=AVC msg=audit(1588136535.208:6497): avc: denied { execute_no_trans } for pid=30427 comm="admin_socket" path="/usr/bin/sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588136535.366:6515): avc: denied { open } for pid=30427 comm="sudo" path="/run/utmp" dev="tmpfs" ino=17430 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file permissive=1', u'type=USER_AVC msg=audit(1588136535.365:6514): pid=2417 uid=81 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg=\'avc: denied { send_msg } for msgtype=method_return dest=:1.1329 spid=2564 tpid=30427 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=dbus permissive=1 exe="/usr/bin/dbus-daemon" sauid=81 hostname=? addr=? terminal=?\'\x1dUID="dbus" AUID="unset" SAUID="dbus"', u'type=AVC msg=audit(1588136535.264:6499): avc: denied { read open } for pid=30430 comm="sudo" path="/usr/sbin/unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1', u'type=USER_AVC msg=audit(1588136535.267:6507): pid=2417 uid=81 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg=\'avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.login1.Manager member=CreateSession dest=org.freedesktop.login1 spid=30427 tpid=2564 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:systemd_logind_t:s0 tclass=dbus permissive=1 exe="/usr/bin/dbus-daemon" sauid=81 hostname=? addr=? terminal=?\'\x1dUID="dbus" AUID="unset" SAUID="dbus"', u'type=AVC msg=audit(1588136535.265:6502): avc: denied { create } for pid=30427 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=AVC msg=audit(1588136535.208:6497): avc: denied { execute } for pid=30427 comm="admin_socket" name="sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588136535.366:6516): avc: denied { lock } for pid=30427 comm="sudo" path="/run/utmp" dev="tmpfs" ino=17430 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588136535.265:6503): avc: denied { audit_write } for pid=30427 comm="sudo" capability=29 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1', u'type=AVC msg=audit(1588136535.208:6497): avc: denied { read open } for pid=30427 comm="admin_socket" path="/usr/bin/sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588136535.366:6517): avc: denied { create } for pid=30427 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=AVC msg=audit(1588136535.264:6499): avc: denied { map } for pid=30430 comm="unix_chkpwd" path="/usr/sbin/unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588136535.366:6518): avc: denied { audit_write } for pid=30427 comm="sudo" capability=29 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1', u'type=AVC msg=audit(1588136535.265:6503): avc: denied { nlmsg_relay } for pid=30427 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=AVC msg=audit(1588136535.264:6499): avc: denied { execute } for pid=30430 comm="sudo" name="unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588136535.215:6498): avc: denied { sys_resource } for pid=30427 comm="sudo" capability=24 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1', u'type=AVC msg=audit(1588136535.367:6520): avc: denied { setrlimit } for pid=30441 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=process permissive=1', u'type=AVC msg=audit(1588136535.215:6498): avc: denied { setrlimit } for pid=30427 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=process permissive=1']

pass 4990340 2020-04-27 05:15:21 2020-04-29 02:43:28 2020-04-29 05:21:30 2:38:02 0:12:36 2:25:26 smithi py2 ubuntu 18.04 ceph-ansible/smoke/basic/{0-clusters/4-node.yaml 1-distros/ubuntu_latest.yaml 2-ceph/ceph_ansible.yaml 3-config/dmcrypt_off.yaml 4-tasks/rbd_import_export.yaml} 4
fail 4990344 2020-04-27 05:15:22 2020-04-29 02:45:24 2020-04-29 05:17:26 2:32:02 2:12:18 0:19:44 smithi py2 centos 8.1 ceph-ansible/smoke/basic/{0-clusters/3-node.yaml 1-distros/centos_latest.yaml 2-ceph/ceph_ansible.yaml 3-config/dmcrypt_on.yaml 4-tasks/rest.yaml} 3
Failure Reason:

SELinux denials found on ubuntu@smithi181.front.sepia.ceph.com: [u'type=AVC msg=audit(1588137076.345:6499): avc: denied { execute } for pid=30380 comm="admin_socket" name="sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588137076.477:6517): avc: denied { open } for pid=30380 comm="sudo" path="/run/utmp" dev="tmpfs" ino=15508 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588137076.477:6522): avc: denied { setrlimit } for pid=30396 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=process permissive=1', u'type=AVC msg=audit(1588137076.345:6499): avc: denied { execute_no_trans } for pid=30380 comm="admin_socket" path="/usr/bin/sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588137076.388:6501): avc: denied { execute } for pid=30383 comm="sudo" name="unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588137076.389:6502): avc: denied { read } for pid=30383 comm="unix_chkpwd" name="shadow" dev="sda1" ino=60366 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588137076.477:6518): avc: denied { lock } for pid=30380 comm="sudo" path="/run/utmp" dev="tmpfs" ino=15508 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588137076.345:6499): avc: denied { map } for pid=30380 comm="sudo" path="/usr/bin/sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588137076.345:6499): avc: denied { read open } for pid=30380 comm="admin_socket" path="/usr/bin/sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588137076.477:6520): avc: denied { audit_write } for pid=30380 comm="sudo" capability=29 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1', u'type=AVC msg=audit(1588137076.389:6504): avc: denied { create } for pid=30380 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=USER_AVC msg=audit(1588137076.391:6509): pid=2447 uid=81 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg=\'avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.login1.Manager member=CreateSession dest=org.freedesktop.login1 spid=30380 tpid=2587 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:systemd_logind_t:s0 tclass=dbus permissive=1 exe="/usr/bin/dbus-daemon" sauid=81 hostname=? addr=? terminal=?\'\x1dUID="dbus" AUID="unset" SAUID="dbus"', u'type=AVC msg=audit(1588137076.477:6517): avc: denied { read } for pid=30380 comm="sudo" name="utmp" dev="tmpfs" ino=15508 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588137076.389:6503): avc: denied { getattr } for pid=30383 comm="unix_chkpwd" path="/etc/shadow" dev="sda1" ino=60366 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588137076.477:6519): avc: denied { create } for pid=30380 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=AVC msg=audit(1588137076.388:6501): avc: denied { map } for pid=30383 comm="unix_chkpwd" path="/usr/sbin/unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1', u'type=USER_AVC msg=audit(1588137076.476:6516): pid=2447 uid=81 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg=\'avc: denied { send_msg } for msgtype=method_return dest=:1.1328 spid=2587 tpid=30380 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=dbus permissive=1 exe="/usr/bin/dbus-daemon" sauid=81 hostname=? addr=? terminal=?\'\x1dUID="dbus" AUID="unset" SAUID="dbus"', u'type=AVC msg=audit(1588137076.388:6501): avc: denied { read open } for pid=30383 comm="sudo" path="/usr/sbin/unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588137076.390:6505): avc: denied { audit_write } for pid=30380 comm="sudo" capability=29 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1', u'type=AVC msg=audit(1588137076.389:6502): avc: denied { open } for pid=30383 comm="unix_chkpwd" path="/etc/shadow" dev="sda1" ino=60366 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588137076.351:6500): avc: denied { sys_resource } for pid=30380 comm="sudo" capability=24 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1', u'type=AVC msg=audit(1588137076.388:6501): avc: denied { execute_no_trans } for pid=30383 comm="sudo" path="/usr/sbin/unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588137076.390:6505): avc: denied { nlmsg_relay } for pid=30380 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=AVC msg=audit(1588137076.351:6500): avc: denied { setrlimit } for pid=30380 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=process permissive=1', u'type=AVC msg=audit(1588137076.477:6522): avc: denied { sys_resource } for pid=30396 comm="sudo" capability=24 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1', u'type=AVC msg=audit(1588137076.477:6520): avc: denied { nlmsg_relay } for pid=30380 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1']

pass 4990348 2020-04-27 05:15:23 2020-04-29 02:47:23 2020-04-29 04:31:24 1:44:01 0:12:34 1:31:27 smithi py2 ubuntu 18.04 ceph-ansible/smoke/basic/{0-clusters/4-node.yaml 1-distros/ubuntu_latest.yaml 2-ceph/ceph_ansible.yaml 3-config/dmcrypt_on.yaml 4-tasks/ceph-admin-commands.yaml} 4
fail 4990351 2020-04-27 05:15:23 2020-04-29 02:47:28 2020-04-29 05:13:29 2:26:01 2:12:36 0:13:25 smithi py2 centos 8.1 ceph-ansible/smoke/basic/{0-clusters/3-node.yaml 1-distros/centos_latest.yaml 2-ceph/ceph_ansible.yaml 3-config/bluestore_with_dmcrypt.yaml 4-tasks/rbd_import_export.yaml} 3
Failure Reason:

SELinux denials found on ubuntu@smithi025.front.sepia.ceph.com: [u'type=AVC msg=audit(1588136825.349:6851): avc: denied { execute } for pid=28361 comm="sudo" name="unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588136825.449:6868): avc: denied { lock } for pid=28358 comm="sudo" path="/run/utmp" dev="tmpfs" ino=13058 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588136825.449:6869): avc: denied { create } for pid=28358 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=AVC msg=audit(1588136825.351:6852): avc: denied { open } for pid=28361 comm="unix_chkpwd" path="/etc/shadow" dev="sda1" ino=60365 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588136825.295:6849): avc: denied { execute_no_trans } for pid=28358 comm="admin_socket" path="/usr/bin/sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1', u'type=USER_AVC msg=audit(1588136825.448:6866): pid=2418 uid=81 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg=\'avc: denied { send_msg } for msgtype=method_return dest=:1.1399 spid=2562 tpid=28358 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=dbus permissive=1 exe="/usr/bin/dbus-daemon" sauid=81 hostname=? addr=? terminal=?\'\x1dUID="dbus" AUID="unset" SAUID="dbus"', u'type=AVC msg=audit(1588136825.351:6852): avc: denied { read } for pid=28361 comm="unix_chkpwd" name="shadow" dev="sda1" ino=60365 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588136825.295:6849): avc: denied { execute } for pid=28358 comm="admin_socket" name="sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588136825.349:6851): avc: denied { read open } for pid=28361 comm="sudo" path="/usr/sbin/unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1', u'type=USER_AVC msg=audit(1588136825.352:6859): pid=2418 uid=81 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg=\'avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.login1.Manager member=CreateSession dest=org.freedesktop.login1 spid=28358 tpid=2562 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:systemd_logind_t:s0 tclass=dbus permissive=1 exe="/usr/bin/dbus-daemon" sauid=81 hostname=? addr=? terminal=?\'\x1dUID="dbus" AUID="unset" SAUID="dbus"', u'type=AVC msg=audit(1588136825.295:6849): avc: denied { map } for pid=28358 comm="sudo" path="/usr/bin/sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588136825.301:6850): avc: denied { sys_resource } for pid=28358 comm="sudo" capability=24 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1', u'type=AVC msg=audit(1588136825.349:6851): avc: denied { map } for pid=28361 comm="unix_chkpwd" path="/usr/sbin/unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588136825.295:6849): avc: denied { read open } for pid=28358 comm="admin_socket" path="/usr/bin/sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588136825.449:6867): avc: denied { read } for pid=28358 comm="sudo" name="utmp" dev="tmpfs" ino=13058 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588136825.301:6850): avc: denied { setrlimit } for pid=28358 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=process permissive=1', u'type=AVC msg=audit(1588136825.351:6853): avc: denied { getattr } for pid=28361 comm="unix_chkpwd" path="/etc/shadow" dev="sda1" ino=60365 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588136825.351:6855): avc: denied { nlmsg_relay } for pid=28358 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=AVC msg=audit(1588136825.449:6870): avc: denied { nlmsg_relay } for pid=28358 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=AVC msg=audit(1588136825.349:6851): avc: denied { execute_no_trans } for pid=28361 comm="sudo" path="/usr/sbin/unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588136825.449:6872): avc: denied { sys_resource } for pid=28374 comm="sudo" capability=24 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1', u'type=AVC msg=audit(1588136825.449:6872): avc: denied { setrlimit } for pid=28374 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=process permissive=1', u'type=AVC msg=audit(1588136825.449:6867): avc: denied { open } for pid=28358 comm="sudo" path="/run/utmp" dev="tmpfs" ino=13058 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588136825.351:6854): avc: denied { create } for pid=28358 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=AVC msg=audit(1588136825.351:6855): avc: denied { audit_write } for pid=28358 comm="sudo" capability=29 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1', u'type=AVC msg=audit(1588136825.449:6870): avc: denied { audit_write } for pid=28358 comm="sudo" capability=29 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1']

