Description: fs/thrash/{begin.yaml ceph-thrash/default.yaml clusters/1-mds-1-client-coloc.yaml conf/{client.yaml mds.yaml mon.yaml osd.yaml} mount/fuse.yaml msgr-failures/osd-mds-delay.yaml objectstore-ec/filestore-xfs.yaml overrides/{frag_enable.yaml whitelist_health.yaml whitelist_wrongly_marked_down.yaml} supported-random-distros$/{rhel_latest.yaml} tasks/cfuse_workunit_snaptests.yaml}

Log: http://qa-proxy.ceph.com/teuthology/yuriw-2019-08-23_15:21:31-fs-wip_nautilus_14.2.3_RC1-distro-basic-smithi/4245656/teuthology.log

Failure Reason:

SELinux denials found on ubuntu@smithi172.front.sepia.ceph.com: ['type=AVC msg=audit(1566588534.653:14298): avc: denied { open } for pid=22030 comm="smartd" path="/dev/nvme0" dev="devtmpfs" ino=10768 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1', 'type=AVC msg=audit(1566583134.175:3081): avc: denied { ioctl } for pid=22030 comm="smartd" path="/dev/nvme0" dev="devtmpfs" ino=10768 ioctlcmd=4e40 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1', 'type=AVC msg=audit(1566588534.653:14299): avc: denied { ioctl } for pid=22030 comm="smartd" path="/dev/nvme0" dev="devtmpfs" ino=10768 ioctlcmd=4e41 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1', 'type=AVC msg=audit(1566584934.454:9018): avc: denied { open } for pid=22030 comm="smartd" path="/dev/nvme0" dev="devtmpfs" ino=10768 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1', 'type=AVC msg=audit(1566590339.778:16795): avc: denied { read } for pid=22030 comm="smartd" name="nvme0" dev="devtmpfs" ino=10768 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1', 'type=AVC msg=audit(1566593940.102:21987): avc: denied { open } for pid=22030 comm="smartd" path="/dev/nvme0" dev="devtmpfs" ino=10768 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1', 'type=AVC msg=audit(1566584934.454:9018): avc: denied { read } for pid=22030 comm="smartd" name="nvme0" dev="devtmpfs" ino=10768 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1', 'type=AVC msg=audit(1566588534.653:14298): avc: denied { read } for pid=22030 comm="smartd" name="nvme0" dev="devtmpfs" ino=10768 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1', 'type=AVC msg=audit(1566583134.175:3080): avc: denied { read } for pid=22030 comm="smartd" name="nvme0" dev="devtmpfs" ino=10768 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1', 'type=AVC msg=audit(1566584934.454:9019): avc: denied { ioctl } for pid=22030 comm="smartd" path="/dev/nvme0" dev="devtmpfs" ino=10768 ioctlcmd=4e41 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1', 'type=AVC msg=audit(1566583134.175:3080): avc: denied { open } for pid=22030 comm="smartd" path="/dev/nvme0" dev="devtmpfs" ino=10768 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1', 'type=AVC msg=audit(1566593940.102:21987): avc: denied { read } for pid=22030 comm="smartd" name="nvme0" dev="devtmpfs" ino=10768 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1', 'type=AVC msg=audit(1566593940.102:21988): avc: denied { ioctl } for pid=22030 comm="smartd" path="/dev/nvme0" dev="devtmpfs" ino=10768 ioctlcmd=4e41 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1', 'type=AVC msg=audit(1566592139.935:19361): avc: denied { ioctl } for pid=22030 comm="smartd" path="/dev/nvme0" dev="devtmpfs" ino=10768 ioctlcmd=4e41 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1', 'type=AVC msg=audit(1566586734.512:11873): avc: denied { open } for pid=22030 comm="smartd" path="/dev/nvme0" dev="devtmpfs" ino=10768 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1', 'type=AVC msg=audit(1566590339.778:16796): avc: denied { ioctl } for pid=22030 comm="smartd" path="/dev/nvme0" dev="devtmpfs" ino=10768 ioctlcmd=4e41 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1', 'type=AVC msg=audit(1566586734.512:11873): avc: denied { read } for pid=22030 comm="smartd" name="nvme0" dev="devtmpfs" ino=10768 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1', 'type=AVC msg=audit(1566592139.935:19360): avc: denied { read } for pid=22030 comm="smartd" name="nvme0" dev="devtmpfs" ino=10768 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1', 'type=AVC msg=audit(1566590339.778:16795): avc: denied { open } for pid=22030 comm="smartd" path="/dev/nvme0" dev="devtmpfs" ino=10768 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1', 'type=AVC msg=audit(1566586734.512:11874): avc: denied { ioctl } for pid=22030 comm="smartd" path="/dev/nvme0" dev="devtmpfs" ino=10768 ioctlcmd=4e41 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1', 'type=AVC msg=audit(1566592139.935:19360): avc: denied { open } for pid=22030 comm="smartd" path="/dev/nvme0" dev="devtmpfs" ino=10768 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1']

  • log_href: http://qa-proxy.ceph.com/teuthology/yuriw-2019-08-23_15:21:31-fs-wip_nautilus_14.2.3_RC1-distro-basic-smithi/4245656/teuthology.log
  • archive_path: /home/teuthworker/archive/yuriw-2019-08-23_15:21:31-fs-wip_nautilus_14.2.3_RC1-distro-basic-smithi/4245656
  • description: fs/thrash/{begin.yaml ceph-thrash/default.yaml clusters/1-mds-1-client-coloc.yaml conf/{client.yaml mds.yaml mon.yaml osd.yaml} mount/fuse.yaml msgr-failures/osd-mds-delay.yaml objectstore-ec/filestore-xfs.yaml overrides/{frag_enable.yaml whitelist_health.yaml whitelist_wrongly_marked_down.yaml} supported-random-distros$/{rhel_latest.yaml} tasks/cfuse_workunit_snaptests.yaml}
  • duration: 3:31:49
  • email:
  • failure_reason: SELinux denials found on ubuntu@smithi172.front.sepia.ceph.com: ['type=AVC msg=audit(1566588534.653:14298): avc: denied { open } for pid=22030 comm="smartd" path="/dev/nvme0" dev="devtmpfs" ino=10768 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1', 'type=AVC msg=audit(1566583134.175:3081): avc: denied { ioctl } for pid=22030 comm="smartd" path="/dev/nvme0" dev="devtmpfs" ino=10768 ioctlcmd=4e40 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1', 'type=AVC msg=audit(1566588534.653:14299): avc: denied { ioctl } for pid=22030 comm="smartd" path="/dev/nvme0" dev="devtmpfs" ino=10768 ioctlcmd=4e41 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1', 'type=AVC msg=audit(1566584934.454:9018): avc: denied { open } for pid=22030 comm="smartd" path="/dev/nvme0" dev="devtmpfs" ino=10768 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1', 'type=AVC msg=audit(1566590339.778:16795): avc: denied { read } for pid=22030 comm="smartd" name="nvme0" dev="devtmpfs" ino=10768 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1', 'type=AVC msg=audit(1566593940.102:21987): avc: denied { open } for pid=22030 comm="smartd" path="/dev/nvme0" dev="devtmpfs" ino=10768 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1', 'type=AVC msg=audit(1566584934.454:9018): avc: denied { read } for pid=22030 comm="smartd" name="nvme0" dev="devtmpfs" ino=10768 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1', 'type=AVC msg=audit(1566588534.653:14298): avc: denied { read } for pid=22030 comm="smartd" name="nvme0" dev="devtmpfs" ino=10768 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1', 'type=AVC msg=audit(1566583134.175:3080): avc: denied { read } for pid=22030 comm="smartd" name="nvme0" dev="devtmpfs" ino=10768 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1', 'type=AVC msg=audit(1566584934.454:9019): avc: denied { ioctl } for pid=22030 comm="smartd" path="/dev/nvme0" dev="devtmpfs" ino=10768 ioctlcmd=4e41 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1', 'type=AVC msg=audit(1566583134.175:3080): avc: denied { open } for pid=22030 comm="smartd" path="/dev/nvme0" dev="devtmpfs" ino=10768 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1', 