Quantcast
Channel: CentOS Bug Tracker - Issues
Viewing all 19115 articles
Browse latest View live

0015711: System hung on rwsem_down_read_failed+0x10d/0x1a0

$
0
0
Sometimes physical servers hung - random processes hung with trace below, also cann't execute some commands, like top, atop, iostat, finally all process stop write logs and system hung.<br /> [6175405.104220] [<ffffffffa6d18f39>] schedule+0x29/0x70<br /> [6175405.104252] [<ffffffffa6d1a56d>] rwsem_down_read_failed+0x10d/0x1a0<br /> [6175405.104262] [<ffffffffa695f3d8>] call_rwsem_down_read_failed+0x18/0x30<br /> [6175405.104291] [<ffffffffa6d18060>] down_read+0x20/0x40<br /> [6175405.104301] [<ffffffffa68985d2>] proc_pid_cmdline_read+0xb2/0x560<br /> [6175405.104334] [<ffffffffa68d549c>] ? security_file_permission+0x8c/0xa0<br /> [6175405.104342] [<ffffffffa681f0af>] vfs_read+0x9f/0x170<br /> [6175405.104347] [<ffffffffa681ff7f>] SyS_read+0x7f/0xf0<br /> [6175405.104380] [<ffffffffa6d2579b>] system_call_fastpath+0x22/0x27<br /> <br /> Full vmcore-dmesg in addition

0015252: system hung on rwsem_down_read_failed

$
0
0
some proc hung on rwsem_down_read_failed.cat /proc/pid/cmdline also hung.<br /> call trace as below:<br /> kernel: INFO: task axserver:202459 blocked for more than 120 seconds.<br /> kernel: "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.<br /> kernel: bidserver D ffff887bf26d7de0 0 202459 198052 0x00000080<br /> kernel: ffff887bf26d7db8 0000000000000086 ffff88541f65eeb0 ffff887bf26d7fd8<br /> kernel: ffff887bf26d7fd8 ffff887bf26d7fd8 ffff88541f65eeb0 ffff88541f65eeb0<br /> kernel: ffff887f6af44538 ffffffffffffffff ffff887f6af44540 ffff887bf26d7de0<br /> kernel: Call Trace:<br /> kernel: [<ffffffff816a9ad9>] schedule+0x29/0x70<br /> kernel: [<ffffffff816ab10d>] rwsem_down_read_failed+0x10d/0x1a0<br /> kernel: [<ffffffff81331ba8>] call_rwsem_down_read_failed+0x18/0x30<br /> kernel: [<ffffffff816a8d70>] down_read+0x20/0x40<br /> kernel: [<ffffffff816b07dc>] __do_page_fault+0x37c/0x450<br /> kernel: [<ffffffff816b08e5>] do_page_fault+0x35/0x90<br /> kernel: [<ffffffff816acb08>] page_fault+0x28/0x30

0013142: [abrt] setroubleshoot-server: analyze.py:294:prune:ValueError: list modified during sort

$
0
0
Version-Release number of selected component:<br /> setroubleshoot-server-3.2.27.2-3.el7<br /> <br /> Truncated backtrace:<br /> analyze.py:294:prune:ValueError: list modified during sort<br /> <br /> Traceback (most recent call last):<br /> File "/usr/lib64/python2.7/site-packages/setroubleshoot/analyze.py", line 377, in auto_save_callback<br /> self.save()<br /> File "/usr/lib64/python2.7/site-packages/setroubleshoot/analyze.py", line 355, in save<br /> self.prune()<br /> File "/usr/lib64/python2.7/site-packages/setroubleshoot/analyze.py", line 294, in prune<br /> self.sigs.signature_list.sort(lambda a,b: cmp(a.last_seen_date, b.last_seen_date))<br /> ValueError: list modified during sort<br /> <br /> Local variables in innermost frame:<br /> self: <setroubleshoot.analyze.SETroubleshootDatabase object at 0x217dad0>

0015682: accept invite to repo rhdt/saas-contracts

$
0
0
Can you please accept the invite for:<br /> <a href="https://github.com/rhdt/saas-contracts/invitations">https://github.com/rhdt/saas-contracts/invitations</a> ?

0015712: Create a project and user for ovirt-devops team in CentoCI

$
0
0
Hi,<br /> <br /> I would like to ask for 2 projects that will serve ovirt-devops team to run CI workload for the oVirt project <a href="https://ovirt.org/">https://ovirt.org/</a><br /> We need 2 projects: "ovirt-production" and "ovirt-staging".<br /> The following users should be created, and granted with access to the projects above:<br /> <br /> Gal Ben Haim <<a href="mailto:gbenhaim@redhat.com">gbenhaim@redhat.com</a>><br /> Anton Marchukov <<a href="mailto:amarchuk@redhat.com">amarchuk@redhat.com</a>><br /> Evgheni Dereveanchin <<a href="mailto:ederevea@redhat.com">ederevea@redhat.com</a>><br /> Dusan Fodor <<a href="mailto:dfodor@redhat.com">dfodor@redhat.com</a>> <br /> Dafna Ron <<a href="mailto:dron@redhat.com">dron@redhat.com</a>> <br /> Liora Milbaum <<a href="mailto:lmilbaum@redhat.com">lmilbaum@redhat.com</a>> (the user already exists, need only to give permissions for the projects)<br /> Galit Rosenthal <<a href="mailto:grosenth@redhat.com">grosenth@redhat.com</a>><br /> Barak Korren <<a href="mailto:bkorren@redhat.com">bkorren@redhat.com</a>><br /> Daniel Belenky <<a href="mailto:dbelenky@redhat.com">dbelenky@redhat.com</a>><br /> Ehud Yonasi <<a href="mailto:eyonasi@redhat.com">eyonasi@redhat.com</a>><br /> Emil Natan <<a href="mailto:ena@redhat.com">ena@redhat.com</a>><br /> Eyal Edri <<a href="mailto:eedri@redhat.com">eedri@redhat.com</a>><br /> <br /> Thanks,<br /> <br /> Gal.

0015589: Please update livecd-tools to 26.1 - livecd-tools-21.4-2.el7 from 2015 is in Extras and has issues

$
0
0
Since the release of 7.6.1810, I've started having trouble building personal remix live media with livecd-creator. It seems to be related to this upstream bug (upstream being Fedora in this case):<br /> <a href="https://bugzilla.redhat.com/show_bug.cgi?id=1658359">https://bugzilla.redhat.com/show_bug.cgi?id=1658359</a><br /> ... with this fix:<br /> <a href="https://github.com/livecd-tools/livecd-tools/commit/c6dd265af7ccb3c51c37dcd89839f178832518ea">https://github.com/livecd-tools/livecd-tools/commit/c6dd265af7ccb3c51c37dcd89839f178832518ea</a><br /> <br /> Since Fedora has a much newer version of livecd-tools backporting the patch would require a bit of work.<br /> <br /> According to one of the Fedora maintainers (see rhb mentioned above):<br /> <br /> "As of EL7.6, it is now possible to run the latest version of livecd-tools on EL7. CentOS was planning on switching to livecd-tools v26, but this issue (which is now fixed in v26.1) came a bit late for the 7.6 GA. I made the spec fixes so that they could backport straight from Fedora Dist-Git to CentOS Extras.<br /> <br /> I'm hoping that Fabian Arrotin and Pablo Greco will ship v26.1 soon in their Extras (which I believe Scientific Linux and friends get it from...)."