pass 4990356 2020-04-27 05:15:24 2020-04-29 02:49:13 2020-04-29 05:23:15 2:34:02 0:12:24 2:21:38 smithi py2 ubuntu 18.04 ceph-ansible/smoke/basic/{0-clusters/4-node.yaml 1-distros/ubuntu_latest.yaml 2-ceph/ceph_ansible.yaml 3-config/dmcrypt_off.yaml 4-tasks/rest.yaml} 4
fail 4990359 2020-04-27 05:15:25 2020-04-29 02:49:22 2020-04-29 05:41:24 2:52:02 2:13:04 0:38:58 smithi py2 centos 8.1 ceph-ansible/smoke/basic/{0-clusters/3-node.yaml 1-distros/centos_latest.yaml 2-ceph/ceph_ansible.yaml 3-config/dmcrypt_off.yaml 4-tasks/ceph-admin-commands.yaml} 3
Failure Reason:

SELinux denials found on ubuntu@smithi190.front.sepia.ceph.com: [u'type=USER_AVC msg=audit(1588138622.828:6431): pid=2412 uid=81 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg=\'avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.login1.Manager member=CreateSession dest=org.freedesktop.login1 spid=30132 tpid=2574 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:systemd_logind_t:s0 tclass=dbus permissive=1 exe="/usr/bin/dbus-daemon" sauid=81 hostname=? addr=? terminal=?\'\x1dUID="dbus" AUID="unset" SAUID="dbus"', u'type=AVC msg=audit(1588138622.921:6444): avc: denied { sys_resource } for pid=30150 comm="sudo" capability=24 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1', u'type=AVC msg=audit(1588138622.786:6422): avc: denied { sys_resource } for pid=30132 comm="sudo" capability=24 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1', u'type=AVC msg=audit(1588138622.825:6425): avc: denied { getattr } for pid=30135 comm="unix_chkpwd" path="/etc/shadow" dev="sda1" ino=60366 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588138622.920:6442): avc: denied { nlmsg_relay } for pid=30132 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=AVC msg=audit(1588138622.920:6440): avc: denied { lock } for pid=30132 comm="sudo" path="/run/utmp" dev="tmpfs" ino=4288 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588138622.921:6444): avc: denied { setrlimit } for pid=30150 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=process permissive=1', u'type=AVC msg=audit(1588138622.786:6422): avc: denied { setrlimit } for pid=30132 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=process permissive=1', u'type=AVC msg=audit(1588138622.779:6421): avc: denied { map } for pid=30132 comm="sudo" path="/usr/bin/sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588138622.779:6421): avc: denied { read open } for pid=30132 comm="admin_socket" path="/usr/bin/sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588138622.920:6439): avc: denied { read } for pid=30132 comm="sudo" name="utmp" dev="tmpfs" ino=4288 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588138622.825:6424): avc: denied { read } for pid=30135 comm="unix_chkpwd" name="shadow" dev="sda1" ino=60366 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588138622.824:6423): avc: denied { execute } for pid=30135 comm="sudo" name="unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588138622.779:6421): avc: denied { execute_no_trans } for pid=30132 comm="admin_socket" path="/usr/bin/sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588138622.824:6423): avc: denied { execute_no_trans } for pid=30135 comm="sudo" path="/usr/sbin/unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588138622.826:6426): avc: denied { create } for pid=30132 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=AVC msg=audit(1588138622.824:6423): avc: denied { read open } for pid=30135 comm="sudo" path="/usr/sbin/unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588138622.825:6424): avc: denied { open } for pid=30135 comm="unix_chkpwd" path="/etc/shadow" dev="sda1" ino=60366 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588138622.824:6423): avc: denied { map } for pid=30135 comm="unix_chkpwd" path="/usr/sbin/unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1', u'type=USER_AVC msg=audit(1588138622.920:6438): pid=2412 uid=81 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg=\'avc: denied { send_msg } for msgtype=method_return dest=:1.1313 spid=2574 tpid=30132 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=dbus permissive=1 exe="/usr/bin/dbus-daemon" sauid=81 hostname=? addr=? terminal=?\'\x1dUID="dbus" AUID="unset" SAUID="dbus"', u'type=AVC msg=audit(1588138622.920:6441): avc: denied { create } for pid=30132 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=AVC msg=audit(1588138622.920:6439): avc: denied { open } for pid=30132 comm="sudo" path="/run/utmp" dev="tmpfs" ino=4288 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588138622.920:6442): avc: denied { audit_write } for pid=30132 comm="sudo" capability=29 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1', u'type=AVC msg=audit(1588138622.826:6427): avc: denied { nlmsg_relay } for pid=30132 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=AVC msg=audit(1588138622.826:6427): avc: denied { audit_write } for pid=30132 comm="sudo" capability=29 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1', u'type=AVC msg=audit(1588138622.779:6421): avc: denied { execute } for pid=30132 comm="admin_socket" name="sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1']

pass 4990364 2020-04-27 05:15:26 2020-04-29 02:53:13 2020-04-29 05:21:15 2:28:02 0:13:11 2:14:51 smithi py2 ubuntu 18.04 ceph-ansible/smoke/basic/{0-clusters/4-node.yaml 1-distros/ubuntu_latest.yaml 2-ceph/ceph_ansible.yaml 3-config/dmcrypt_on.yaml 4-tasks/rbd_import_export.yaml} 4
fail 4990368 2020-04-27 05:15:27 2020-04-29 02:57:06 2020-04-29 05:33:08 2:36:02 2:12:09 0:23:53 smithi py2 centos 8.1 ceph-ansible/smoke/basic/{0-clusters/3-node.yaml 1-distros/centos_latest.yaml 2-ceph/ceph_ansible.yaml 3-config/bluestore_with_dmcrypt.yaml 4-tasks/rest.yaml} 3
Failure Reason:

SELinux denials found on ubuntu@smithi027.front.sepia.ceph.com: [u'type=AVC msg=audit(1588137983.547:6499): avc: denied { execute } for pid=30407 comm="admin_socket" name="sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588137983.554:6500): avc: denied { sys_resource } for pid=30407 comm="sudo" capability=24 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1', u'type=AVC msg=audit(1588137983.704:6519): avc: denied { create } for pid=30407 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=AVC msg=audit(1588137983.603:6501): avc: denied { read open } for pid=30410 comm="sudo" path="/usr/sbin/unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588137983.703:6518): avc: denied { lock } for pid=30407 comm="sudo" path="/run/utmp" dev="tmpfs" ino=17424 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588137983.704:6522): avc: denied { sys_resource } for pid=30424 comm="sudo" capability=24 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1', u'type=AVC msg=audit(1588137983.703:6517): avc: denied { read } for pid=30407 comm="sudo" name="utmp" dev="tmpfs" ino=17424 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588137983.547:6499): avc: denied { execute_no_trans } for pid=30407 comm="admin_socket" path="/usr/bin/sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588137983.704:6520): avc: denied { audit_write } for pid=30407 comm="sudo" capability=29 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1', u'type=AVC msg=audit(1588137983.604:6505): avc: denied { nlmsg_relay } for pid=30407 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=AVC msg=audit(1588137983.604:6502): avc: denied { read } for pid=30410 comm="unix_chkpwd" name="shadow" dev="sda1" ino=60366 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file permissive=1', u'type=USER_AVC msg=audit(1588137983.703:6516): pid=2417 uid=81 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg=\'avc: denied { send_msg } for msgtype=method_return dest=:1.1328 spid=2593 tpid=30407 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=dbus permissive=1 exe="/usr/bin/dbus-daemon" sauid=81 hostname=? addr=? terminal=?\'\x1dUID="dbus" AUID="unset" SAUID="dbus"', u'type=AVC msg=audit(1588137983.604:6504): avc: denied { create } for pid=30407 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=AVC msg=audit(1588137983.547:6499): avc: denied { read open } for pid=30407 comm="admin_socket" path="/usr/bin/sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588137983.554:6500): avc: denied { setrlimit } for pid=30407 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=process permissive=1', u'type=AVC msg=audit(1588137983.604:6503): avc: denied { getattr } for pid=30410 comm="unix_chkpwd" path="/etc/shadow" dev="sda1" ino=60366 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588137983.547:6499): avc: denied { map } for pid=30407 comm="sudo" path="/usr/bin/sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588137983.704:6520): avc: denied { nlmsg_relay } for pid=30407 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=AVC msg=audit(1588137983.703:6517): avc: denied { open } for pid=30407 comm="sudo" path="/run/utmp" dev="tmpfs" ino=17424 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file permissive=1', u'type=USER_AVC msg=audit(1588137983.606:6509): pid=2417 uid=81 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg=\'avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.login1.Manager member=CreateSession dest=org.freedesktop.login1 spid=30407 tpid=2593 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:systemd_logind_t:s0 tclass=dbus permissive=1 exe="/usr/bin/dbus-daemon" sauid=81 hostname=? addr=? terminal=?\'\x1dUID="dbus" AUID="unset" SAUID="dbus"', u'type=AVC msg=audit(1588137983.603:6501): avc: denied { execute } for pid=30410 comm="sudo" name="unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588137983.604:6502): avc: denied { open } for pid=30410 comm="unix_chkpwd" path="/etc/shadow" dev="sda1" ino=60366 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588137983.704:6522): avc: denied { setrlimit } for pid=30424 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=process permissive=1', u'type=AVC msg=audit(1588137983.603:6501): avc: denied { map } for pid=30410 comm="unix_chkpwd" path="/usr/sbin/unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588137983.603:6501): avc: denied { execute_no_trans } for pid=30410 comm="sudo" path="/usr/sbin/unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588137983.604:6505): avc: denied { audit_write } for pid=30407 comm="sudo" capability=29 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1']

pass 4990372 2020-04-27 05:15:27 2020-04-29 04:51:49 2020-04-29 06:07:49 1:16:00 0:12:23 1:03:37 smithi py2 ubuntu 18.04 ceph-ansible/smoke/basic/{0-clusters/4-node.yaml 1-distros/ubuntu_latest.yaml 2-ceph/ceph_ansible.yaml 3-config/bluestore_with_dmcrypt.yaml 4-tasks/ceph-admin-commands.yaml} 4
fail 4990375 2020-04-27 05:15:28 2020-04-29 04:53:58 2020-04-29 07:17:59 2:24:01 2:13:34 0:10:27 smithi py2 centos 8.1 ceph-ansible/smoke/basic/{0-clusters/3-node.yaml 1-distros/centos_latest.yaml 2-ceph/ceph_ansible.yaml 3-config/dmcrypt_off.yaml 4-tasks/rbd_import_export.yaml} 3
Failure Reason:

SELinux denials found on ubuntu@smithi185.front.sepia.ceph.com: [u'type=AVC msg=audit(1588144341.461:6701): avc: denied { sys_resource } for pid=27820 comm="sudo" capability=24 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1', u'type=AVC msg=audit(1588144341.373:6684): avc: denied { nlmsg_relay } for pid=27806 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=AVC msg=audit(1588144341.461:6696): avc: denied { read } for pid=27806 comm="sudo" name="utmp" dev="tmpfs" ino=14449 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588144341.373:6683): avc: denied { create } for pid=27806 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=AVC msg=audit(1588144341.372:6680): avc: denied { execute_no_trans } for pid=27809 comm="sudo" path="/usr/sbin/unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588144341.373:6684): avc: denied { audit_write } for pid=27806 comm="sudo" capability=29 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1', u'type=AVC msg=audit(1588144341.372:6680): avc: denied { read open } for pid=27809 comm="sudo" path="/usr/sbin/unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588144341.461:6697): avc: denied { lock } for pid=27806 comm="sudo" path="/run/utmp" dev="tmpfs" ino=14449 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588144341.329:6678): avc: denied { execute } for pid=27806 comm="admin_socket" name="sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588144341.372:6680): avc: denied { execute } for pid=27809 comm="sudo" name="unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588144341.373:6682): avc: denied { getattr } for pid=27809 comm="unix_chkpwd" path="/etc/shadow" dev="sda1" ino=60365 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file permissive=1', u'type=USER_AVC msg=audit(1588144341.460:6695): pid=2435 uid=81 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg=\'avc: denied { send_msg } for msgtype=method_return dest=:1.1364 spid=2572 tpid=27806 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=dbus permissive=1 exe="/usr/bin/dbus-daemon" sauid=81 hostname=? addr=? terminal=?\'\x1dUID="dbus" AUID="unset" SAUID="dbus"', u'type=AVC msg=audit(1588144341.373:6681): avc: denied { open } for pid=27809 comm="unix_chkpwd" path="/etc/shadow" dev="sda1" ino=60365 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588144341.335:6679): avc: denied { setrlimit } for pid=27806 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=process permissive=1', u'type=AVC msg=audit(1588144341.335:6679): avc: denied { sys_resource } for pid=27806 comm="sudo" capability=24 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1', u'type=AVC msg=audit(1588144341.461:6699): avc: denied { audit_write } for pid=27806 comm="sudo" capability=29 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1', u'type=AVC msg=audit(1588144341.461:6701): avc: denied { setrlimit } for pid=27820 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=process permissive=1', u'type=USER_AVC msg=audit(1588144341.375:6688): pid=2435 uid=81 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg=\'avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.login1.Manager member=CreateSession dest=org.freedesktop.login1 spid=27806 tpid=2572 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:systemd_logind_t:s0 tclass=dbus permissive=1 exe="/usr/bin/dbus-daemon" sauid=81 hostname=? addr=? terminal=?\'\x1dUID="dbus" AUID="unset" SAUID="dbus"', u'type=AVC msg=audit(1588144341.329:6678): avc: denied { map } for pid=27806 comm="sudo" path="/usr/bin/sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588144341.461:6698): avc: denied { create } for pid=27806 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=AVC msg=audit(1588144341.373:6681): avc: denied { read } for pid=27809 comm="unix_chkpwd" name="shadow" dev="sda1" ino=60365 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588144341.461:6699): avc: denied { nlmsg_relay } for pid=27806 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=AVC msg=audit(1588144341.329:6678): avc: denied { execute_no_trans } for pid=27806 comm="admin_socket" path="/usr/bin/sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588144341.372:6680): avc: denied { map } for pid=27809 comm="unix_chkpwd" path="/usr/sbin/unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588144341.329:6678): avc: denied { read open } for pid=27806 comm="admin_socket" path="/usr/bin/sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588144341.461:6696): avc: denied { open } for pid=27806 comm="sudo" path="/run/utmp" dev="tmpfs" ino=14449 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file permissive=1']

pass 4990379 2020-04-27 05:15:29 2020-04-29 04:53:58 2020-04-29 05:23:57 0:29:59 0:12:36 0:17:23 smithi py2 ubuntu 18.04 ceph-ansible/smoke/basic/{0-clusters/4-node.yaml 1-distros/ubuntu_latest.yaml 2-ceph/ceph_ansible.yaml 3-config/dmcrypt_on.yaml 4-tasks/rest.yaml} 4
fail 4990383 2020-04-27 05:15:30 2020-04-29 04:55:48 2020-04-29 07:19:50 2:24:02 2:13:15 0:10:47 smithi py2 centos 8.1 ceph-ansible/smoke/basic/{0-clusters/3-node.yaml 1-distros/centos_latest.yaml 2-ceph/ceph_ansible.yaml 3-config/dmcrypt_on.yaml 4-tasks/ceph-admin-commands.yaml} 3
Failure Reason:

SELinux denials found on ubuntu@smithi198.front.sepia.ceph.com: [u'type=AVC msg=audit(1588144365.251:6498): avc: denied { getattr } for pid=30382 comm="unix_chkpwd" path="/etc/shadow" dev="sda1" ino=60366 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file permissive=1', u'type=USER_AVC msg=audit(1588144365.339:6511): pid=2419 uid=81 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg=\'avc: denied { send_msg } for msgtype=method_return dest=:1.1329 spid=2568 tpid=30379 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=dbus permissive=1 exe="/usr/bin/dbus-daemon" sauid=81 hostname=? addr=? terminal=?\'\x1dUID="dbus" AUID="unset" SAUID="dbus"', u'type=USER_AVC msg=audit(1588144365.253:6504): pid=2419 uid=81 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg=\'avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.login1.Manager member=CreateSession dest=org.freedesktop.login1 spid=30379 tpid=2568 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:systemd_logind_t:s0 tclass=dbus permissive=1 exe="/usr/bin/dbus-daemon" sauid=81 hostname=? addr=? terminal=?\'\x1dUID="dbus" AUID="unset" SAUID="dbus"', u'type=AVC msg=audit(1588144365.252:6499): avc: denied { create } for pid=30379 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=AVC msg=audit(1588144365.213:6495): avc: denied { setrlimit } for pid=30379 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=process permissive=1', u'type=AVC msg=audit(1588144365.339:6512): avc: denied { open } for pid=30379 comm="sudo" path="/run/utmp" dev="tmpfs" ino=17498 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588144365.206:6494): avc: denied { execute } for pid=30379 comm="admin_socket" name="sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588144365.213:6495): avc: denied { sys_resource } for pid=30379 comm="sudo" capability=24 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1', u'type=AVC msg=audit(1588144365.339:6512): avc: denied { read } for pid=30379 comm="sudo" name="utmp" dev="tmpfs" ino=17498 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588144365.339:6513): avc: denied { lock } for pid=30379 comm="sudo" path="/run/utmp" dev="tmpfs" ino=17498 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588144365.340:6517): avc: denied { setrlimit } for pid=30395 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=process permissive=1', u'type=AVC msg=audit(1588144365.340:6517): avc: denied { sys_resource } for pid=30395 comm="sudo" capability=24 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1', u'type=AVC msg=audit(1588144365.252:6500): avc: denied { nlmsg_relay } for pid=30379 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=AVC msg=audit(1588144365.340:6515): avc: denied { nlmsg_relay } for pid=30379 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=AVC msg=audit(1588144365.340:6514): avc: denied { create } for pid=30379 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=AVC msg=audit(1588144365.206:6494): avc: denied { map } for pid=30379 comm="sudo" path="/usr/bin/sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588144365.250:6496): avc: denied { execute } for pid=30382 comm="sudo" name="unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588144365.206:6494): avc: denied { read open } for pid=30379 comm="admin_socket" path="/usr/bin/sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588144365.206:6494): avc: denied { execute_no_trans } for pid=30379 comm="admin_socket" path="/usr/bin/sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588144365.250:6496): avc: denied { map } for pid=30382 comm="unix_chkpwd" path="/usr/sbin/unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588144365.340:6515): avc: denied { audit_write } for pid=30379 comm="sudo" capability=29 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1', u'type=AVC msg=audit(1588144365.250:6496): avc: denied { execute_no_trans } for pid=30382 comm="sudo" path="/usr/sbin/unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588144365.251:6497): avc: denied { read } for pid=30382 comm="unix_chkpwd" name="shadow" dev="sda1" ino=60366 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588144365.251:6497): avc: denied { open } for pid=30382 comm="unix_chkpwd" path="/etc/shadow" dev="sda1" ino=60366 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588144365.250:6496): avc: denied { read open } for pid=30382 comm="sudo" path="/usr/sbin/unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588144365.252:6500): avc: denied { audit_write } for pid=30379 comm="sudo" capability=29 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1']

pass 4990387 2020-04-27 05:15:31 2020-04-29 05:28:04 2020-04-29 08:12:06 2:44:02 0:12:52 2:31:10 smithi py2 ubuntu 18.04 ceph-ansible/smoke/basic/{0-clusters/4-node.yaml 1-distros/ubuntu_latest.yaml 2-ceph/ceph_ansible.yaml 3-config/bluestore_with_dmcrypt.yaml 4-tasks/rbd_import_export.yaml} 4
fail 4990391 2020-04-27 05:15:31 2020-04-29 05:31:34 2020-04-29 08:25:36 2:54:02 2:12:17 0:41:45 smithi py2 centos 8.1 ceph-ansible/smoke/basic/{0-clusters/3-node.yaml 1-distros/centos_latest.yaml 2-ceph/ceph_ansible.yaml 3-config/dmcrypt_off.yaml 4-tasks/rest.yaml} 3
Failure Reason:

SELinux denials found on ubuntu@smithi190.front.sepia.ceph.com: [u'type=AVC msg=audit(1588148354.924:6501): avc: denied { audit_write } for pid=30378 comm="sudo" capability=29 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1', u'type=AVC msg=audit(1588148355.011:6515): avc: denied { create } for pid=30378 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=AVC msg=audit(1588148355.011:6516): avc: denied { audit_write } for pid=30378 comm="sudo" capability=29 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1', u'type=AVC msg=audit(1588148354.924:6498): avc: denied { read } for pid=30381 comm="unix_chkpwd" name="shadow" dev="sda1" ino=60366 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588148354.879:6495): avc: denied { execute } for pid=30378 comm="admin_socket" name="sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588148355.013:6518): avc: denied { sys_resource } for pid=30394 comm="sudo" capability=24 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1', u'type=AVC msg=audit(1588148354.879:6495): avc: denied { execute_no_trans } for pid=30378 comm="admin_socket" path="/usr/bin/sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588148355.011:6516): avc: denied { nlmsg_relay } for pid=30378 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=AVC msg=audit(1588148355.048:6520): avc: denied { nlmsg_relay } for pid=30378 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=AVC msg=audit(1588148355.011:6514): avc: denied { lock } for pid=30378 comm="sudo" path="/run/utmp" dev="tmpfs" ino=12418 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file permissive=1', u'type=USER_AVC msg=audit(1588148354.925:6505): pid=2405 uid=81 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg=\'avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.login1.Manager member=CreateSession dest=org.freedesktop.login1 spid=30378 tpid=2571 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:systemd_logind_t:s0 tclass=dbus permissive=1 exe="/usr/bin/dbus-daemon" sauid=81 hostname=? addr=? terminal=?\'\x1dUID="dbus" AUID="unset" SAUID="dbus"', u'type=AVC msg=audit(1588148355.011:6513): avc: denied { read } for pid=30378 comm="sudo" name="utmp" dev="tmpfs" ino=12418 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588148354.886:6496): avc: denied { sys_resource } for pid=30378 comm="sudo" capability=24 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1', u'type=AVC msg=audit(1588148354.924:6501): avc: denied { nlmsg_relay } for pid=30378 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=AVC msg=audit(1588148354.924:6498): avc: denied { open } for pid=30381 comm="unix_chkpwd" path="/etc/shadow" dev="sda1" ino=60366 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588148354.923:6497): avc: denied { execute } for pid=30381 comm="sudo" name="unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588148354.924:6500): avc: denied { create } for pid=30378 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=AVC msg=audit(1588148354.923:6497): avc: denied { map } for pid=30381 comm="unix_chkpwd" path="/usr/sbin/unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588148355.013:6518): avc: denied { setrlimit } for pid=30394 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=process permissive=1', u'type=AVC msg=audit(1588148355.011:6513): avc: denied { open } for pid=30378 comm="sudo" path="/run/utmp" dev="tmpfs" ino=12418 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588148355.048:6520): avc: denied { audit_write } for pid=30378 comm="sudo" capability=29 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1', u'type=AVC msg=audit(1588148354.923:6497): avc: denied { execute_no_trans } for pid=30381 comm="sudo" path="/usr/sbin/unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588148354.886:6496): avc: denied { setrlimit } for pid=30378 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=process permissive=1', u'type=AVC msg=audit(1588148354.924:6499): avc: denied { getattr } for pid=30381 comm="unix_chkpwd" path="/etc/shadow" dev="sda1" ino=60366 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588148354.879:6495): avc: denied { map } for pid=30378 comm="sudo" path="/usr/bin/sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588148354.923:6497): avc: denied { read open } for pid=30381 comm="sudo" path="/usr/sbin/unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588148354.879:6495): avc: denied { read open } for pid=30378 comm="admin_socket" path="/usr/bin/sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588148355.048:6519): avc: denied { create } for pid=30378 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=USER_AVC msg=audit(1588148355.010:6512): pid=2405 uid=81 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg=\'avc: denied { send_msg } for msgtype=method_return dest=:1.1329 spid=2571 tpid=30378 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=dbus permissive=1 exe="/usr/bin/dbus-daemon" sauid=81 hostname=? addr=? terminal=?\'\x1dUID="dbus" AUID="unset" SAUID="dbus"']

pass 4990395 2020-04-27 05:15:32 2020-04-29 05:33:31 2020-04-29 06:09:30 0:35:59 0:11:48 0:24:11 smithi py2 ubuntu 18.04 ceph-ansible/smoke/basic/{0-clusters/4-node.yaml 1-distros/ubuntu_latest.yaml 2-ceph/ceph_ansible.yaml 3-config/dmcrypt_off.yaml 4-tasks/ceph-admin-commands.yaml} 4
fail 4990399 2020-04-27 05:15:33 2020-04-29 05:35:58 2020-04-29 08:00:00 2:24:02 2:13:30 0:10:32 smithi py2 centos 8.1 ceph-ansible/smoke/basic/{0-clusters/3-node.yaml 1-distros/centos_latest.yaml 2-ceph/ceph_ansible.yaml 3-config/dmcrypt_on.yaml 4-tasks/rbd_import_export.yaml} 3
Failure Reason:

SELinux denials found on ubuntu@smithi026.front.sepia.ceph.com: [u'type=AVC msg=audit(1588146839.004:6684): avc: denied { nlmsg_relay } for pid=27779 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=AVC msg=audit(1588146839.004:6683): avc: denied { create } for pid=27779 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=AVC msg=audit(1588146838.948:6678): avc: denied { read open } for pid=27779 comm="admin_socket" path="/usr/bin/sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588146839.004:6681): avc: denied { open } for pid=27782 comm="unix_chkpwd" path="/etc/shadow" dev="sda1" ino=60365 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588146839.104:6697): avc: denied { lock } for pid=27779 comm="sudo" path="/run/utmp" dev="tmpfs" ino=13027 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588146839.104:6696): avc: denied { open } for pid=27779 comm="sudo" path="/run/utmp" dev="tmpfs" ino=13027 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588146839.004:6684): avc: denied { audit_write } for pid=27779 comm="sudo" capability=29 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1', u'type=AVC msg=audit(1588146839.105:6701): avc: denied { setrlimit } for pid=27795 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=process permissive=1', u'type=USER_AVC msg=audit(1588146839.103:6695): pid=2414 uid=81 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg=\'avc: denied { send_msg } for msgtype=method_return dest=:1.1365 spid=2570 tpid=27779 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=dbus permissive=1 exe="/usr/bin/dbus-daemon" sauid=81 hostname=? addr=? terminal=?\'\x1dUID="dbus" AUID="unset" SAUID="dbus"', u'type=AVC msg=audit(1588146839.105:6701): avc: denied { sys_resource } for pid=27795 comm="sudo" capability=24 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1', u'type=AVC msg=audit(1588146839.004:6682): avc: denied { getattr } for pid=27782 comm="unix_chkpwd" path="/etc/shadow" dev="sda1" ino=60365 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588146839.104:6699): avc: denied { nlmsg_relay } for pid=27779 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=AVC msg=audit(1588146838.955:6679): avc: denied { sys_resource } for pid=27779 comm="sudo" capability=24 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1', u'type=AVC msg=audit(1588146839.003:6680): avc: denied { execute } for pid=27782 comm="sudo" name="unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588146838.955:6679): avc: denied { setrlimit } for pid=27779 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=process permissive=1', u'type=AVC msg=audit(1588146839.104:6698): avc: denied { create } for pid=27779 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=AVC msg=audit(1588146839.004:6681): avc: denied { read } for pid=27782 comm="unix_chkpwd" name="shadow" dev="sda1" ino=60365 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588146838.948:6678): avc: denied { execute } for pid=27779 comm="admin_socket" name="sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588146839.104:6696): avc: denied { read } for pid=27779 comm="sudo" name="utmp" dev="tmpfs" ino=13027 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588146839.003:6680): avc: denied { execute_no_trans } for pid=27782 comm="sudo" path="/usr/sbin/unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588146838.948:6678): avc: denied { execute_no_trans } for pid=27779 comm="admin_socket" path="/usr/bin/sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588146839.003:6680): avc: denied { map } for pid=27782 comm="unix_chkpwd" path="/usr/sbin/unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588146838.948:6678): avc: denied { map } for pid=27779 comm="sudo" path="/usr/bin/sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588146839.104:6699): avc: denied { audit_write } for pid=27779 comm="sudo" capability=29 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1', u'type=AVC msg=audit(1588146839.003:6680): avc: denied { read open } for pid=27782 comm="sudo" path="/usr/sbin/unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1', u'type=USER_AVC msg=audit(1588146839.006:6688): pid=2414 uid=81 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg=\'avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.login1.Manager member=CreateSession dest=org.freedesktop.login1 spid=27779 tpid=2570 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:systemd_logind_t:s0 tclass=dbus permissive=1 exe="/usr/bin/dbus-daemon" sauid=81 hostname=? addr=? terminal=?\'\x1dUID="dbus" AUID="unset" SAUID="dbus"']

pass 4990403 2020-04-27 05:15:34 2020-04-29 05:41:05 2020-04-29 08:23:07 2:42:02 0:12:25 2:29:37 smithi py2 ubuntu 18.04 ceph-ansible/smoke/basic/{0-clusters/4-node.yaml 1-distros/ubuntu_latest.yaml 2-ceph/ceph_ansible.yaml 3-config/bluestore_with_dmcrypt.yaml 4-tasks/rest.yaml} 4
fail 4990407 2020-04-27 05:15:35 2020-04-29 05:41:55 2020-04-29 07:59:56 2:18:01 0:12:37 2:05:24 smithi py2 centos 8.1 ceph-ansible/smoke/basic/{0-clusters/4-node.yaml 1-distros/centos_latest.yaml 2-ceph/ceph_ansible.yaml 3-config/bluestore_with_dmcrypt.yaml 4-tasks/ceph-admin-commands.yaml} 4
Failure Reason:

SELinux denials found on ubuntu@smithi181.front.sepia.ceph.com: [u'type=AVC msg=audit(1588146817.417:6631): avc: denied { audit_write } for pid=26692 comm="sudo" capability=29 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1', u'type=AVC msg=audit(1588146817.373:6625): avc: denied { execute_no_trans } for pid=26692 comm="admin_socket" path="/usr/bin/sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1', u'type=USER_AVC msg=audit(1588146817.504:6642): pid=2430 uid=81 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg=\'avc: denied { send_msg } for msgtype=method_return dest=:1.1355 spid=2578 tpid=26692 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=dbus permissive=1 exe="/usr/bin/dbus-daemon" sauid=81 hostname=? addr=? terminal=?\'\x1dUID="dbus" AUID="unset" SAUID="dbus"', u'type=AVC msg=audit(1588146817.505:6648): avc: denied { setrlimit } for pid=26708 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=process permissive=1', u'type=AVC msg=audit(1588146817.505:6646): avc: denied { audit_write } for pid=26692 comm="sudo" capability=29 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1', u'type=AVC msg=audit(1588146817.504:6644): avc: denied { lock } for pid=26692 comm="sudo" path="/run/utmp" dev="tmpfs" ino=13369 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588146817.415:6627): avc: denied { map } for pid=26695 comm="unix_chkpwd" path="/usr/sbin/unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588146817.417:6631): avc: denied { nlmsg_relay } for pid=26692 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=AVC msg=audit(1588146817.505:6648): avc: denied { sys_resource } for pid=26708 comm="sudo" capability=24 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1', u'type=AVC msg=audit(1588146817.380:6626): avc: denied { setrlimit } for pid=26692 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=process permissive=1', u'type=AVC msg=audit(1588146817.416:6628): avc: denied { open } for pid=26695 comm="unix_chkpwd" path="/etc/shadow" dev="sda1" ino=60364 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588146817.417:6630): avc: denied { create } for pid=26692 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=AVC msg=audit(1588146817.504:6643): avc: denied { read } for pid=26692 comm="sudo" name="utmp" dev="tmpfs" ino=13369 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588146817.416:6629): avc: denied { getattr } for pid=26695 comm="unix_chkpwd" path="/etc/shadow" dev="sda1" ino=60364 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588146817.415:6627): avc: denied { execute_no_trans } for pid=26695 comm="sudo" path="/usr/sbin/unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588146817.416:6628): avc: denied { read } for pid=26695 comm="unix_chkpwd" name="shadow" dev="sda1" ino=60364 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588146817.504:6643): avc: denied { open } for pid=26692 comm="sudo" path="/run/utmp" dev="tmpfs" ino=13369 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588146817.373:6625): avc: denied { execute } for pid=26692 comm="admin_socket" name="sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588146817.380:6626): avc: denied { sys_resource } for pid=26692 comm="sudo" capability=24 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1', u'type=AVC msg=audit(1588146817.505:6646): avc: denied { nlmsg_relay } for pid=26692 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=AVC msg=audit(1588146817.373:6625): avc: denied { read open } for pid=26692 comm="admin_socket" path="/usr/bin/sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1', u'type=USER_AVC msg=audit(1588146817.418:6635): pid=2430 uid=81 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg=\'avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.login1.Manager member=CreateSession dest=org.freedesktop.login1 spid=26692 tpid=2578 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:systemd_logind_t:s0 tclass=dbus permissive=1 exe="/usr/bin/dbus-daemon" sauid=81 hostname=? addr=? terminal=?\'\x1dUID="dbus" AUID="unset" SAUID="dbus"', u'type=AVC msg=audit(1588146817.373:6625): avc: denied { map } for pid=26692 comm="sudo" path="/usr/bin/sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588146817.415:6627): avc: denied { read open } for pid=26695 comm="sudo" path="/usr/sbin/unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588146817.415:6627): avc: denied { execute } for pid=26695 comm="sudo" name="unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588146817.505:6645): avc: denied { create } for pid=26692 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1']

pass 4990411 2020-04-27 05:15:36 2020-04-29 05:43:40 2020-04-29 07:01:40 1:18:00 0:12:28 1:05:32 smithi py2 ubuntu 18.04 ceph-ansible/smoke/basic/{0-clusters/3-node.yaml 1-distros/ubuntu_latest.yaml 2-ceph/ceph_ansible.yaml 3-config/dmcrypt_off.yaml 4-tasks/rbd_import_export.yaml} 3
fail 4990415 2020-04-27 05:15:36 2020-04-29 05:47:45 2020-04-29 06:27:45 0:40:00 0:12:15 0:27:45 smithi py2 centos 8.1 ceph-ansible/smoke/basic/{0-clusters/4-node.yaml 1-distros/centos_latest.yaml 2-ceph/ceph_ansible.yaml 3-config/dmcrypt_on.yaml 4-tasks/rest.yaml} 4
Failure Reason:

SELinux denials found on ubuntu@smithi103.front.sepia.ceph.com: [u'type=AVC msg=audit(1588141295.567:6396): avc: denied { execute } for pid=26006 comm="admin_socket" name="sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588141295.567:6396): avc: denied { read open } for pid=26006 comm="admin_socket" path="/usr/bin/sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588141295.610:6398): avc: denied { execute_no_trans } for pid=26009 comm="sudo" path="/usr/sbin/unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1', u'type=USER_AVC msg=audit(1588141295.613:6406): pid=2417 uid=81 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg=\'avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.login1.Manager member=CreateSession dest=org.freedesktop.login1 spid=26006 tpid=2562 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:systemd_logind_t:s0 tclass=dbus permissive=1 exe="/usr/bin/dbus-daemon" sauid=81 hostname=? addr=? terminal=?\'\x1dUID="dbus" AUID="unset" SAUID="dbus"', u'type=AVC msg=audit(1588141295.610:6398): avc: denied { execute } for pid=26009 comm="sudo" name="unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588141295.699:6419): avc: denied { sys_resource } for pid=26021 comm="sudo" capability=24 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1', u'type=USER_AVC msg=audit(1588141295.698:6413): pid=2417 uid=81 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg=\'avc: denied { send_msg } for msgtype=method_return dest=:1.1322 spid=2562 tpid=26006 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=dbus permissive=1 exe="/usr/bin/dbus-daemon" sauid=81 hostname=? addr=? terminal=?\'\x1dUID="dbus" AUID="unset" SAUID="dbus"', u'type=AVC msg=audit(1588141295.698:6417): avc: denied { nlmsg_relay } for pid=26006 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=AVC msg=audit(1588141295.698:6414): avc: denied { read } for pid=26006 comm="sudo" name="utmp" dev="tmpfs" ino=16419 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588141295.612:6402): avc: denied { nlmsg_relay } for pid=26006 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=AVC msg=audit(1588141295.574:6397): avc: denied { setrlimit } for pid=26006 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=process permissive=1', u'type=AVC msg=audit(1588141295.612:6402): avc: denied { audit_write } for pid=26006 comm="sudo" capability=29 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1', u'type=AVC msg=audit(1588141295.574:6397): avc: denied { sys_resource } for pid=26006 comm="sudo" capability=24 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1', u'type=AVC msg=audit(1588141295.611:6399): avc: denied { read } for pid=26009 comm="unix_chkpwd" name="shadow" dev="sda1" ino=60364 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588141295.698:6416): avc: denied { create } for pid=26006 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=AVC msg=audit(1588141295.567:6396): avc: denied { map } for pid=26006 comm="sudo" path="/usr/bin/sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588141295.698:6414): avc: denied { open } for pid=26006 comm="sudo" path="/run/utmp" dev="tmpfs" ino=16419 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588141295.611:6400): avc: denied { getattr } for pid=26009 comm="unix_chkpwd" path="/etc/shadow" dev="sda1" ino=60364 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588141295.610:6398): avc: denied { map } for pid=26009 comm="unix_chkpwd" path="/usr/sbin/unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588141295.567:6396): avc: denied { execute_no_trans } for pid=26006 comm="admin_socket" path="/usr/bin/sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588141295.611:6399): avc: denied { open } for pid=26009 comm="unix_chkpwd" path="/etc/shadow" dev="sda1" ino=60364 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588141295.698:6417): avc: denied { audit_write } for pid=26006 comm="sudo" capability=29 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1', u'type=AVC msg=audit(1588141295.698:6415): avc: denied { lock } for pid=26006 comm="sudo" path="/run/utmp" dev="tmpfs" ino=16419 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588141295.699:6419): avc: denied { setrlimit } for pid=26021 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=process permissive=1', u'type=AVC msg=audit(1588141295.611:6401): avc: denied { create } for pid=26006 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=AVC msg=audit(1588141295.610:6398): avc: denied { read open } for pid=26009 comm="sudo" path="/usr/sbin/unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1']

pass 4990419 2020-04-27 05:15:37 2020-04-29 05:50:02 2020-04-29 06:18:01 0:27:59 0:11:54 0:16:05 smithi py2 ubuntu 18.04 ceph-ansible/smoke/basic/{0-clusters/3-node.yaml 1-distros/ubuntu_latest.yaml 2-ceph/ceph_ansible.yaml 3-config/dmcrypt_on.yaml 4-tasks/ceph-admin-commands.yaml} 3
fail 4990423 2020-04-27 05:15:38 2020-04-29 05:56:04 2020-04-29 06:58:04 1:02:00 0:12:12 0:49:48 smithi py2 centos 8.1 ceph-ansible/smoke/basic/{0-clusters/4-node.yaml 1-distros/centos_latest.yaml 2-ceph/ceph_ansible.yaml 3-config/bluestore_with_dmcrypt.yaml 4-tasks/rbd_import_export.yaml} 4
Failure Reason:

SELinux denials found on ubuntu@smithi095.front.sepia.ceph.com: [u'type=AVC msg=audit(1588143148.192:6407): avc: denied { read } for pid=26006 comm="sudo" name="utmp" dev="tmpfs" ino=13427 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588143148.192:6409): avc: denied { create } for pid=26006 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=USER_AVC msg=audit(1588143148.192:6406): pid=2424 uid=81 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg=\'avc: denied { send_msg } for msgtype=method_return dest=:1.1322 spid=2578 tpid=26006 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=dbus permissive=1 exe="/usr/bin/dbus-daemon" sauid=81 hostname=? addr=? terminal=?\'\x1dUID="dbus" AUID="unset" SAUID="dbus"', u'type=AVC msg=audit(1588143148.105:6394): avc: denied { create } for pid=26006 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=AVC msg=audit(1588143148.061:6389): avc: denied { map } for pid=26006 comm="sudo" path="/usr/bin/sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588143148.104:6391): avc: denied { execute_no_trans } for pid=26009 comm="sudo" path="/usr/sbin/unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588143148.192:6410): avc: denied { audit_write } for pid=26006 comm="sudo" capability=29 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1', u'type=AVC msg=audit(1588143148.105:6395): avc: denied { nlmsg_relay } for pid=26006 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=AVC msg=audit(1588143148.105:6393): avc: denied { getattr } for pid=26009 comm="unix_chkpwd" path="/etc/shadow" dev="sda1" ino=60364 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588143148.061:6389): avc: denied { read open } for pid=26006 comm="admin_socket" path="/usr/bin/sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588143148.192:6408): avc: denied { lock } for pid=26006 comm="sudo" path="/run/utmp" dev="tmpfs" ino=13427 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588143148.068:6390): avc: denied { setrlimit } for pid=26006 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=process permissive=1', u'type=AVC msg=audit(1588143148.061:6389): avc: denied { execute_no_trans } for pid=26006 comm="admin_socket" path="/usr/bin/sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588143148.068:6390): avc: denied { sys_resource } for pid=26006 comm="sudo" capability=24 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1', u'type=AVC msg=audit(1588143148.105:6392): avc: denied { open } for pid=26009 comm="unix_chkpwd" path="/etc/shadow" dev="sda1" ino=60364 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588143148.104:6391): avc: denied { map } for pid=26009 comm="unix_chkpwd" path="/usr/sbin/unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588143148.192:6407): avc: denied { open } for pid=26006 comm="sudo" path="/run/utmp" dev="tmpfs" ino=13427 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588143148.193:6412): avc: denied { sys_resource } for pid=26021 comm="sudo" capability=24 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1', u'type=AVC msg=audit(1588143148.104:6391): avc: denied { read open } for pid=26009 comm="sudo" path="/usr/sbin/unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1', u'type=USER_AVC msg=audit(1588143148.107:6399): pid=2424 uid=81 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg=\'avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.login1.Manager member=CreateSession dest=org.freedesktop.login1 spid=26006 tpid=2578 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:systemd_logind_t:s0 tclass=dbus permissive=1 exe="/usr/bin/dbus-daemon" sauid=81 hostname=? addr=? terminal=?\'\x1dUID="dbus" AUID="unset" SAUID="dbus"', u'type=AVC msg=audit(1588143148.105:6392): avc: denied { read } for pid=26009 comm="unix_chkpwd" name="shadow" dev="sda1" ino=60364 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588143148.105:6395): avc: denied { audit_write } for pid=26006 comm="sudo" capability=29 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1', u'type=AVC msg=audit(1588143148.192:6410): avc: denied { nlmsg_relay } for pid=26006 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=AVC msg=audit(1588143148.193:6412): avc: denied { setrlimit } for pid=26021 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=process permissive=1', u'type=AVC msg=audit(1588143148.061:6389): avc: denied { execute } for pid=26006 comm="admin_socket" name="sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588143148.104:6391): avc: denied { execute } for pid=26009 comm="sudo" name="unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1']

pass 4990426 2020-04-27 05:15:39 2020-04-29 05:58:02 2020-04-29 06:22:02 0:24:00 0:11:35 0:12:25 smithi py2 ubuntu 18.04 ceph-ansible/smoke/basic/{0-clusters/3-node.yaml 1-distros/ubuntu_latest.yaml 2-ceph/ceph_ansible.yaml 3-config/dmcrypt_off.yaml 4-tasks/rest.yaml} 3
fail 4990431 2020-04-27 05:15:40 2020-04-29 05:59:42 2020-04-29 07:21:42 1:22:00 0:11:29 1:10:31 smithi py2 centos 8.1 ceph-ansible/smoke/basic/{0-clusters/4-node.yaml 1-distros/centos_latest.yaml 2-ceph/ceph_ansible.yaml 3-config/dmcrypt_off.yaml 4-tasks/ceph-admin-commands.yaml} 4
Failure Reason:

SELinux denials found on ubuntu@smithi064.front.sepia.ceph.com: [u'type=AVC msg=audit(1588144558.326:6607): avc: denied { read open } for pid=26572 comm="sudo" path="/usr/sbin/unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588144558.271:6605): avc: denied { map } for pid=26569 comm="sudo" path="/usr/bin/sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588144558.278:6606): avc: denied { sys_resource } for pid=26569 comm="sudo" capability=24 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1', u'type=AVC msg=audit(1588144558.326:6607): avc: denied { map } for pid=26572 comm="unix_chkpwd" path="/usr/sbin/unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588144558.327:6609): avc: denied { getattr } for pid=26572 comm="unix_chkpwd" path="/etc/shadow" dev="sda1" ino=60364 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588144558.327:6608): avc: denied { read } for pid=26572 comm="unix_chkpwd" name="shadow" dev="sda1" ino=60364 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588144558.425:6624): avc: denied { lock } for pid=26569 comm="sudo" path="/run/utmp" dev="tmpfs" ino=17473 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588144558.278:6606): avc: denied { setrlimit } for pid=26569 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=process permissive=1', u'type=AVC msg=audit(1588144558.425:6626): avc: denied { nlmsg_relay } for pid=26569 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=AVC msg=audit(1588144558.271:6605): avc: denied { execute } for pid=26569 comm="admin_socket" name="sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588144558.271:6605): avc: denied { read open } for pid=26569 comm="admin_socket" path="/usr/bin/sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1', u'type=USER_AVC msg=audit(1588144558.425:6622): pid=2393 uid=81 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg=\'avc: denied { send_msg } for msgtype=method_return dest=:1.1351 spid=2550 tpid=26569 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=dbus permissive=1 exe="/usr/bin/dbus-daemon" sauid=81 hostname=? addr=? terminal=?\'\x1dUID="dbus" AUID="unset" SAUID="dbus"', u'type=AVC msg=audit(1588144558.425:6623): avc: denied { open } for pid=26569 comm="sudo" path="/run/utmp" dev="tmpfs" ino=17473 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588144558.425:6625): avc: denied { create } for pid=26569 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=AVC msg=audit(1588144558.327:6611): avc: denied { nlmsg_relay } for pid=26569 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=AVC msg=audit(1588144558.326:6607): avc: denied { execute } for pid=26572 comm="sudo" name="unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588144558.425:6626): avc: denied { audit_write } for pid=26569 comm="sudo" capability=29 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1', u'type=AVC msg=audit(1588144558.425:6623): avc: denied { read } for pid=26569 comm="sudo" name="utmp" dev="tmpfs" ino=17473 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588144558.327:6610): avc: denied { create } for pid=26569 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=AVC msg=audit(1588144558.426:6628): avc: denied { setrlimit } for pid=26584 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=process permissive=1', u'type=AVC msg=audit(1588144558.326:6607): avc: denied { execute_no_trans } for pid=26572 comm="sudo" path="/usr/sbin/unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588144558.426:6628): avc: denied { sys_resource } for pid=26584 comm="sudo" capability=24 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1', u'type=USER_AVC msg=audit(1588144558.329:6615): pid=2393 uid=81 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg=\'avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.login1.Manager member=CreateSession dest=org.freedesktop.login1 spid=26569 tpid=2550 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:systemd_logind_t:s0 tclass=dbus permissive=1 exe="/usr/bin/dbus-daemon" sauid=81 hostname=? addr=? terminal=?\'\x1dUID="dbus" AUID="unset" SAUID="dbus"', u'type=AVC msg=audit(1588144558.327:6608): avc: denied { open } for pid=26572 comm="unix_chkpwd" path="/etc/shadow" dev="sda1" ino=60364 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588144558.327:6611): avc: denied { audit_write } for pid=26569 comm="sudo" capability=29 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1', u'type=AVC msg=audit(1588144558.271:6605): avc: denied { execute_no_trans } for pid=26569 comm="admin_socket" path="/usr/bin/sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1']

pass 4990436 2020-04-27 05:15:40 2020-04-29 06:24:19 2020-04-29 07:44:20 1:20:01 0:12:26 1:07:35 smithi py2 ubuntu 18.04 ceph-ansible/smoke/basic/{0-clusters/3-node.yaml 1-distros/ubuntu_latest.yaml 2-ceph/ceph_ansible.yaml 3-config/dmcrypt_on.yaml 4-tasks/rbd_import_export.yaml} 3
fail 4990440 2020-04-27 05:15:41 2020-04-29 06:27:47 2020-04-29 06:51:47 0:24:00 0:11:59 0:12:01 smithi py2 centos 8.1 ceph-ansible/smoke/basic/{0-clusters/4-node.yaml 1-distros/centos_latest.yaml 2-ceph/ceph_ansible.yaml 3-config/bluestore_with_dmcrypt.yaml 4-tasks/rest.yaml} 4
Failure Reason:

SELinux denials found on ubuntu@smithi175.front.sepia.ceph.com: [u'type=AVC msg=audit(1588142695.828:6400): avc: denied { audit_write } for pid=26052 comm="sudo" capability=29 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1', u'type=AVC msg=audit(1588142695.828:6400): avc: denied { nlmsg_relay } for pid=26052 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=AVC msg=audit(1588142695.826:6396): avc: denied { map } for pid=26055 comm="unix_chkpwd" path="/usr/sbin/unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1', u'type=USER_AVC msg=audit(1588142695.913:6411): pid=2429 uid=81 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg=\'avc: denied { send_msg } for msgtype=method_return dest=:1.1322 spid=2598 tpid=26052 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=dbus permissive=1 exe="/usr/bin/dbus-daemon" sauid=81 hostname=? addr=? terminal=?\'\x1dUID="dbus" AUID="unset" SAUID="dbus"', u'type=AVC msg=audit(1588142695.827:6397): avc: denied { open } for pid=26055 comm="unix_chkpwd" path="/etc/shadow" dev="sda1" ino=60364 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588142695.914:6412): avc: denied { read } for pid=26052 comm="sudo" name="utmp" dev="tmpfs" ino=4380 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588142695.914:6412): avc: denied { open } for pid=26052 comm="sudo" path="/run/utmp" dev="tmpfs" ino=4380 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588142695.783:6394): avc: denied { map } for pid=26052 comm="sudo" path="/usr/bin/sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588142695.914:6414): avc: denied { create } for pid=26052 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=USER_AVC msg=audit(1588142695.829:6404): pid=2429 uid=81 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg=\'avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.login1.Manager member=CreateSession dest=org.freedesktop.login1 spid=26052 tpid=2598 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:systemd_logind_t:s0 tclass=dbus permissive=1 exe="/usr/bin/dbus-daemon" sauid=81 hostname=? addr=? terminal=?\'\x1dUID="dbus" AUID="unset" SAUID="dbus"', u'type=AVC msg=audit(1588142695.827:6398): avc: denied { getattr } for pid=26055 comm="unix_chkpwd" path="/etc/shadow" dev="sda1" ino=60364 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588142695.826:6396): avc: denied { read open } for pid=26055 comm="sudo" path="/usr/sbin/unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588142695.827:6397): avc: denied { read } for pid=26055 comm="unix_chkpwd" name="shadow" dev="sda1" ino=60364 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588142695.914:6413): avc: denied { lock } for pid=26052 comm="sudo" path="/run/utmp" dev="tmpfs" ino=4380 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588142695.783:6394): avc: denied { execute } for pid=26052 comm="admin_socket" name="sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588142695.790:6395): avc: denied { setrlimit } for pid=26052 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=process permissive=1', u'type=AVC msg=audit(1588142695.790:6395): avc: denied { sys_resource } for pid=26052 comm="sudo" capability=24 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1', u'type=AVC msg=audit(1588142695.826:6396): avc: denied { execute_no_trans } for pid=26055 comm="sudo" path="/usr/sbin/unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588142695.826:6396): avc: denied { execute } for pid=26055 comm="sudo" name="unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588142695.915:6417): avc: denied { sys_resource } for pid=26066 comm="sudo" capability=24 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1', u'type=AVC msg=audit(1588142695.783:6394): avc: denied { execute_no_trans } for pid=26052 comm="admin_socket" path="/usr/bin/sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588142695.827:6399): avc: denied { create } for pid=26052 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=AVC msg=audit(1588142695.914:6415): avc: denied { audit_write } for pid=26052 comm="sudo" capability=29 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1', u'type=AVC msg=audit(1588142695.914:6415): avc: denied { nlmsg_relay } for pid=26052 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=AVC msg=audit(1588142695.915:6417): avc: denied { setrlimit } for pid=26066 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=process permissive=1', u'type=AVC msg=audit(1588142695.783:6394): avc: denied { read open } for pid=26052 comm="admin_socket" path="/usr/bin/sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1']