'type=AVC msg=audit(1566593940.102:21987): avc: denied { read } for pid=22030 comm="smartd" name="nvme0" dev="devtmpfs" ino=10768 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1', 'type=AVC msg=audit(1566593940.102:21988): avc: denied { ioctl } for pid=22030 comm="smartd" path="/dev/nvme0" dev="devtmpfs" ino=10768 ioctlcmd=4e41 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1', 'type=AVC msg=audit(1566592139.935:19361): avc: denied { ioctl } for pid=22030 comm="smartd" path="/dev/nvme0" dev="devtmpfs" ino=10768 ioctlcmd=4e41 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1', 'type=AVC msg=audit(1566586734.512:11873): avc: denied { open } for pid=22030 comm="smartd" path="/dev/nvme0" dev="devtmpfs" ino=10768 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1', 'type=AVC msg=audit(1566590339.778:16796): avc: denied { ioctl } for pid=22030 comm="smartd" path="/dev/nvme0" dev="devtmpfs" ino=10768 ioctlcmd=4e41 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1', 'type=AVC msg=audit(1566586734.512:11873): avc: denied { read } for pid=22030 comm="smartd" name="nvme0" dev="devtmpfs" ino=10768 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1', 'type=AVC msg=audit(1566592139.935:19360): avc: denied { read } for pid=22030 comm="smartd" name="nvme0" dev="devtmpfs" ino=10768 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1', 'type=AVC msg=audit(1566590339.778:16795): avc: denied { open } for pid=22030 comm="smartd" path="/dev/nvme0" dev="devtmpfs" ino=10768 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1', 'type=AVC msg=audit(1566586734.512:11874): avc: denied { ioctl } for pid=22030 comm="smartd" path="/dev/nvme0" dev="devtmpfs" ino=10768 ioctlcmd=4e41 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1', 'type=AVC msg=audit(1566592139.935:19360): avc: denied { open } for pid=22030 comm="smartd" path="/dev/nvme0" dev="devtmpfs" ino=10768 scontext=system_u:system_r:fsdaemon_t:s0 tcontext=system_u:object_r:nvme_device_t:s0 tclass=chr_file permissive=1']
  • flavor: basic
  • job_id: 4245656
  • kernel:
    • sha1: distro
    • kdb: True
  • last_in_suite: False
  • machine_type: smithi
  • name: yuriw-2019-08-23_15:21:31-fs-wip_nautilus_14.2.3_RC1-distro-basic-smithi
  • nuke_on_error: True
  • os_type: rhel
  • os_version: 7.5
  • overrides:
    • ceph:
      • log-whitelist:
        • \(MDS_ALL_DOWN\)
        • \(MDS_UP_LESS_THAN_MAX\)
        • not responding, replacing
        • overall HEALTH_
        • \(FS_DEGRADED\)
        • \(MDS_FAILED\)
        • \(MDS_DEGRADED\)
        • \(FS_WITH_FAILED_MDS\)
        • \(MDS_DAMAGE\)
        • \(MDS_ALL_DOWN\)
        • \(MDS_UP_LESS_THAN_MAX\)
        • overall HEALTH_
        • \(OSD_DOWN\)
        • \(OSD_
        • but it is still running
        • is not responding
      • fs: xfs
      • conf:
        • mds:
          • mds bal split bits: 3
          • mds bal split size: 100
          • osd op complaint time: 180
          • debug mds: 20
          • mds bal merge size: 5
          • debug ms: 1
          • mds bal frag: True
          • mds verify scatter: True
          • mds bal fragment size max: 10000
          • mds op complaint time: 180
          • mds debug scatterstat: True
          • mds debug frag: True
        • client:
          • debug ms: 1
          • debug client: 20
          • client mount timeout: 600
        • global:
          • ms inject delay type: osd mds
          • ms inject delay probability: 0.005
          • ms inject socket failures: 2500
          • ms inject delay max: 1
        • osd:
          • debug ms: 1
          • debug journal: 20
          • debug osd: 25
          • osd objectstore: filestore
          • osd sloppy crc: True
          • debug filestore: 20