0010819: [abrt] gnome-tweak-tool: zipfile.py:807:_RealGetContents:BadZipfile: File is not a zip file

$
0
0
Version-Release number of selected component:<br /> gnome-tweak-tool-3.14.3-2.el7<br /> <br /> Truncated backtrace:<br /> zipfile.py:807:_RealGetContents:BadZipfile: File is not a zip file<br /> <br /> Traceback (most recent call last):<br /> File "/usr/lib/python2.7/site-packages/gtweak/tweaks/tweak_group_interface.py", line 203, in _on_file_set<br /> with zipfile.ZipFile(f, 'r') as z:<br /> File "/usr/lib64/python2.7/zipfile.py", line 766, in __init__<br /> self._RealGetContents()<br /> File "/usr/lib64/python2.7/zipfile.py", line 807, in _RealGetContents<br /> raise BadZipfile, "File is not a zip file"<br /> BadZipfile: File is not a zip file<br /> <br /> Local variables in innermost frame:<br /> fp: <closed file '/home/fenglc/\xe4\xb8\x8b\xe8\xbd\xbd/xenlism-minimalism-cd37cf8.tar.gz.zip', mode 'rb' at 0x2b78f60><br /> self: <zipfile.ZipFile object at 0x2b98a90><br /> endrec: None

0015713: SELinux denied /usr/bin/gsf-office-thumbnailer methods access 'nnp_transition, nosuid_transition' to process.

$
0
0
SELinux запрещает /usr/bin/gsf-office-thumbnailer методы доступа 'nnp_transition, nosuid_transition' к процессу.<br /> <br /> ***** Модуль catchall предлагает (точность 100.) ***************************<br /> <br /> If you believe that gsf-office-thumbnailer should be allowed nnp_transition nosuid_transition access on processes labeled thumb_t by default.<br /> То рекомендуется создать отчет об ошибке.<br /> Чтобы разрешить доступ, можно создать локальный модуль политики.<br /> Сделать<br /> allow this access for now by executing:<br /> # ausearch -c 'gsf-office-thum' --raw | audit2allow -M my-gsfofficethum<br /> # semodule -i my-gsfofficethum.pp<br /> <br /> Дополнительные сведения:<br /> Исходный контекст unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1<br /> 023<br /> Целевой контекст unconfined_u:unconfined_r:thumb_t:s0-s0:c0.c1023<br /> Целевые объекты Unknown [ process2 ]<br /> Источник gsf-office-thum<br /> Путь к источнику /usr/bin/gsf-office-thumbnailer<br /> Порт <Unknown><br /> Узел ca.alljoint.ru<br /> Исходные пакеты RPM totem-3.26.2-1.el7.x86_64<br /> Целевые пакеты RPM <br /> Пакет регламента selinux-policy-3.13.1-229.el7_6.6.noarch<br /> SELinux активен True<br /> Тип регламента targeted<br /> Режим Enforcing<br /> Имя узла ca.alljoint.ru<br /> Платформа Linux ca.alljoint.ru 3.10.0-957.1.3.el7.x86_64 #1<br /> SMP Thu Nov 29 14:49:43 UTC 2018 x86_64 x86_64<br /> Счетчик уведомлений 161<br /> Впервые обнаружено 2019-01-10 15:54:42 MSK<br /> В последний раз 2019-01-16 13:15:56 MSK<br /> Локальный ID 749e8e8a-20e0-4486-bfda-d9d87a3b652f<br /> <br /> Построчный вывод сообщений аудита<br /> type=AVC msg=audit(1547633756.531:6095): avc: denied { nnp_transition nosuid_transition } for pid=1174 comm="flatpak-bwrap" scontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tcontext=unconfined_u:unconfined_r:thumb_t:s0-s0:c0.c1023 tclass=process2 permissive=0<br /> <br /> <br /> type=SYSCALL msg=audit(1547633756.531:6095): arch=x86_64 syscall=execve success=yes exit=0 a0=7ffcb72916f8 a1=7ffcb7291080 a2=14c5160 a3=7ffcb728e560 items=0 ppid=1167 pid=1174 auid=1000 uid=1000 gid=1000 euid=1000 suid=1000 fsuid=1000 egid=1000 sgid=1000 fsgid=1000 tty=(none) ses=45 comm=totem-video-thu exe=/usr/bin/totem-video-thumbnailer subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 key=(null)<br /> <br /> Hash: gsf-office-thum,unconfined_t,thumb_t,process2,nnp_transition,nosuid_transition

0015714: SELinux is preventing /usr/bin/spamc from 'read' accesses on the memoria compartida labeled unconfined_service_t.

$
0
0
Description of problem:<br /> SELinux is preventing /usr/bin/spamc from 'read' accesses on the memoria compartida labeled unconfined_service_t.<br /> <br /> ***** Plugin catchall (100. confidence) suggests **************************<br /> <br /> Si cree que de manera predeterminada se debería permitir a spamc el acceso read sobre shm etiquetados como unconfined_service_t.<br /> Then debería reportar esto como un error.<br /> Puede generar un módulo de política local para permitir este acceso.<br /> Do<br /> permita el acceso temporalmente ejecutando:<br /> # ausearch -c 'spamc' --raw | audit2allow -M mi-spamc<br /> # semodule -i mi-spamc.pp<br /> <br /> Additional Information:<br /> Source Context system_u:system_r:spamc_t:s0<br /> Target Context system_u:system_r:unconfined_service_t:s0<br /> Target Objects Unknown [ shm ]<br /> Source spamc<br /> Source Path /usr/bin/spamc<br /> Port <Unknown><br /> Host (removed)<br /> Source RPM Packages spamassassin-3.4.0-4.el7_5.x86_64<br /> Target RPM Packages <br /> Policy RPM selinux-policy-3.13.1-229.el7_6.6.noarch<br /> Selinux Enabled True<br /> Policy Type targeted<br /> Enforcing Mode Permissive<br /> Host Name (removed)<br /> Platform Linux (removed) 3.10.0-957.1.3.el7.x86_64 #1 SMP<br /> Thu Nov 29 14:49:43 UTC 2018 x86_64 x86_64<br /> Alert Count 1<br /> First Seen 2019-01-16 13:26:41 CET<br /> Last Seen 2019-01-16 13:26:41 CET<br /> Local ID 91e763c0-e5f4-4e5a-ac7e-584c975683c2<br /> <br /> Raw Audit Messages<br /> type=AVC msg=audit(1547641601.943:297760): avc: denied { read } for pid=82923 comm="spamc" key=838875571 scontext=system_u:system_r:spamc_t:s0 tcontext=system_u:system_r:unconfined_service_t:s0 tclass=shm permissive=1<br /> <br /> <br /> type=AVC msg=audit(1547641601.943:297760): avc: denied { read } for pid=82923 comm="spamc" path=2F535953563332303033396233202864656C6574656429 dev="tmpfs" ino=0 scontext=system_u:system_r:spamc_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=file permissive=1<br /> <br /> <br /> type=SYSCALL msg=audit(1547641601.943:297760): arch=x86_64 syscall=shmat success=yes exit=139908526686208 a0=0 a1=0 a2=1000 a3=7ffd3be56160 items=0 ppid=82922 pid=82923 auid=4294967295 uid=30 gid=30 euid=30 suid=30 fsuid=30 egid=30 sgid=30 fsgid=30 tty=(none) ses=4294967295 comm=spamc exe=/usr/bin/spamc subj=system_u:system_r:spamc_t:s0 key=(null)<br /> <br /> Hash: spamc,spamc_t,unconfined_service_t,shm,read<br /> <br /> Version-Release number of selected component:<br /> selinux-policy-3.13.1-229.el7_6.6.noarch

