Task modify-image : Run virt-customize on the provided image fails while uploading image
Bug #1743749 reported by
Gabriele Cerami
This bug affects 5 people
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
tripleo |
Won't Fix
|
Critical
|
yatin |
Bug Description
Logs at
show that during pike images upload, the task that should modify the image fails
Changed in tripleo: | |
milestone: | queens-3 → queens-rc1 |
Changed in tripleo: | |
milestone: | queens-rc1 → rocky-1 |
Changed in tripleo: | |
milestone: | rocky-1 → rocky-2 |
Changed in tripleo: | |
milestone: | rocky-2 → rocky-3 |
To post a comment you must log in.
We've seen this in all releases [1], [2] and [3]
Running command with debug and trace enabled in a local reproducer we find http:// paste.openstack .org/show/ 646502/
Note error:
[ 2.573801] general protection fault: 0000 [#1] SMP 693.11. 6.el7.x86_ 64 #1 ffffffff8120a3f 0>] [<ffffffff8120a 3f0>] flush_old_ exec+0x3b0/ 0x930 ad3d10 EFLAGS: 00010246 0(0000) GS:ffff88001ee0 0000(0000) knlGS:000000000 0000000 99c>] load_elf_ binary+ 0x33c/0xe00 743>] ? ima_get_ action+ 0x23/0x30 d7e>] ? process_ measurement+ 0x8e/0x250 239>] ? ima_bprm_ check+0x49/ 0x50 660>] ? load_elf_ library+ 0x220/0x220 b9d>] search_ binary_ handler+ 0xed/0x300 1d6>] do_execve_ common. isra.24+ 0x5b6/0x6c0 d50>] ? rest_init+0x80/0x80 2f8>] do_execve+0x18/0x20 02b>] run_init_ process+ 0x2b/0x30 d8d>] kernel_ init+0x3d/ 0xf0 798>] ret_from_ fork+0x58/ 0x90 d50>] ? rest_init+0x80/0x80 3f0>] flush_old_ exec+0x3b0/ 0x930
[ 2.574091] Modules linked in:
[ 2.574091] CPU: 0 PID: 1 Comm: swapper/0 Not tainted 3.10.0-
[ 2.574091] Hardware name: Red Hat KVM, BIOS 1.10.2-3.el7_4.1 04/01/2014
[ 2.574091] task: ffff88001eac8000 ti: ffff88001ead0000 task.ti: ffff88001ead0000
[ 2.574091] RIP: 0010:[<
[ 2.574091] RSP: 0000:ffff88001e
[ 2.574091] RAX: 0000000000000001 RBX: 0000000000000000 RCX: 0000000000000049
[ 2.574091] RDX: 0000000000000000 RSI: ffff88001d558000 RDI: ffffffff81a7c100
[ 2.574091] RBP: ffff88001ead3d68 R08: 000000000001bfc0 R09: ffffffff8120a1e2
[ 2.574091] R10: ffff88001ead3b30 R11: 0000000000000007 R12: ffff88001d558000
[ 2.574091] R13: ffffffff81a7c100 R14: ffff88001eac8000 R15: ffff88001d53e400
[ 2.574091] FS: 000000000000000
[ 2.574091] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 2.574091] CR2: 0000000000000000 CR3: 00000000019fa000 CR4: 00000000003606f0
[ 2.574091] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 2.574091] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 2.574091] Call Trace:
[ 2.574091] [<ffffffff81261
[ 2.574091] [<ffffffff812d6
[ 2.574091] [<ffffffff812d5
[ 2.574091] [<ffffffff812d6
[ 2.574091] [<ffffffff81261
[ 2.574091] [<ffffffff81209
[ 2.574091] [<ffffffff8120b
[ 2.574091] [<ffffffff81694
[ 2.574091] [<ffffffff8120b
[ 2.574091] [<ffffffff81002
[ 2.574091] [<ffffffff81694
[ 2.574091] [<ffffffff816b8
[ 2.574091] [<ffffffff81694
[ 2.574091] Code: 00 3e 0f ab 08 48 8b 05 db e5 90 00 48 c1 e8 34 a8 01 74 19 65 8b 05 28 2c e0 7e a8 02 74 0e 31 d2 b8 01 00 00 00 b9 49 00 00 00 <0f> 30 bf 00 00 00 80 49 03 7c 24 58 48 8b 05 0d 7c 7f 00 72 0e
[ 2.574091] RIP [<ffffffff8120a
[ 2.574091] RSP <ffff88001ead3d10>
[ 2.966949] ---[ end trace 9f4f0bee8dbd524c ]---
Not that firs occurrences of this error appeared on Jan-10th, and some security patches where applied in RDO Cloud the same day.
[1] https:/ /review. rdoproject. org/jenkins/ job/periodic- tripleo- ci-centos- 7-ovb-1ctlr_ 1comp-featurese t002-ocata- upload/ 1/consoleFull /review. rdoproject. org/jenkins/ job/periodic- tripleo- ci-centos- 7-ovb-1ctlr_ 1comp-featurese t002-pike- upload/ 1/consoleFull /review. rdoproject. org/jenkins/ job/periodic- tripleo- ci-centos- 7-ovb-1ctlr_ 1comp-featurese t002-master- upload/ 1/consoleFull
[2] https:/
[3] https:/