Description: rbd/qemu/{cache/writeback.yaml clusters/{fixed-3.yaml openstack.yaml} features/journaling.yaml msgr-failures/few.yaml objectstore/filestore-xfs.yaml pool/none.yaml supported-random-distro$/{rhel_latest.yaml} workloads/qemu_xfstests.yaml}

Log: http://qa-proxy.ceph.com/teuthology/yuriw-2019-08-23_15:19:05-rbd-wip_nautilus_14.2.3_RC1-distro-basic-smithi/4245580/teuthology.log

Failure Reason:

SELinux denials found on ubuntu@smithi045.front.sepia.ceph.com: ['type=AVC msg=audit(1566580241.198:3063): avc: denied { ioctl } for pid=21818 comm="smartd" path="/dev/nvme0" dev="devtmpfs" ino=10308 ioctlcmd=4e40 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1', 'type=AVC msg=audit(1566583841.518:6110): avc: denied { ioctl } for pid=21818 comm="smartd" path="/dev/nvme0" dev="devtmpfs" ino=10308 ioctlcmd=4e41 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1', 'type=AVC msg=audit(1566583841.518:6109): avc: denied { open } for pid=21818 comm="smartd" path="/dev/nvme0" dev="devtmpfs" ino=10308 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1', 'type=AVC msg=audit(1566587441.738:6413): avc: denied { read } for pid=21818 comm="smartd" name="nvme0" dev="devtmpfs" ino=10308 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1', 'type=AVC msg=audit(1566582041.428:6054): avc: denied { ioctl } for pid=21818 comm="smartd" path="/dev/nvme0" dev="devtmpfs" ino=10308 ioctlcmd=4e41 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1', 'type=AVC msg=audit(1566585641.640:6157): avc: denied { ioctl } for pid=21818 comm="smartd" path="/dev/nvme0" dev="devtmpfs" ino=10308 ioctlcmd=4e41 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1', 'type=AVC msg=audit(1566582041.427:6053): avc: denied { read } for pid=21818 comm="smartd" name="nvme0" dev="devtmpfs" ino=10308 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1', 'type=AVC msg=audit(1566585641.640:6156): avc: denied { read } for pid=21818 comm="smartd" name="nvme0" dev="devtmpfs" ino=10308 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1', 'type=AVC msg=audit(1566587441.738:6413): avc: denied { open } for pid=21818 comm="smartd" path="/dev/nvme0" dev="devtmpfs" ino=10308 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1', 'type=AVC msg=audit(1566582041.427:6053): avc: denied { open } for pid=21818 comm="smartd" path="/dev/nvme0" dev="devtmpfs" ino=10308 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1', 'type=AVC msg=audit(1566580241.198:3062): avc: denied { open } for pid=21818 comm="smartd" path="/dev/nvme0" dev="devtmpfs" ino=10308 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1', 'type=AVC msg=audit(1566580241.198:3062): avc: denied { read } for pid=21818 comm="smartd" name="nvme0" dev="devtmpfs" ino=10308 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1', 'type=AVC msg=audit(1566583841.518:6109): avc: denied { read } for pid=21818 comm="smartd" name="nvme0" dev="devtmpfs" ino=10308 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1', 'type=AVC msg=audit(1566587441.738:6414): avc: denied { ioctl } for pid=21818 comm="smartd" path="/dev/nvme0" dev="devtmpfs" ino=10308 ioctlcmd=4e41 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1', 'type=AVC msg=audit(1566585641.640:6156): avc: denied { open } for pid=21818 comm="smartd" path="/dev/nvme0" dev="devtmpfs" ino=10308 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1']

  • log_href: http://qa-proxy.ceph.com/teuthology/yuriw-2019-08-23_15:19:05-rbd-wip_nautilus_14.2.3_RC1-distro-basic-smithi/4245580/teuthology.log
  • archive_path: /home/teuthworker/archive/yuriw-2019-08-23_15:19:05-rbd-wip_nautilus_14.2.3_RC1-distro-basic-smithi/4245580
  • description: rbd/qemu/{cache/writeback.yaml clusters/{fixed-3.yaml openstack.yaml} features/journaling.yaml msgr-failures/few.yaml objectstore/filestore-xfs.yaml pool/none.yaml supported-random-distro$/{rhel_latest.yaml} workloads/qemu_xfstests.yaml}
  • duration: 2:08:36
  • email:
  • failure_reason: SELinux denials found on ubuntu@smithi045.front.sepia.ceph.com: ['type=AVC msg=audit(1566580241.198:3063): avc: denied { ioctl } for pid=21818 comm="smartd" path="/dev/nvme0" dev="devtmpfs" ino=10308 ioctlcmd=4e40 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1', 'type=AVC msg=audit(1566583841.518:6110): avc: denied { ioctl } for pid=21818 comm="smartd" path="/dev/nvme0" dev="devtmpfs" ino=10308 ioctlcmd=4e41 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1', 'type=AVC msg=audit(1566583841.518:6109): avc: denied { open } for pid=21818 comm="smartd" path="/dev/nvme0" dev="devtmpfs" ino=10308 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1', 'type=AVC msg=audit(1566587441.738:6413): avc: denied { read } for pid=21818 comm="smartd" name="nvme0" dev="devtmpfs" ino=10308 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1', 'type=AVC msg=audit(1566582041.428:6054): avc: denied { ioctl } for pid=21818 comm="smartd" path="/dev/nvme0" dev="devtmpfs" ino=10308 ioctlcmd=4e41 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1', 'type=AVC msg=audit(1566585641.640:6157): avc: denied { ioctl } for pid=21818 comm="smartd" path="/dev/nvme0" dev="devtmpfs" ino=10308 ioctlcmd=4e41 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1', 'type=AVC msg=audit(1566582041.427:6053): avc: denied { read } for pid=21818 comm="smartd" name="nvme0" dev="devtmpfs" ino=10308 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1', 'type=AVC msg=audit(1566585641.640:6156): avc: denied { read } for pid=21818 comm="smartd" name="nvme0" dev="devtmpfs" ino=10308 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1', 'type=AVC msg=audit(1566587441.738:6413): avc: denied { open } for pid=21818 comm="smartd" path="/dev/nvme0" dev="devtmpfs" ino=10308 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1', 'type=AVC msg=audit(1566582041.427:6053): avc: denied { open } for pid=21818 comm="smartd" path="/dev/nvme0" dev="devtmpfs" ino=10308 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1', 'type=AVC msg=audit(1566580241.198:3062): avc: denied { open } for pid=21818 comm="smartd" path="/dev/nvme0" dev="devtmpfs" ino=10308 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1', 'type=AVC msg=audit(1566580241.198:3062): avc: denied { read } for pid=21818 comm="smartd" name="nvme0" dev="devtmpfs" ino=10308 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1', 'type=AVC msg=audit(1566583841.518:6109): avc: denied { read } for pid=21818 comm="smartd" name="nvme0" dev="devtmpfs" ino=10308 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1', 'type=AVC msg=audit(1566587441.738:6414): avc: denied { ioctl } for pid=21818 comm="smartd" path="/dev/nvme0" dev="devtmpfs" ino=10308 ioctlcmd=4e41 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1', 'type=AVC msg=audit(1566585641.640:6156): avc: denied { open } for pid=21818 comm="smartd" path="/dev/nvme0" dev="devtmpfs" ino=10308 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1']
  • flavor: basic
  • job_id: 4245580
  • kernel:
    • sha1: distro
    • kdb: True
  • last_in_suite: False
  • machine_type: smithi
  • name: yuriw-2019-08-23_15:19:05-rbd-wip_nautilus_14.2.3_RC1-distro-basic-smithi
  • nuke_on_error: True
  • os_type: rhel
  • os_version: 7.5
  • overrides:
    • ceph:
      • log-whitelist:
        • \(MDS_ALL_DOWN\)
        • \(MDS_UP_LESS_THAN_MAX\)
        • but it is still running
      • fs: xfs
      • conf:
        • client:
          • rbd default features: 125
        • global:
          • ms inject socket failures: 5000
        • osd:
          • debug ms: 1
          • debug journal: 20
          • debug osd: 25
          • osd objectstore: filestore
          • osd sloppy crc: True
          • debug filestore: 20
          • osd shutdown pgref assert: True
        • mon:
          • debug mon: 20
          • debug paxos: 20
          • debug ms: 1
      • sha1: e157074510ad826a2f5417a61c74d2b13d97f3c2
    • ceph-deploy:
      • fs: xfs
      • filestore: True
      • conf:
        • client:
          • log file: /var/log/ceph/ceph-$name.$pid.log
        • mon:
          • osd default pool size: 2
        • osd:
          • osd sloppy crc: True
          • osd objectstore: filestore
    • workunit:
      • sha1: e157074510ad826a2f5417a61c74d2b13d97f3c2
      • branch: wip_nautilus_14.2.3_RC1
    • install:
      • ceph:
        • sha1: e157074510ad826a2f5417a61c74d2b13d97f3c2
    • admin_socket:
      • branch: wip_nautilus_14.2.3_RC1
  • owner: scheduled_yuriw@teuthology
  • pid:
  • roles:
    • ['mon.a', 'mon.c', 'mgr.x', 'osd.0', 'osd.1', 'osd.2', 'osd.3']
    • ['mon.b', 'mgr.y', 'osd.4', 'osd.5', 'osd.6', 'osd.7']
    • ['client.0']
  • sentry_event:
  • status: fail
  • success: False
  • branch: wip_nautilus_14.2.3_RC1
  • seed:
  • sha1: e157074510ad826a2f5417a61c74d2b13d97f3c2
  • subset:
  • suite:
  • suite_branch: wip_nautilus_14.2.3_RC1
  • suite_path:
  • suite_relpath:
  • suite_repo:
  • suite_sha1: e157074510ad826a2f5417a61c74d2b13d97f3c2
  • targets:
    • smithi190.front.sepia.ceph.com: ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQChUWcswQUi1SraYnWMaIWPLsQtiZEcsku/5qPT9gnmpuZTUj20wr3acKU2KkDVoyFVMqfWKY+sBc8BSkD5h4J5AMZkeKBq+UeYpo1XUp+iX4TGhoty3NCtJphvtzlSudESbDyVQrs08LPAJ/EPNcrbVjzD2RNcHDRiCLW7Ys8WijTBzJwKfN9/5UoqcLZg0WzBrhBE1sVSVla5WDhSXHUlGI6c+2LQ+i9nxUXd0c2jwG2//i06+5+wY8tqPyx+SaRsWwtqmq4m5EB1kLPzdstbCoTl9cuCcNV+SbA2qaD2B7iuyXCQZ84CRTniqLvKeRt7TAKiY0hQQFun4o04qm9P
    • smithi049.front.sepia.ceph.com: ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDf/TI6xqphTNIyG4s3htXgHOfpEb7yNXtPEufU20Ylmqk7nqa/ZUSp4aqo5HRF9z9YmXsQJ4+b51b63xvBJnhi5rA2jS+Jl4hpTPnde6Yv1DPdj2WRghCSX5yVDCWscM5uKQwcqKSl5CGyGzbA6n4swp/5WZ0WvMfyit1aoHUDIRVk3kMv1q+fjvn7Bzoa+K8lcnP5SPaKVeuXW5ZnAn7dDevMRRCM8yTy69z0EOtTE0t7NSNh6W6ge+eaFl6PUALA9cYkIPR1+0tOMMaEC+heH+VJY6oJP1SsE41MxTSp0eOgA2AJHOWewtOLpqlCQuk/rPbuwE7rDCTn/aowlCUx
    • smithi045.front.sepia.ceph.com: ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDAXYtsoxGLHTz731TGBedjQeXRZOz8b+YOle7CUPkBvTzfLtU8Z+ZK6Q0LsoVH2E1FoSe/eBW5PcfIPfJdNRlcdT/HF8xEopwexriJ7hepSDbn3jxoy+Zn1lrtc7v+5lVBRfWYB/In4isaQKtBAwCu8ApfSr3NpCGlq9i1UulwBnraTmoWGZSPhS8wlvGGUQMVkITVV+aUNsLIGAXTfdkVqpfYqBCONIsyeM/HUSoDbt/AGMzCxSFH0g75aMntqsq8w25eJ4EuUUQJSCQKGSiRY4qiwBqlEhmPnxCVLSWNGzMTrTwwckd4ApbM+AAIFRhncjC+qo7ceav2K3JNiB9R
  • tasks:
    • internal.check_packages:
    • internal.buildpackages_prep:
    • internal.lock_machines:
      • 3
      • smithi
    • internal.save_config:
    • internal.check_lock:
    • internal.add_remotes:
    • console_log:
    • internal.connect:
    • internal.push_inventory:
    • internal.serialize_remote_roles:
    • internal.check_conflict:
    • internal.check_ceph_data:
    • internal.vm_setup:
    • kernel:
      • sha1: distro
      • kdb: True
    • internal.base:
    • internal.archive_upload:
    • internal.archive:
    • internal.coredump:
    • internal.sudo:
    • internal.syslog:
    • internal.timer:
    • pcp:
    • selinux:
    • ansible.cephlab:
    • clock:
    • install:
    • ceph:
      • cluster: ceph
      • log-whitelist:
        • \(MDS_ALL_DOWN\)
        • \(MDS_UP_LESS_THAN_MAX\)
        • but it is still running
      • conf:
        • global:
          • ms inject socket failures: 5000
        • osd:
          • debug ms: 1
          • debug journal: 20
          • debug osd: 25
          • osd objectstore: filestore
          • osd sloppy crc: True
          • debug filestore: 20
          • osd shutdown pgref assert: True
        • mon:
          • debug mon: 20
          • debug paxos: 20
          • debug ms: 1
        • client:
          • rbd default features: 125
          • rbd cache: True
      • fs: xfs
      • sha1: e157074510ad826a2f5417a61c74d2b13d97f3c2
    • qemu:
      • all:
        • test: qa/run_xfstests_qemu.sh
        • clone: True
        • disks: 3
        • type: block
  • teuthology_branch: master
  • verbose: True
  • pcp_grafana_url:
  • priority:
  • user:
  • queue:
  • posted: 2019-08-23 15:19:10
  • started: 2019-08-23 17:00:51
  • updated: 2019-08-23 19:18:52
  • status_class: danger
  • runtime: 2:18:01
  • wait_time: 0:09:25