0015585: SELinux is preventing /usr/lib64/nagios/plugins/check_mailq from checking postfix mailq. since CentOS 7.6

$
0
0
SELINUX is preventing check_mailq from running properly.<br /> <br /> ### AVC denied. ####<br /> msg=audit(1544537618.291:81322): avc: denied { read write } for pid=45806 comm="check_mailq" path="socket:[11479019]" dev="sockfs" ino=11479019 scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:system_r:nrpe_t:s0 tclass=tcp_socket permissive=1<br /> type=AVC msg=audit(1544537618.291:81322): avc: denied { rlimitinh } for pid=45806 comm="check_mailq" scontext=system_u:system_r:nrpe_t:s0 tcontext=system_u:system_r:nagios_system_plugin_t:s0 tclass=process permissive=1<br /> type=AVC msg=audit(1544537618.291:81322): avc: denied { siginh } for pid=45806 comm="check_mailq" scontext=system_u:system_r:nrpe_t:s0 tcontext=system_u:system_r:nagios_system_plugin_t:s0 tclass=process permissive=1<br /> type=AVC msg=audit(1544537618.291:81322): avc: denied { noatsecure } for pid=45806 comm="check_mailq" scontext=system_u:system_r:nrpe_t:s0 tcontext=system_u:system_r:nagios_system_plugin_t:s0 tclass=process permissive=1<br /> type=AVC msg=audit(1544537618.344:81323): avc: denied { execute } for pid=45807 comm="check_mailq" name="sudo" dev="dm-0" ino=35930127 scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1<br /> type=AVC msg=audit(1544537618.344:81323): avc: denied { read open } for pid=45807 comm="check_mailq" path="/usr/bin/sudo" dev="dm-0" ino=35930127 scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1<br /> type=AVC msg=audit(1544537618.344:81323): avc: denied { execute_no_trans } for pid=45807 comm="check_mailq" path="/usr/bin/sudo" dev="dm-0" ino=35930127 scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1<br /> type=AVC msg=audit(1544537618.348:81324): avc: denied { create } for pid=45807 comm="sudo" scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:system_r:nagios_system_plugin_t:s0 tclass=netlink_route_socket permissive=1<br /> type=AVC msg=audit(1544537618.348:81325): avc: denied { bind } for pid=45807 comm="sudo" scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:system_r:nagios_system_plugin_t:s0 tclass=netlink_route_socket permissive=1<br /> type=AVC msg=audit(1544537618.348:81326): avc: denied { getattr } for pid=45807 comm="sudo" scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:system_r:nagios_system_plugin_t:s0 tclass=netlink_route_socket permissive=1<br /> type=AVC msg=audit(1544537618.348:81327): avc: denied { write } for pid=45807 comm="sudo" scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:system_r:nagios_system_plugin_t:s0 tclass=netlink_route_socket permissive=1<br /> type=AVC msg=audit(1544537618.348:81327): avc: denied { nlmsg_read } for pid=45807 comm="sudo" scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:system_r:nagios_system_plugin_t:s0 tclass=netlink_route_socket permissive=1<br /> type=AVC msg=audit(1544537618.348:81328): avc: denied { read } for pid=45807 comm="sudo" scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:system_r:nagios_system_plugin_t:s0 tclass=netlink_route_socket permissive=1<br /> type=AVC msg=audit(1544537618.352:81329): avc: denied { setuid } for pid=45807 comm="sudo" capability=7 scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:system_r:nagios_system_plugin_t:s0 tclass=capability permissive=1<br /> type=AVC msg=audit(1544537618.352:81330): avc: denied { setgid } for pid=45807 comm="sudo" capability=6 scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:system_r:nagios_system_plugin_t:s0 tclass=capability permissive=1<br /> type=AVC msg=audit(1544537618.354:81331): avc: denied { sys_resource } for pid=45807 comm="sudo" capability=24 scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:system_r:nagios_system_plugin_t:s0 tclass=capability permissive=1<br /> type=AVC msg=audit(1544537618.354:81331): avc: denied { setrlimit } for pid=45807 comm="sudo" scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:system_r:nagios_system_plugin_t:s0 tclass=process permissive=1<br /> type=AVC msg=audit(1544537618.365:81332): avc: denied { execute } for pid=45808 comm="sudo" name="unix_chkpwd" dev="dm-0" ino=67288967 scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1<br /> type=AVC msg=audit(1544537618.365:81332): avc: denied { read open } for pid=45808 comm="sudo" path="/usr/sbin/unix_chkpwd" dev="dm-0" ino=67288967 scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1<br /> type=AVC msg=audit(1544537618.365:81332): avc: denied { execute_no_trans } for pid=45808 comm="sudo" path="/usr/sbin/unix_chkpwd" dev="dm-0" ino=67288967 scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1<br /> type=AVC msg=audit(1544537618.367:81333): avc: denied { read } for pid=45808 comm="unix_chkpwd" name="shadow" dev="dm-0" ino=70013445 scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file permissive=1<br /> type=AVC msg=audit(1544537618.367:81333): avc: denied { open } for pid=45808 comm="unix_chkpwd" path="/etc/shadow" dev="dm-0" ino=70013445 scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file permissive=1<br /> type=AVC msg=audit(1544537618.367:81334): avc: denied { getattr } for pid=45808 comm="unix_chkpwd" path="/etc/shadow" dev="dm-0" ino=70013445 scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file permissive=1<br /> type=AVC msg=audit(1544537618.367:81335): avc: denied { create } for pid=45807 comm="sudo" scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:system_r:nagios_system_plugin_t:s0 tclass=netlink_audit_socket permissive=1<br /> type=AVC msg=audit(1544537618.368:81336): avc: denied { write } for pid=45807 comm="sudo" scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:system_r:nagios_system_plugin_t:s0 