          • osd op complaint time: 180
        • mon:
          • debug ms: 1
          • debug mon: 20
          • debug paxos: 20
          • mon op complaint time: 120
      • sha1: e157074510ad826a2f5417a61c74d2b13d97f3c2
    • ceph-deploy:
      • fs: xfs
      • filestore: True
      • conf:
        • client:
          • log file: /var/log/ceph/ceph-$name.$pid.log
        • mon:
          • osd default pool size: 2
        • osd:
          • osd sloppy crc: True
          • osd objectstore: filestore
    • workunit:
      • sha1: e157074510ad826a2f5417a61c74d2b13d97f3c2
      • branch: wip_nautilus_14.2.3_RC1
    • install:
      • ceph:
        • sha1: e157074510ad826a2f5417a61c74d2b13d97f3c2
    • admin_socket:
      • branch: wip_nautilus_14.2.3_RC1
  • owner: scheduled_yuriw@teuthology
  • pid:
  • roles:
    • ['mon.a', 'mgr.y', 'mds.a', 'osd.0', 'osd.1', 'osd.2', 'osd.3', 'client.0']
    • ['mon.b', 'mon.c', 'mgr.x', 'mds.b', 'osd.4', 'osd.5', 'osd.6', 'osd.7']
  • sentry_event:
  • status: fail
  • success: False
  • branch: wip_nautilus_14.2.3_RC1
  • seed:
  • sha1: e157074510ad826a2f5417a61c74d2b13d97f3c2
  • subset:
  • suite:
  • suite_branch: wip_nautilus_14.2.3_RC1
  • suite_path:
  • suite_relpath:
  • suite_repo:
  • suite_sha1: e157074510ad826a2f5417a61c74d2b13d97f3c2
  • targets:
    • smithi172.front.sepia.ceph.com: ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDK9rzidY9JI6ZgzGiIwQJRld8547BNRH207h8K47y/CLDSpfkLRqYSylRiTw375cERPciHnqkI4lZE/L63rfOYWyxG9zAMnzCcdTA0L4d8HMF9yFOmbaZiB0IEAjXZTLdxilEVRIPfrBJVgrsg13ObNVy0dgoKO5edoafHTB6EmFZGxF5xSn66NVlvF9k55FGs15rdiukkE/uKF+0NKi5N4r1c0skrCOdfP6G1Au+Z8YlHvxEayCRVv4ACzml6KzFFTE8MM091ASQcd87hOXv76ETuHEL2bZEarFuG2hbp3oLZR/EJdrzX5NqC3ST82KMB/EeetPPTOym2vLRpql71
    • smithi016.front.sepia.ceph.com: ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDCzNS9oLkfaddv1jWZZZ37oXa/Rx1s0YQuzmUyh7YAex5MjdGDMf2hgl2RGAYk1V0O3SSMPII5N92HupsH31D2mNjZnADOCV2Gm3k/ivW1anDVtOnMTK20g+p89GvUOrFN3j8hhy3aiHgc8VpCf2v9RLMBBUhyrK6EcQKG3bWlIJS1E3LDhoUDRmC2YVLvxgbOFvXBBv8k5OtbfYatNN6c/lY4pKyPim239XLD05bxMs7Yhs1OJU1xiSlRTyMfKilSaHcTEFu4WoQ4a9wVj9PBz42ymDmUbhIB3f6DaRwDkUTMRo9Q6gofHFlz9K1dbzoLDFy40mOhUWgJjhZ8qj6T
  • tasks:
    • internal.check_packages:
    • internal.buildpackages_prep:
    • internal.lock_machines:
      • 2
      • smithi
    • internal.save_config:
    • internal.check_lock:
    • internal.add_remotes:
    • console_log:
    • internal.connect:
    • internal.push_inventory:
    • internal.serialize_remote_roles:
    • internal.check_conflict:
    • internal.check_ceph_data:
    • internal.vm_setup:
    • kernel:
      • sha1: distro
      • kdb: True
    • internal.base:
    • internal.archive_upload:
    • internal.archive:
    • internal.coredump:
    • internal.sudo:
    • internal.syslog:
    • internal.timer:
    • pcp:
    • selinux:
    • ansible.cephlab:
    • clock:
    • install:
      • extra_system_packages:
        • deb:
          • bison
          • flex
          • libelf-dev
          • libssl-dev
        • rpm:
          • bison
          • flex
          • elfutils-libelf-devel
          • openssl-devel
      • extra_packages:
        • deb:
          • python3-cephfs
          • cephfs-shell
        • rpm:
          • python3-cephfs
      • sha1: e157074510ad826a2f5417a61c74d2b13d97f3c2
    • ceph:
    • mds_thrash:
    • ceph-fuse:
    • workunit:
      • clients:
        • all:
          • fs/snaps
      • branch: wip_nautilus_14.2.3_RC1
      • sha1: e157074510ad826a2f5417a61c74d2b13d97f3c2
  • teuthology_branch: master
  • verbose: True
  • pcp_grafana_url:
  • priority:
  • user:
  • queue:
  • posted: 2019-08-23 15:21:38
  • started: 2019-08-23 17:47:18
  • updated: 2019-08-23 21:29:21
  • status_class: danger
  • runtime: 3:42:03
  • wait_time: 0:10:14