Description of problem: The /tmp are often mounted with noexec option for security reasons. The migration roles rely that scripts in /tmp/ can be executed. Version-Release number of selected component (if applicable): 16.1 How reproducible: Always Steps to Reproduce: 1. Have /tmp mounted with noexec option 2. Run migration from ovs to ovn 3. Actual results: fatal: [tpa-vim-b-computecl-0]: FAILED! => { "changed": true, "cmd": "/tmp/clone-br-int.sh", "delta": "0:00:00.001773", "end": "2022-03-16 18:51:30.332449", "invocation": { "module_args": { "_raw_params": "/tmp/clone-br-int.sh", "_uses_shell": true, "argv": null, "chdir": null, "creates": null, "executable": null, "removes": null, "stdin": null, "stdin_add_newline": true, "strip_empty_ends": true, "warn": true } }, "msg": "non-zero return code", "rc": 126, "start": "2022-03-16 18:51:30.330676", "stderr": "/bin/sh: /tmp/clone-br-int.sh: Permission denied", "stderr_lines": [ "/bin/sh: /tmp/clone-br-int.sh: Permission denied" ], "stdout": "", "stdout_lines": [] } Expected results: Additional info:
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (Red Hat OpenStack Platform 16.1.9 bug fix and enhancement advisory), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2022:8795