tclass=netlink_audit_socket permissive=1<br /> type=AVC msg=audit(1544537618.368:81336): avc: denied { nlmsg_relay } for pid=45807 comm="sudo" scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:system_r:nagios_system_plugin_t:s0 tclass=netlink_audit_socket permissive=1<br /> type=AVC msg=audit(1544537618.368:81336): avc: denied { audit_write } for pid=45807 comm="sudo" capability=29 scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:system_r:nagios_system_plugin_t:s0 tclass=capability permissive=1<br /> type=AVC msg=audit(1544537618.368:81338): avc: denied { read } for pid=45807 comm="sudo" scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:system_r:nagios_system_plugin_t:s0 tclass=netlink_audit_socket permissive=1<br /> type=AVC msg=audit(1544537618.369:81341): avc: denied { setsched } for pid=45807 comm="sudo" scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:system_r:nagios_system_plugin_t:s0 tclass=process permissive=1<br /> type=AVC msg=audit(1544537618.369:81342): avc: denied { net_admin } for pid=45807 comm="sudo" capability=12 scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:system_r:nagios_system_plugin_t:s0 tclass=capability permissive=1<br /> type=AVC msg=audit(1544537618.369:81343): avc: denied { search } for pid=45807 comm="sudo" name="dbus" dev="tmpfs" ino=29495 scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:object_r:system_dbusd_var_run_t:s0 tclass=dir permissive=1<br /> type=AVC msg=audit(1544537618.392:81345): avc: denied { execute } for pid=45809 comm="sudo" name="sendmail.postfix" dev="dm-0" ino=68328044 scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:object_r:sendmail_exec_t:s0 tclass=file permissive=1<br /> type=AVC msg=audit(1544537618.392:81345): avc: denied { read open } for pid=45809 comm="sudo" path="/usr/lib64/plesk-9.0/sendmail/sendmail.postfix" dev="dm-0" ino=68328044 scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:object_r:sendmail_exec_t:s0 tclass=file permissive=1<br /> type=AVC msg=audit(1544537618.392:81345): avc: denied { execute_no_trans } for pid=45809 comm="sudo" path="/usr/lib64/plesk-9.0/sendmail/sendmail.postfix" dev="dm-0" ino=68328044 scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:object_r:sendmail_exec_t:s0 tclass=file permissive=1<br /> type=AVC msg=audit(1544537618.399:81346): avc: denied { execute } for pid=45809 comm="mailq" name="postqueue" dev="dm-0" ino=68449872 scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:object_r:postfix_postqueue_exec_t:s0 tclass=file permissive=1<br /> type=AVC msg=audit(1544537618.399:81346): avc: denied { read open } for pid=45809 comm="mailq" path="/usr/sbin/postqueue" dev="dm-0" ino=68449872 scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:object_r:postfix_postqueue_exec_t:s0 tclass=file permissive=1<br /> type=AVC msg=audit(1544537618.399:81346): avc: denied { execute_no_trans } for pid=45809 comm="mailq" path="/usr/sbin/postqueue" dev="dm-0" ino=68449872 scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:object_r:postfix_postqueue_exec_t:s0 tclass=file permissive=1<br /> type=AVC msg=audit(1544537714.982:81407): avc: denied { connectto } for pid=46208 comm="postqueue" path="/var/spool/postfix/public/showq" scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:system_r:postfix_master_t:s0 tclass=unix_stream_socket permissive=1<br /> type=AVC msg=audit(1544537852.367:81494): avc: denied { write } for pid=47190 comm="sudo" name="log" dev="devtmpfs" ino=311 scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:object_r:devlog_t:s0 tclass=sock_file permissive=1<br /> type=AVC msg=audit(1544537852.392:81498): avc: denied { read } for pid=47192 comm="mailq" name="main.cf" dev="dm-0" ino=2770958 scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=unconfined_u:object_r:postfix_etc_t:s0 tclass=file permissive=1<br /> type=AVC msg=audit(1544537852.392:81498): avc: denied { open } for pid=47192 comm="mailq" path="/etc/postfix/main.cf" dev="dm-0" ino=2770958 scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=unconfined_u:object_r:postfix_etc_t:s0 tclass=file permissive=1<br /> type=AVC msg=audit(1544537852.392:81499): avc: denied { getattr } for pid=47192 comm="mailq" path="/etc/postfix/main.cf" dev="dm-0" ino=2770958 scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=unconfined_u:object_r:postfix_etc_t:s0 tclass=file permissive=1<br /> type=AVC msg=audit(1544537852.392:81500): avc: denied { create } for pid=47192 comm="mailq" scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:system_r:nagios_system_plugin_t:s0 tclass=tcp_socket permissive=1<br /> type=AVC msg=audit(1544537852.400:81501): avc: denied { write } for pid=47192 comm="postqueue" name="showq" dev="dm-0" ino=34367853 scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:object_r:postfix_public_t:s0 tclass=sock_file permissive=1<br /> type=AVC msg=audit(1544537852.408:81502): avc: denied { connectto } for pid=47190 comm="sudo" path="/run/dbus/system_bus_socket" scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tclass=unix_stream_socket permissive=1<br /> type=USER_AVC msg=audit(1544539909.518:82692): pid=5323 uid=81 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.8166 spid=5333 tpid=55270 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:system_r:nagios_system_plugin_t:s0 tclass=dbus exe="/usr/bin/dbus-daemon" sauid=81 hostname=? addr=? terminal=?'<br /> type=AVC msg=audit(1544539919.990:82694): avc: denied { write } for pid=55236 comm="sudo" scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:system_r:nagios_system_plugin_t:s0 tclass=key permissive=1<br /> <br /> # Opinion<br /> <br /> The package is EPEL maintained and should run out of the box without any issues.