pass 4990444 2020-04-27 05:15:42 2020-04-29 06:30:23 2020-04-29 07:02:22 0:31:59 0:12:13 0:19:46 smithi py2 ubuntu 18.04 ceph-ansible/smoke/basic/{0-clusters/3-node.yaml 1-distros/ubuntu_latest.yaml 2-ceph/ceph_ansible.yaml 3-config/bluestore_with_dmcrypt.yaml 4-tasks/ceph-admin-commands.yaml} 3
fail 4990447 2020-04-27 05:15:43 2020-04-29 06:32:04 2020-04-29 06:58:04 0:26:00 0:11:47 0:14:13 smithi py2 centos 8.1 ceph-ansible/smoke/basic/{0-clusters/4-node.yaml 1-distros/centos_latest.yaml 2-ceph/ceph_ansible.yaml 3-config/dmcrypt_off.yaml 4-tasks/rbd_import_export.yaml} 4
Failure Reason:

SELinux denials found on ubuntu@smithi060.front.sepia.ceph.com: [u'type=AVC msg=audit(1588143166.268:6395): avc: denied { read open } for pid=26050 comm="sudo" path="/usr/sbin/unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588143166.213:6393): avc: denied { read open } for pid=26047 comm="admin_socket" path="/usr/bin/sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588143166.371:6413): avc: denied { create } for pid=26047 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=AVC msg=audit(1588143166.372:6416): avc: denied { sys_resource } for pid=26063 comm="sudo" capability=24 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1', u'type=AVC msg=audit(1588143166.269:6398): avc: denied { create } for pid=26047 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=USER_AVC msg=audit(1588143166.271:6403): pid=2399 uid=81 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg=\'avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.login1.Manager member=CreateSession dest=org.freedesktop.login1 spid=26047 tpid=2585 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:systemd_logind_t:s0 tclass=dbus permissive=1 exe="/usr/bin/dbus-daemon" sauid=81 hostname=? addr=? terminal=?\'\x1dUID="dbus" AUID="unset" SAUID="dbus"', u'type=AVC msg=audit(1588143166.371:6411): avc: denied { open } for pid=26047 comm="sudo" path="/run/utmp" dev="tmpfs" ino=16429 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588143166.268:6395): avc: denied { execute } for pid=26050 comm="sudo" name="unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588143166.268:6395): avc: denied { map } for pid=26050 comm="unix_chkpwd" path="/usr/sbin/unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588143166.221:6394): avc: denied { sys_resource } for pid=26047 comm="sudo" capability=24 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1', u'type=AVC msg=audit(1588143166.269:6399): avc: denied { audit_write } for pid=26047 comm="sudo" capability=29 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1', u'type=AVC msg=audit(1588143166.371:6414): avc: denied { audit_write } for pid=26047 comm="sudo" capability=29 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1', u'type=AVC msg=audit(1588143166.371:6411): avc: denied { read } for pid=26047 comm="sudo" name="utmp" dev="tmpfs" ino=16429 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588143166.371:6414): avc: denied { nlmsg_relay } for pid=26047 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=AVC msg=audit(1588143166.268:6395): avc: denied { execute_no_trans } for pid=26050 comm="sudo" path="/usr/sbin/unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588143166.221:6394): avc: denied { setrlimit } for pid=26047 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=process permissive=1', u'type=AVC msg=audit(1588143166.269:6396): avc: denied { open } for pid=26050 comm="unix_chkpwd" path="/etc/shadow" dev="sda1" ino=60363 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588143166.372:6416): avc: denied { setrlimit } for pid=26063 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=process permissive=1', u'type=AVC msg=audit(1588143166.213:6393): avc: denied { execute } for pid=26047 comm="admin_socket" name="sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588143166.371:6412): avc: denied { lock } for pid=26047 comm="sudo" path="/run/utmp" dev="tmpfs" ino=16429 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file permissive=1', u'type=USER_AVC msg=audit(1588143166.371:6410): pid=2399 uid=81 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg=\'avc: denied { send_msg } for msgtype=method_return dest=:1.1323 spid=2585 tpid=26047 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=dbus permissive=1 exe="/usr/bin/dbus-daemon" sauid=81 hostname=? addr=? terminal=?\'\x1dUID="dbus" AUID="unset" SAUID="dbus"', u'type=AVC msg=audit(1588143166.269:6396): avc: denied { read } for pid=26050 comm="unix_chkpwd" name="shadow" dev="sda1" ino=60363 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588143166.269:6399): avc: denied { nlmsg_relay } for pid=26047 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=AVC msg=audit(1588143166.213:6393): avc: denied { map } for pid=26047 comm="sudo" path="/usr/bin/sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588143166.213:6393): avc: denied { execute_no_trans } for pid=26047 comm="admin_socket" path="/usr/bin/sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588143166.269:6397): avc: denied { getattr } for pid=26050 comm="unix_chkpwd" path="/etc/shadow" dev="sda1" ino=60363 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file permissive=1']

pass 4990452 2020-04-27 05:15:44 2020-04-29 06:40:00 2020-04-29 07:12:00 0:32:00 0:12:40 0:19:20 smithi py2 ubuntu 18.04 ceph-ansible/smoke/basic/{0-clusters/3-node.yaml 1-distros/ubuntu_latest.yaml 2-ceph/ceph_ansible.yaml 3-config/dmcrypt_on.yaml 4-tasks/rest.yaml} 3
fail 4990456 2020-04-27 05:15:45 2020-04-29 06:40:02 2020-04-29 09:12:04 2:32:02 0:11:57 2:20:05 smithi py2 centos 8.1 ceph-ansible/smoke/basic/{0-clusters/4-node.yaml 1-distros/centos_latest.yaml 2-ceph/ceph_ansible.yaml 3-config/dmcrypt_on.yaml 4-tasks/ceph-admin-commands.yaml} 4
Failure Reason:

SELinux denials found on ubuntu@smithi043.front.sepia.ceph.com: [u'type=AVC msg=audit(1588151198.611:6505): avc: denied { read open } for pid=26435 comm="admin_socket" path="/usr/bin/sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588151198.768:6525): avc: denied { create } for pid=26435 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=AVC msg=audit(1588151198.668:6510): avc: denied { create } for pid=26435 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=AVC msg=audit(1588151198.668:6511): avc: denied { audit_write } for pid=26435 comm="sudo" capability=29 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1', u'type=AVC msg=audit(1588151198.768:6526): avc: denied { nlmsg_relay } for pid=26435 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=AVC msg=audit(1588151198.767:6524): avc: denied { lock } for pid=26435 comm="sudo" path="/run/utmp" dev="tmpfs" ino=14045 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588151198.768:6528): avc: denied { setrlimit } for pid=26449 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=process permissive=1', u'type=AVC msg=audit(1588151198.666:6507): avc: denied { execute } for pid=26438 comm="sudo" name="unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588151198.767:6523): avc: denied { read } for pid=26435 comm="sudo" name="utmp" dev="tmpfs" ino=14045 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588151198.666:6507): avc: denied { map } for pid=26438 comm="unix_chkpwd" path="/usr/sbin/unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588151198.611:6505): avc: denied { map } for pid=26435 comm="sudo" path="/usr/bin/sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588151198.611:6505): avc: denied { execute_no_trans } for pid=26435 comm="admin_socket" path="/usr/bin/sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588151198.668:6508): avc: denied { open } for pid=26438 comm="unix_chkpwd" path="/etc/shadow" dev="sda1" ino=60364 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588151198.666:6507): avc: denied { read open } for pid=26438 comm="sudo" path="/usr/sbin/unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588151198.768:6528): avc: denied { sys_resource } for pid=26449 comm="sudo" capability=24 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1', u'type=AVC msg=audit(1588151198.668:6511): avc: denied { nlmsg_relay } for pid=26435 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=AVC msg=audit(1588151198.618:6506): avc: denied { sys_resource } for pid=26435 comm="sudo" capability=24 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1', u'type=AVC msg=audit(1588151198.768:6526): avc: denied { audit_write } for pid=26435 comm="sudo" capability=29 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1', u'type=AVC msg=audit(1588151198.668:6508): avc: denied { read } for pid=26438 comm="unix_chkpwd" name="shadow" dev="sda1" ino=60364 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588151198.668:6509): avc: denied { getattr } for pid=26438 comm="unix_chkpwd" path="/etc/shadow" dev="sda1" ino=60364 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588151198.767:6523): avc: denied { open } for pid=26435 comm="sudo" path="/run/utmp" dev="tmpfs" ino=14045 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588151198.618:6506): avc: denied { setrlimit } for pid=26435 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=process permissive=1', u'type=USER_AVC msg=audit(1588151198.767:6522): pid=2431 uid=81 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg=\'avc: denied { send_msg } for msgtype=method_return dest=:1.1345 spid=2559 tpid=26435 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=dbus permissive=1 exe="/usr/bin/dbus-daemon" sauid=81 hostname=? addr=? terminal=?\'\x1dUID="dbus" AUID="unset" SAUID="dbus"', u'type=AVC msg=audit(1588151198.666:6507): avc: denied { execute_no_trans } for pid=26438 comm="sudo" path="/usr/sbin/unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588151198.611:6505): avc: denied { execute } for pid=26435 comm="admin_socket" name="sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1', u'type=USER_AVC msg=audit(1588151198.670:6515): pid=2431 uid=81 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg=\'avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.login1.Manager member=CreateSession dest=org.freedesktop.login1 spid=26435 tpid=2559 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:systemd_logind_t:s0 tclass=dbus permissive=1 exe="/usr/bin/dbus-daemon" sauid=81 hostname=? addr=? terminal=?\'\x1dUID="dbus" AUID="unset" SAUID="dbus"']

pass 4990461 2020-04-27 05:15:45 2020-04-29 07:47:49 2020-04-29 08:11:49 0:24:00 0:12:45 0:11:15 smithi py2 ubuntu 18.04 ceph-ansible/smoke/basic/{0-clusters/3-node.yaml 1-distros/ubuntu_latest.yaml 2-ceph/ceph_ansible.yaml 3-config/bluestore_with_dmcrypt.yaml 4-tasks/rbd_import_export.yaml} 3
fail 4990465 2020-04-27 05:15:46 2020-04-29 07:50:21 2020-04-29 10:02:22 2:12:01 0:12:29 1:59:32 smithi py2 centos 8.1 ceph-ansible/smoke/basic/{0-clusters/4-node.yaml 1-distros/centos_latest.yaml 2-ceph/ceph_ansible.yaml 3-config/dmcrypt_off.yaml 4-tasks/rest.yaml} 4
Failure Reason:

SELinux denials found on ubuntu@smithi112.front.sepia.ceph.com: [u'type=AVC msg=audit(1588154135.444:6504): avc: denied { execute_no_trans } for pid=26430 comm="admin_socket" path="/usr/bin/sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588154135.488:6506): avc: denied { map } for pid=26433 comm="unix_chkpwd" path="/usr/sbin/unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588154135.488:6506): avc: denied { execute_no_trans } for pid=26433 comm="sudo" path="/usr/sbin/unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588154135.575:6527): avc: denied { sys_resource } for pid=26446 comm="sudo" capability=24 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1', u'type=USER_AVC msg=audit(1588154135.491:6514): pid=2421 uid=81 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg=\'avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.login1.Manager member=CreateSession dest=org.freedesktop.login1 spid=26430 tpid=2567 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:systemd_logind_t:s0 tclass=dbus permissive=1 exe="/usr/bin/dbus-daemon" sauid=81 hostname=? addr=? terminal=?\'\x1dUID="dbus" AUID="unset" SAUID="dbus"', u'type=AVC msg=audit(1588154135.444:6504): avc: denied { read open } for pid=26430 comm="admin_socket" path="/usr/bin/sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588154135.489:6507): avc: denied { open } for pid=26433 comm="unix_chkpwd" path="/etc/shadow" dev="sda1" ino=60364 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588154135.489:6509): avc: denied { create } for pid=26430 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=AVC msg=audit(1588154135.574:6524): avc: denied { create } for pid=26430 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=AVC msg=audit(1588154135.488:6506): avc: denied { execute } for pid=26433 comm="sudo" name="unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588154135.574:6522): avc: denied { open } for pid=26430 comm="sudo" path="/run/utmp" dev="tmpfs" ino=16465 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588154135.575:6527): avc: denied { setrlimit } for pid=26446 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=process permissive=1', u'type=AVC msg=audit(1588154135.451:6505): avc: denied { sys_resource } for pid=26430 comm="sudo" capability=24 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1', u'type=AVC msg=audit(1588154135.489:6507): avc: denied { read } for pid=26433 comm="unix_chkpwd" name="shadow" dev="sda1" ino=60364 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588154135.489:6508): avc: denied { getattr } for pid=26433 comm="unix_chkpwd" path="/etc/shadow" dev="sda1" ino=60364 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588154135.574:6522): avc: denied { read } for pid=26430 comm="sudo" name="utmp" dev="tmpfs" ino=16465 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588154135.451:6505): avc: denied { setrlimit } for pid=26430 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=process permissive=1', u'type=AVC msg=audit(1588154135.575:6525): avc: denied { audit_write } for pid=26430 comm="sudo" capability=29 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1', u'type=AVC msg=audit(1588154135.574:6523): avc: denied { lock } for pid=26430 comm="sudo" path="/run/utmp" dev="tmpfs" ino=16465 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588154135.489:6510): avc: denied { nlmsg_relay } for pid=26430 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=AVC msg=audit(1588154135.488:6506): avc: denied { read open } for pid=26433 comm="sudo" path="/usr/sbin/unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1', u'type=USER_AVC msg=audit(1588154135.574:6521): pid=2421 uid=81 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg=\'avc: denied { send_msg } for msgtype=method_return dest=:1.1345 spid=2567 tpid=26430 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=dbus permissive=1 exe="/usr/bin/dbus-daemon" sauid=81 hostname=? addr=? terminal=?\'\x1dUID="dbus" AUID="unset" SAUID="dbus"', u'type=AVC msg=audit(1588154135.444:6504): avc: denied { map } for pid=26430 comm="sudo" path="/usr/bin/sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588154135.489:6510): avc: denied { audit_write } for pid=26430 comm="sudo" capability=29 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1', u'type=AVC msg=audit(1588154135.575:6525): avc: denied { nlmsg_relay } for pid=26430 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=AVC msg=audit(1588154135.444:6504): avc: denied { execute } for pid=26430 comm="admin_socket" name="sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1']

pass 4990468 2020-04-27 05:15:47 2020-04-29 07:50:29 2020-04-29 08:22:29 0:32:00 0:11:33 0:20:27 smithi py2 ubuntu 18.04 ceph-ansible/smoke/basic/{0-clusters/3-node.yaml 1-distros/ubuntu_latest.yaml 2-ceph/ceph_ansible.yaml 3-config/dmcrypt_off.yaml 4-tasks/ceph-admin-commands.yaml} 3
fail 4990472 2020-04-27 05:15:48 2020-04-29 07:54:12 2020-04-29 10:46:14 2:52:02 0:12:37 2:39:25 smithi py2 centos 8.1 ceph-ansible/smoke/basic/{0-clusters/4-node.yaml 1-distros/centos_latest.yaml 2-ceph/ceph_ansible.yaml 3-config/dmcrypt_on.yaml 4-tasks/rbd_import_export.yaml} 4
Failure Reason:

SELinux denials found on ubuntu@smithi028.front.sepia.ceph.com: [u'type=AVC msg=audit(1588156729.178:6805): avc: denied { open } for pid=27230 comm="sudo" path="/run/utmp" dev="tmpfs" ino=16440 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file permissive=1', u'type=USER_AVC msg=audit(1588156729.177:6804): pid=2400 uid=81 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg=\'avc: denied { send_msg } for msgtype=method_return dest=:1.1389 spid=2566 tpid=27230 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=dbus permissive=1 exe="/usr/bin/dbus-daemon" sauid=81 hostname=? addr=? terminal=?\'\x1dUID="dbus" AUID="unset" SAUID="dbus"', u'type=AVC msg=audit(1588156729.178:6805): avc: denied { read } for pid=27230 comm="sudo" name="utmp" dev="tmpfs" ino=16440 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588156729.178:6810): avc: denied { sys_resource } for pid=27245 comm="sudo" capability=24 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1', u'type=AVC msg=audit(1588156729.080:6793): avc: denied { audit_write } for pid=27230 comm="sudo" capability=29 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1', u'type=AVC msg=audit(1588156729.023:6787): avc: denied { execute_no_trans } for pid=27230 comm="admin_socket" path="/usr/bin/sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588156729.079:6791): avc: denied { getattr } for pid=27233 comm="unix_chkpwd" path="/etc/shadow" dev="sda1" ino=60373 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588156729.078:6789): avc: denied { map } for pid=27233 comm="unix_chkpwd" path="/usr/sbin/unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588156729.178:6806): avc: denied { lock } for pid=27230 comm="sudo" path="/run/utmp" dev="tmpfs" ino=16440 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588156729.178:6808): avc: denied { nlmsg_relay } for pid=27230 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=AVC msg=audit(1588156729.078:6789): avc: denied { execute_no_trans } for pid=27233 comm="sudo" path="/usr/sbin/unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588156729.078:6789): avc: denied { read open } for pid=27233 comm="sudo" path="/usr/sbin/unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588156729.080:6793): avc: denied { nlmsg_relay } for pid=27230 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=AVC msg=audit(1588156729.080:6792): avc: denied { create } for pid=27230 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=AVC msg=audit(1588156729.178:6808): avc: denied { audit_write } for pid=27230 comm="sudo" capability=29 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1', u'type=AVC msg=audit(1588156729.078:6789): avc: denied { execute } for pid=27233 comm="sudo" name="unix_chkpwd" dev="sda1" ino=3608 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588156729.031:6788): avc: denied { setrlimit } for pid=27230 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=process permissive=1', u'type=AVC msg=audit(1588156729.079:6790): avc: denied { read } for pid=27233 comm="unix_chkpwd" name="shadow" dev="sda1" ino=60373 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588156729.023:6787): avc: denied { execute } for pid=27230 comm="admin_socket" name="sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588156729.178:6807): avc: denied { create } for pid=27230 comm="sudo" scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=netlink_audit_socket permissive=1', u'type=AVC msg=audit(1588156729.079:6790): avc: denied { open } for pid=27233 comm="unix_chkpwd" path="/etc/shadow" dev="sda1" ino=60373 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588156729.031:6788): avc: denied { sys_resource } for pid=27230 comm="sudo" capability=24 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:ceph_t:s0 tclass=capability permissive=1', u'type=USER_AVC msg=audit(1588156729.081:6797): pid=2400 uid=81 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg=\'avc: denied { send_msg } for msgtype=method_call interface=org.freedesktop.login1.Manager member=CreateSession dest=org.freedesktop.login1 spid=27230 tpid=2566 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:system_r:systemd_logind_t:s0 tclass=dbus permissive=1 exe="/usr/bin/dbus-daemon" sauid=81 hostname=? addr=? terminal=?\'\x1dUID="dbus" AUID="unset" SAUID="dbus"', u'type=AVC msg=audit(1588156729.023:6787): avc: denied { read open } for pid=27230 comm="admin_socket" path="/usr/bin/sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1', u'type=AVC msg=audit(1588156729.023:6787): avc: denied { map } for pid=27230 comm="sudo" path="/usr/bin/sudo" dev="sda1" ino=5360 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1']

pass 4990476 2020-04-27 05:15:49 2020-04-29 07:56:16 2020-04-29 08:48:16 0:52:00 0:12:50 0:39:10 smithi py2 ubuntu 18.04 ceph-ansible/smoke/basic/{0-clusters/3-node.yaml 1-distros/ubuntu_latest.yaml 2-ceph/ceph_ansible.yaml 3-config/bluestore_with_dmcrypt.yaml 4-tasks/rest.yaml} 3