0015684: Error syncing pod

$
0
0
namespace: ember-csi<br /> <br /> Today, I run into the following error: "Error syncing pod" which broke the pipeline.

0015715: process hang on shrink_inactive_list when reach the memory limit of cgroup

$
0
0
we found that some filebeat process stop working wtih the stack:<br /> [<ffffffff810f5126>] futex_wait_queue_me+0xc6/0x130<br /> [<ffffffff810f5deb>] futex_wait+0x17b/0x280<br /> [<ffffffff810f7b26>] do_futex+0x106/0x5a0<br /> [<ffffffff810f8040>] SyS_futex+0x80/0x180<br /> [<ffffffff816b4fc9>] system_call_fastpath+0x16/0x1b<br /> [<ffffffffffffffff>] 0xffffffffffffffff<br /> <br /> and if you kill , it will become <defunct> state.<br /> <br /> in the dmesg, there is some info:<br /> Jan 15 14:30:57 kernel: INFO: task filebeat:34257 blocked for more than 120 seconds.<br /> Jan 15 14:30:57 kernel: "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.<br /> Jan 15 14:30:57 kernel: INFO: task filebeat:34257 blocked for more than 120 seconds.<br /> Jan 15 14:30:57 kernel: "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.<br /> Jan 15 14:30:57 kernel: filebeat D ffffffff816a75f0 0 34257 30603 0x00000080<br /> Jan 15 14:30:57 kernel: filebeat D ffffffff816a75f0 0 34257 30603 0x00000080<br /> Jan 15 14:30:57 kernel: ffff882b012aafe0 0000000000000086 ffff883b93e4eeb0 ffff882b012abfd8<br /> Jan 15 14:30:57 kernel: ffff882b012aafe0 0000000000000086 ffff883b93e4eeb0 ffff882b012abfd8<br /> Jan 15 14:30:57 kernel: ffff882b012abfd8 ffff882b012abfd8 ffff883b93e4eeb0 ffff881fbfc16cc0<br /> Jan 15 14:30:57 kernel: ffff882b012abfd8 ffff882b012abfd8 ffff883b93e4eeb0 ffff881fbfc16cc0<br /> Jan 15 14:30:57 kernel: 0000000000000000 7fffffffffffffff ffff88203ff958e8 ffffffff816a75f0<br /> Jan 15 14:30:57 kernel: Call Trace:<br /> Jan 15 14:30:57 kernel: 0000000000000000 7fffffffffffffff ffff88203ff958e8 ffffffff816a75f0<br /> Jan 15 14:30:57 kernel: Call Trace:<br /> Jan 15 14:30:57 kernel: [<ffffffff816a75f0>] ? bit_wait+0x50/0x50<br /> Jan 15 14:30:57 kernel: [<ffffffff816a75f0>] ? bit_wait+0x50/0x50<br /> Jan 15 14:30:57 kernel: [<ffffffff816a94c9>] schedule+0x29/0x70<br /> Jan 15 14:30:57 kernel: [<ffffffff816a94c9>] schedule+0x29/0x70<br /> Jan 15 14:30:57 kernel: [<ffffffff816a6fd9>] schedule_timeout+0x239/0x2c0<br /> Jan 15 14:30:57 kernel: [<ffffffff816a6fd9>] schedule_timeout+0x239/0x2c0<br /> Jan 15 14:30:57 kernel: [<ffffffff811de581>] ? __slab_free+0x81/0x2f0<br /> Jan 15 14:30:57 kernel: [<ffffffff811de581>] ? __slab_free+0x81/0x2f0<br /> Jan 15 14:30:57 kernel: [<ffffffff81062efe>] ? kvm_clock_get_cycles+0x1e/0x20<br /> Jan 15 14:30:57 kernel: [<ffffffff81062efe>] ? kvm_clock_get_cycles+0x1e/0x20<br /> Jan 15 14:30:57 kernel: [<ffffffff810e939c>] ? ktime_get_ts64+0x4c/0xf0<br /> Jan 15 14:30:57 kernel: [<ffffffff810e939c>] ? ktime_get_ts64+0x4c/0xf0<br /> Jan 15 14:30:57 kernel: [<ffffffff816a75f0>] ? bit_wait+0x50/0x50<br /> Jan 15 14:30:57 kernel: [<ffffffff816a75f0>] ? bit_wait+0x50/0x50<br /> Jan 15 14:30:57 kernel: [<ffffffff816a8b4d>] io_schedule_timeout+0xad/0x130<br /> Jan 15 14:30:57 kernel: [<ffffffff816a8b4d>] io_schedule_timeout+0xad/0x130<br /> Jan 15 14:30:57 kernel: [<ffffffff816a8be8>] io_schedule+0x18/0x20<br /> Jan 15 14:30:57 kernel: [<ffffffff816a8be8>] io_schedule+0x18/0x20<br /> Jan 15 14:30:57 kernel: [<ffffffff816a7601>] bit_wait_io+0x11/0x50<br /> Jan 15 14:30:57 kernel: [<ffffffff816a7601>] bit_wait_io+0x11/0x50<br /> Jan 15 14:30:57 kernel: [<ffffffff816a7125>] __wait_on_bit+0x65/0x90<br /> Jan 15 14:30:57 kernel: [<ffffffff816a7125>] __wait_on_bit+0x65/0x90<br /> Jan 15 14:30:57 kernel: [<ffffffff812361f2>] ? free_buffer_head+0x22/0x50<br /> Jan 15 14:30:57 kernel: [<ffffffff812361f2>] ? free_buffer_head+0x22/0x50<br /> Jan 15 14:30:57 kernel: [<ffffffff81181cb1>] wait_on_page_bit+0x81/0xa0<br /> Jan 15 14:30:57 kernel: [<ffffffff81181cb1>] wait_on_page_bit+0x81/0xa0<br /> Jan 15 14:30:57 kernel: [<ffffffff810b19d0>] ? wake_bit_function+0x40/0x40<br /> Jan 15 14:30:57 kernel: [<ffffffff810b19d0>] ? wake_bit_function+0x40/0x40<br /> Jan 15 14:30:57 kernel: [<ffffffff811965c2>] shrink_page_list+0x842/0xad0<br /> Jan 15 14:30:57 kernel: [<ffffffff811965c2>] shrink_page_list+0x842/0xad0<br /> Jan 15 14:30:57 kernel: [<ffffffff81196e7a>] shrink_inactive_list+0x1ca/0x5d0<br /> Jan 15 14:30:57 kernel: [<ffffffff81196e7a>] shrink_inactive_list+0x1ca/0x5d0<br /> Jan 15 14:30:57 kernel: [<ffffffff81197975>] shrink_lruvec+0x385/0x730<br /> Jan 15 14:30:57 kernel: [<ffffffff81197975>] shrink_lruvec+0x385/0x730<br /> Jan 15 14:30:57 kernel: [<ffffffffc0280400>] ? kmem_zone_alloc+0x60/0x130 [xfs]<br /> Jan 15 14:30:57 kernel: [<ffffffffc0280400>] ? kmem_zone_alloc+0x60/0x130 [xfs]<br /> Jan 15 14:30:57 kernel: [<ffffffff81197d96>] shrink_zone+0x76/0x1a0<br /> Jan 15 14:30:57 kernel: [<ffffffff81197d96>] shrink_zone+0x76/0x1a0<br /> Jan 15 14:30:57 kernel: [<ffffffff811982a0>] do_try_to_free_pages+0xf0/0x4e0<br /> Jan 15 14:30:57 kernel: [<ffffffff811982a0>] do_try_to_free_pages+0xf0/0x4e0<br /> Jan 15 14:30:57 kernel: [<ffffffff8133d9dd>] ? list_del+0xd/0x30<br /> Jan 15 14:30:57 kernel: [<ffffffff8133d9dd>] ? list_del+0xd/0x30<br /> Jan 15 14:30:57 kernel: [<ffffffff811988ea>] try_to_free_mem_cgroup_pages+0xda/0x170<br /> Jan 15 14:30:57 kernel: [<ffffffff811988ea>] try_to_free_mem_cgroup_pages+0xda/0x170<br /> Jan 15 14:30:57 kernel: [<ffffffff811f386e>] mem_cgroup_reclaim+0x4e/0x120<br /> Jan 15 14:30:57 kernel: [<ffffffff811f386e>] mem_cgroup_reclaim+0x4e/0x120<br /> Jan 15 14:30:57 kernel: [<ffffffff811f3e2c>] __mem_cgroup_try_charge+0x4ec/0x670<br /> Jan 15 14:30:57 kernel: [<ffffffff811f3e2c>] __mem_cgroup_try_charge+0x4ec/0x670<br /> Jan 15 14:30:57 kernel: [<ffffffff811f6126>] __memcg_kmem_newpage_charge+0xf6/0x180<br /> Jan 15 14:30:57 kernel: [<ffffffff811f6126>] __memcg_kmem_newpage_charge+0xf6/0x180<br /> Jan 15 14:30:57 kernel: [<ffffffff8118cbad>] __alloc_pages_nodemask+0x22d/0x420<br /> Jan 15 14:30:57 kernel: [<ffffffff811d1108>] ? alloc_pages_current+0x98/0x110<br /> Jan 15 14:30:57 kernel: [<ffffffff8118cbad>] __alloc_pages_nodemask+0x22d/0x420<br /> Jan 15 14:30:57 kernel: [<ffffffff811d1108>] ? alloc_pages_current+0x98/0x110<br /> Jan 15 14:30:57 kernel: [<ffffffff811d1108>] alloc_pages_current+0x98/0x110<br /> Jan 15 14:30:57 kernel: [<ffffffff811d1108>] alloc_pages_current+0x98/0x110<br /> Jan 15 14:30:57 kernel: [<ffffffff811dbe7c>] new_slab+0x2fc/0x310<br /> Jan 15 14:30:57 kernel: [<ffffffff811dd70c>] ___slab_alloc+0x3ac/0x4f0<br /> Jan 15 14:30:57 kernel: [<ffffffff811dbe7c>] new_slab+0x2fc/0x310<br /> Jan 15 14:30:57 kernel: [<ffffffff811dd70c>] ___slab_alloc+0x3ac/0x4f0<br /> Jan 15 14:30:57 kernel: [<ffffffffc0280437>] ? kmem_zone_alloc+0x97/0x130 [xfs]<br /> Jan 15 14:30:57 kernel: [<ffffffff811df6a3>] ? kmem_cache_alloc+0x193/0x1e0<br /> Jan 15 14:30:57 kernel: [<ffffffffc0280437>] ? kmem_zone_alloc+0x97/0x130 [xfs]<br /> Jan 15 14:30:57 kernel: [<ffffffff811df6a3>] ? kmem_cache_alloc+0x193/0x1e0<br /> Jan 15 14:30:57 kernel: [<ffffffff81185455>] ? mempool_alloc_slab+0x15/0x20<br /> Jan 15 14:30:57 kernel: [<ffffffff81185455>] ? mempool_alloc_slab+0x15/0x20<br /> Jan 15 14:30:57 kernel: [<ffffffffc0280437>] ? kmem_zone_alloc+0x97/0x130 [xfs]<br /> Jan 15 14:30:57 kernel: [<ffffffffc0280437>] ? kmem_zone_alloc+0x97/0x130 [xfs]<br /> Jan 15 14:30:57 kernel: [<ffffffff816a10ce>] __slab_alloc+0x40/0x5c<br /> Jan 15 14:30:57 kernel: [<ffffffff816a10ce>] __slab_alloc+0x40/0x5c<br /> Jan 15 14:30:57 kernel: [<ffffffff811df6a3>] kmem_cache_alloc+0x193/0x1e0<br /> Jan 15 14:30:57 kernel: [<ffffffff811df6a3>] kmem_cache_alloc+0x193/0x1e0<br /> Jan 15 14:30:57 kernel: [<ffffffffc0280437>] ? kmem_zone_alloc+0x97/0x130 [xfs]<br /> Jan 15 14:30:57 kernel: [<ffffffffc0280437>] ? kmem_zone_alloc+0x97/0x130 [xfs]<br /> Jan 15 14:30:57 kernel: [<ffffffffc0280437>] kmem_zone_alloc+0x97/0x130 [xfs]<br /> Jan 15 14:30:57 kernel: [<ffffffffc0280437>] kmem_zone_alloc+0x97/0x130 [xfs]<br /> Jan 15 14:30:57 kernel: [<ffffffffc027f99d>] xfs_trans_alloc+0x6d/0x140 [xfs]<br /> Jan 15 14:30:57 kernel: [<ffffffffc02593de>] xfs_setfilesize_trans_alloc.isra.14+0x3e/0x90 [xfs]<br /> Jan 15 14:30:57 kernel: [<ffffffffc027f99d>] xfs_trans_alloc+0x6d/0x140 [xfs]<br /> Jan 15 14:30:57 kernel: [<ffffffffc02593de>] xfs_setfilesize_trans_alloc.isra.14+0x3e/0x90 [xfs]<br /> Jan 15 14:30:57 kernel: [<ffffffffc0259638>] xfs_submit_ioend.isra.16+0xb8/0xe0 [xfs]<br /> Jan 15 14:30:57 kernel: [<ffffffffc0259638>] xfs_submit_ioend.isra.16+0xb8/0xe0 [xfs]<br /> Jan 15 14:30:57 kernel: [<ffffffffc0259e44>] xfs_do_writepage+0x4c4/0x530 [xfs]<br /> Jan 15 14:30:57 kernel: [<ffffffffc0259e44>] xfs_do_writepage+0x4c4/0x530 [xfs]<br /> Jan 15 14:30:57 kernel: [<ffffffff8118dc91>] write_cache_pages+0x251/0x4d0<br /> Jan 15 14:30:57 kernel: [<ffffffff8118dc91>] write_cache_pages+0x251/0x4d0<br /> Jan 15 14:30:57 kernel: [<ffffffffc0259980>] ? xfs_aops_discard_page+0x150/0x150 [xfs]<br /> Jan 15 14:30:57 kernel: [<ffffffffc0259980>] ? xfs_aops_discard_page+0x150/0x150 [xfs]<br /> Jan 15 14:30:57 kernel: [<ffffffffc025978d>] xfs_vm_writepages+0xbd/0xe0 [xfs]<br /> Jan 15 14:30:57 kernel: [<ffffffff8118effe>] do_writepages+0x1e/0x40<br /> Jan 15 14:30:57 kernel: [<ffffffffc025978d>] xfs_vm_writepages+0xbd/0xe0 [xfs]<br /> Jan 15 14:30:57 kernel: [<ffffffff8118effe>] do_writepages+0x1e/0x40<br /> Jan 15 14:30:57 kernel: [<ffffffff81183c55>] __filemap_fdatawrite_range+0x65/0x80<br /> Jan 15 14:30:57 kernel: [<ffffffff81183c55>] __filemap_fdatawrite_range+0x65/0x80<br /> Jan 15 14:30:57 kernel: [<ffffffff81183da1>] filemap_write_and_wait_range+0x41/0x90<br /> Jan 15 14:30:57 kernel: [<ffffffff81183da1>] filemap_write_and_wait_range+0x41/0x90<br /> Jan 15 14:30:57 kernel: [<ffffffffc0264b16>] xfs_file_fsync+0x66/0x1e0 [xfs]<br /> Jan 15 14:30:57 kernel: [<ffffffff8123331d>] generic_write_sync+0x4d/0x60<br /> Jan 15 14:30:57 kernel: [<ffffffffc0264b16>] xfs_file_fsync+0x66/0x1e0 [xfs]<br /> Jan 15 14:30:57 kernel: [<ffffffff8123331d>] generic_write_sync+0x4d/0x60<br /> Jan 15 14:30:57 kernel: [<ffffffffc0266d55>] xfs_file_aio_write+0x155/0x1b0 [xfs]<br /> Jan 15 14:30:57 kernel: [<ffffffffc0266d55>] xfs_file_aio_write+0x155/0x1b0 [xfs]<br /> Jan 15 14:30:57 kernel: [<ffffffff8120026d>] do_sync_write+0x8d/0xd0<br /> Jan 15 14:30:57 kernel: [<ffffffff8120026d>] do_sync_write+0x8d/0xd0<br /> Jan 15 14:30:57 kernel: [<ffffffff81200d2d>] vfs_write+0xbd/0x1e0<br /> Jan 15 14:30:57 kernel: [<ffffffff81200d2d>] vfs_write+0xbd/0x1e0<br /> Jan 15 14:30:57 kernel: [<ffffffff81201b3f>] SyS_write+0x7f/0xe0<br /> Jan 15 14:30:57 kernel: [<ffffffff81201b3f>] SyS_write+0x7f/0xe0<br /> Jan 15 14:30:57 kernel: [<ffffffff816b4fc9>] system_call_fastpath+0x16/0x1b<br /> Jan 15 14:30:57 kernel: [<ffffffff816b4fc9>] system_call_fastpath+0x16/0x1b<br /> <br /> the filebeat running inside a docker with 2G memory limit, and from our monitoring system, we found that when this happened, the memory usage of docker around 1.95G.<br /> <br /> the filebeat is under a heavy load with 5000 log files opened for collecting, and use lots of filesystem cache, and if you execute sync, it will became D state with stack :<br /> <br /> [<ffffffff81181cb1>] wait_on_page_bit+0x81/0xa0<br /> [<ffffffff81181de1>] __filemap_fdatawait_range+0x111/0x190<br /> [<ffffffff81184bd7>] filemap_fdatawait_keep_errors+0x27/0x30<br /> [<ffffffff8122dd1d>] sync_inodes_sb+0x16d/0x1f0<br /> [<ffffffff81233349>] sync_inodes_one_sb+0x19/0x20<br /> [<ffffffff81204ea1>] iterate_supers+0xc1/0x120<br /> [<ffffffff81233614>] sys_sync+0x44/0xb0<br /> [<ffffffff816b4fc9>] system_call_fastpath+0x16/0x1b<br /> [<ffffffffffffffff>] 0xffffffffffffffff

0015570: CentOS 7.6.1810 running on a VirtualBox guest with a GUI has a mouse problem

$
0
0
The mouse problem was first reported for RHEL 7.6 in the following virtualbox forum post:<br /> <br /> <a href="https://forums.virtualbox.org/viewtopic.php?f=3&t=90267">https://forums.virtualbox.org/viewtopic.php?f=3&t=90267</a><br /> "Mouse only usable within single application after mouse click on RHEL 7.6"<br /> <br /> and later in the RHEL discussion session:<br /> <br /> <a href="https://access.redhat.com/discussions/3714911">https://access.redhat.com/discussions/3714911</a><br /> "Mouse only usable within single application after mouse click on RHEL 7.6 as a VirtualBox guest"<br /> <br /> Turns out the issue is related to the kernel version. Only the 7.6 kernels (3.10.0-957.x.el7) seem to be affected. With earlier versions or newer kernels (tested with ELRepo's kernel-lt and kernel-ml), mouse works fine.

0015716: [abrt] kernel: WARNING: CPU: 0 PID: 4981 at drivers/net/wireless/intel/iwlwifi/pcie/trans.c:2088 iwl_trans_pcie_wait_txq_empt...

$
0
0
Version-Release number of selected component:<br /> kernel<br /> <br /> Truncated backtrace:<br /> WARNING: CPU: 0 PID: 4981 at drivers/net/wireless/intel/iwlwifi/pcie/trans.c:2088 iwl_trans_pcie_wait_txq_empty+0x12f/0x140 [iwlwifi]<br /> WR pointer moved while flushing 25 -> 26<br /> Modules linked in: rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver nfs lockd grace fscache rfcomm cmac nf_conntrack_netbios_ns nf_conntrack_broadcast drbg ansi_cprng ccm ip6t_rpfilter ipt_REJECT nf_reject_ipv4 ip6t_REJECT nf_reject_ipv6 xt_conntrack ip_set nfnetlink ebtable_nat ebtable_broute bridge stp llc ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle ip6table_security ip6table_raw iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack iptable_mangle iptable_security iptable_raw ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter bnep sunrpc vfat fat arc4 iwldvm mac80211 mxm_wmi iTCO_wdt iTCO_vendor_support iwlwifi intel_powerclamp coretemp intel_rapl kvm_intel kvm btusb btrtl btbcm irqbypass btintel crc32_pclmul cfg80211<br /> snd_hda_codec_hdmi ghash_clmulni_intel bluetooth aesni_intel lrw gf128mul glue_helper ablk_helper cryptd joydev sparse_keymap uvcvideo i2c_i801 rfkill videobuf2_vmalloc sg videobuf2_memops videobuf2_core pcspkr videodev snd_hda_codec_idt snd_hda_codec_generic mei_me snd_hda_intel ite_cir snd_hda_codec mei rc_core snd_hda_core toshiba_bluetooth ie31200_edac snd_hwdep snd_seq snd_seq_device snd_pcm snd_timer snd wmi lpc_ich soundcore binfmt_misc ip_tables xfs libcrc32c sr_mod cdrom sd_mod crc_t10dif crct10dif_generic uas usb_storage i915 crct10dif_pclmul crct10dif_common crc32c_intel serio_raw i2c_algo_bit iosf_mbi drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ahci drm libahci video libata alx mdio drm_panel_orientation_quirks dm_mirror dm_region_hash dm_log dm_mod<br /> CPU: 0 PID: 4981 Comm: wpa_supplicant Not tainted 3.10.0-957.1.3.el7.x86_64 #1<br /> Hardware name: TOSHIBA SATELLITE P50-A-11J/VG10S, BIOS 1.90 09/19/2014<br /> Call Trace:<br /> [<ffffffff8db61e41>] dump_stack+0x19/0x1b<br /> [<ffffffff8d497648>] __warn+0xd8/0x100<br /> [<ffffffff8d4976cf>] warn_slowpath_fmt+0x5f/0x80<br /> [<ffffffff8db66eb3>] ? schedule_hrtimeout_range+0x13/0x20<br /> [<ffffffffc0d5e0df>] iwl_trans_pcie_wait_txq_empty+0x12f/0x140 [iwlwifi]<br /> [<ffffffffc0d5e15b>] iwl_trans_pcie_wait_txqs_empty+0x6b/0xa0 [iwlwifi]<br /> [<ffffffffc0d874d2>] iwlagn_mac_flush+0x82/0x130 [iwldvm]<br /> [<ffffffffc0c9c7bb>] __ieee80211_flush_queues+0xbb/0x1c0 [mac80211]<br /> [<ffffffffc0c9c8d3>] ieee80211_flush_queues+0x13/0x20 [mac80211]<br /> [<ffffffffc0cbd718>] ieee80211_set_disassoc+0x428/0x550 [mac80211]<br /> [<ffffffffc0cc19bc>] ieee80211_mgd_deauth+0x13c/0x250 [mac80211]<br /> [<ffffffffc0c83e28>] ieee80211_deauth+0x18/0x20 [mac80211]<br /> [<ffffffffc0a89b0d>] cfg80211_mlme_deauth+0xbd/0x200 [cfg80211]<br /> [<ffffffffc0a6a393>] nl80211_deauthenticate+0xe3/0x140 [cfg80211]<br /> [<ffffffff8da77918>] genl_family_rcv_msg+0x208/0x430<br /> [<ffffffff8da23a54>] ? consume_skb+0x34/0x90<br /> [<ffffffff8db66612>] ? mutex_lock_interruptible+0x12/0x3c<br /> [<ffffffff8da77b9b>] genl_rcv_msg+0x5b/0xc0<br /> [<ffffffff8da73ec0>] ? __netlink_lookup+0xc0/0x110<br /> [<ffffffff8da77b40>] ? genl_family_rcv_msg+0x430/0x430<br /> [<ffffffff8da75bab>] netlink_rcv_skb+0xab/0xc0<br /> [<ffffffff8da760e8>] genl_rcv+0x28/0x40<br /> [<ffffffff8da75530>] netlink_unicast+0x170/0x210<br /> [<ffffffff8da758d8>] netlink_sendmsg+0x308/0x420<br /> [<ffffffff8da193a6>] sock_sendmsg+0xb6/0xf0<br /> [<ffffffff8da194f5>] ? sock_recvmsg+0xc5/0x100<br /> [<ffffffff8d656fe0>] ? __pollwait+0xf0/0xf0<br /> [<ffffffff8da1a269>] ___sys_sendmsg+0x3e9/0x400<br /> [<ffffffff8d4ac4ab>] ? recalc_sigpending+0x1b/0x70<br /> [<ffffffff8d4ace21>] ? __set_task_blocked+0x41/0xa0<br /> [<ffffffff8d4af852>] ? __set_current_blocked+0x42/0x70<br /> [<ffffffff8d63e2aa>] ? __check_object_size+0x1ca/0x250<br /> [<ffffffff8d437d5c>] ? __restore_xstate_sig+0xac/0x630<br /> [<ffffffff8da1b921>] __sys_sendmsg+0x51/0x90<br /> [<ffffffff8da1b972>] SyS_sendmsg+0x12/0x20<br /> [<ffffffff8db74ddb>] system_call_fastpath+0x22/0x27

0015717: Grub2 relocator module bug loading Xen under UEFI

$
0
0
On HP DL360g9 using EEFI<br /> Using multiboot2 and module2 to boot xen-410 with kernel 4.9.127-32.el7.x86_64<br /> <br /> grub displays "Loading initial ramdisk ..." then hangs.<br /> debugging grub outputs this just before the hang:<br /> mmap/efi/mmap.c:66: EFI memory region 0x7b7ff000-0x7b800000: 4<br /> mmap/efi/mmap.c:66: EFI memory region 0x100000000-0x480000000: 7<br /> mmap/efi/mmap.c:66: EFI memory region 0x80000000-0x90000000: 11<br /> video/efi_gop.c:390: GOP: keeping mode 2<br /> video/efi_gop.c:498: GOP: initialising FB @ 0x91000000 1024x768x32<br /> video/efi_gop.c:523: GOP: Success<br /> lib/relocator.c:1387: chunks = 0x3eb93040<br /> lib/relocator.c:434: trying to allocate in 0x1000-0x99f10 aligned 0x10 size<br /> 0xf0<br /> lib/relocator.c:1188: allocated: 0x6000+0xf0<br /> lib/relocator.c:1399: allocated 0x6000/0x6000<br /> lib/relocator.c:1400: chunks = 0x3eb93040<br /> lib/relocator.c:1523: Preparing relocs (size=12)<br /> lib/relocator.c:434: trying to allocate in 0x0-0xfffffffffffffff4 aligned 0x1<br /> size 0xc<br /> lib/relocator.c:1188: allocated: 0x7000+0xc<br /> lib/relocator.c:1535: Relocs allocated at 0x7000<br /> lib/relocator.c:1550: chunk 0x6000->0x6000, 0xf0<br /> lib/relocator.c:1550: chunk 0x1000->0x1000, 0x4862<br /> lib/relocator.c:1550: chunk 0xcaa000->0xcaa000, 0x14aca65<br /> lib/relocator.c:1550: chunk 0x579000->0x579000, 0x730720<br /> lib/relocator.c:1550: chunk 0x0->0x0, 0x18<br /> lib/relocator.c:1550: chunk 0x200000->0x200000, 0x379000<br /> lib/relocator.c:1594: sorted chunk 0x0->0x0, 0x18<br /> lib/relocator.c:1594: sorted chunk 0x1000->0x1000, 0x4862<br /> lib/relocator.c:1594: sorted chunk 0x6000->0x6000, 0xf0<br /> lib/relocator.c:1594: sorted chunk 0x200000->0x200000, 0x379000<br /> lib/relocator.c:1594: sorted chunk 0x579000->0x579000, 0x730720<br /> lib/relocator.c:1594: sorted chunk 0xcaa000->0xcaa000, 0x14aca65

0006828: Tracking for centosplus kernels for CentOS-7

$
0
0
Build and maintain centosplus kernels for EL7.

0015526: autofs stop working after upgrade to CentOS 7.6.1810

$
0
0
This morning yum-cron updated CentOS to 7.6.1810 and autofs stopped working. It's been working for at least one year before.<br /> <br /> When starting "/usr/sbin/automount -d -v --foreground --dont-check-daemon" I get the output shown in attached file "automount.txt". <br /> <br /> Dmesg shows:<br /> automount[25212]: segfault at 7fa6c8516320 ip 00007fa6c99926d0 sp 00007fa6c8dd63e8 error 4 in libcrypto.so.1.0.2k[7fa6c986b000+234000]<br /> <br /> Abrt message: see attached abort.txt<br /> <br /> The relevant Ldap entries are:<br /> <br /> ou=automount,ou=auto.master,BASEDN<br /> objectClass = automountMap<br /> (children)<br /> -- cn=/-<br /> automountInformation = auto.shares<br /> objectClass = automount<br /> <br /> ou=auto.shares,ou=automount,BASEDN<br /> objectClass = automountMap<br /> (children)<br /> -- cn = /data<br /> objectClass = automount<br /> automountInformation = -nfsvers=3 serverX:/export/data

0015586: Unable to create new files or folders using samba and vfs_glusterfs

$
0
0
Samba 4.8.3 using vfs_gluster prevents users on Windows clients from creating new files. See samba bug for full details:<br /> <br /> <a href="https://bugzilla.samba.org/show_bug.cgi?id=13585">https://bugzilla.samba.org/show_bug.cgi?id=13585</a><br /> <br /> This affects a combination of samba 4.8.3 and glusterfs 4.1.6<br /> <br /> Also files a RHEL bug at:<br /> <br /> <a href="https://bugzilla.redhat.com/show_bug.cgi?id=1659533">https://bugzilla.redhat.com/show_bug.cgi?id=1659533</a>

0015718: AuthorizedKeysCommand is ignored by sshd

$
0
0
Config:<br /> ----------<br /> <br /> AuthorizedKeysCommand /etc/ssh/cat_keys_d.sh %u<br /> AuthorizedKeysCommandRunAs %u<br /> <br /> The script: <br /> ----------------<br /> <br /> #!/bin/sh<br /> for i in `ls "/home/${1}/.ssh/authorized_keys.d/"`<br /> do<br /> cat "/home/${1}/.ssh/authorized_keys.d/$i"<br /> done<br /> <br /> Debug (sshd -ddd):<br /> -----------------------------<br /> <br /> debug3: /etc/ssh/sshd_config:53 setting AuthorizedKeysCommand /etc/ssh/cat_keys_d.sh %u<br /> debug3: /etc/ssh/sshd_config:54 setting AuthorizedKeysCommandRunAs %u<br /> ...<br /> debug1: userauth-request for user web service ssh-connection method publickey<br /> debug1: attempt 1 failures 0<br /> debug2: input_userauth_request: try method publickey<br /> debug1: test whether pkalg/pkblob are acceptable<br /> debug3: mm_key_allowed entering<br /> debug3: mm_request_send entering: type 21<br /> debug3: mm_key_allowed: waiting for MONITOR_ANS_KEYALLOWED<br /> debug3: mm_request_receive_expect entering: type 22<br /> debug3: mm_request_receive entering<br /> debug3: monitor_read: checking request 21<br /> debug3: mm_answer_keyallowed entering<br /> debug3: mm_answer_keyallowed: key_from_blob: 0x56542d414560<br /> user_key_via_command_allowed2: getpwnam("%u"): Success<br /> debug1: temporarily_use_uid: 100/101 (e=0/0)<br /> debug1: trying public key file /home/web/.ssh/authorized_keys<br /> debug1: Could not open authorized keys '/home/web/.ssh/authorized_keys': No such file or directory<br /> debug1: restore_uid: 0/0<br /> debug1: temporarily_use_uid: 100/101 (e=0/0)<br /> debug1: trying public key file /home/web/.ssh/authorized_keys2<br /> debug1: Could not open authorized keys '/home/web/.ssh/authorized_keys2': No such file or directory<br /> debug1: restore_uid: 0/0<br /> Failed publickey for web from 144.92.167.190 port 53874 ssh2<br /> debug3: mm_answer_keyallowed: key 0x56542d414560 is not allowed<br /> debug3: mm_request_send entering: type 22<br /> debug3: mm_request_receive entering<br /> debug2: userauth_pubkey: authenticated 0 pkalg ssh-rsa<br /> debug3: Wrote 72 bytes for a total of 2429<br /> debug1: userauth-request for user web service ssh-connection method publickey<br /> debug1: attempt 2 failures 1<br /> debug2: input_userauth_request: try method publickey<br /> debug1: test whether pkalg/pkblob are acceptable<br /> debug3: mm_key_allowed entering<br /> debug3: mm_request_send entering: type 21<br /> debug3: mm_key_allowed: waiting for MONITOR_ANS_KEYALLOWED<br /> debug3: mm_request_receive_expect entering: type 22<br /> debug3: mm_request_receive entering<br /> debug3: monitor_read: checking request 21<br /> debug3: mm_answer_keyallowed entering<br /> debug3: mm_answer_keyallowed: key_from_blob: 0x56542d414680<br /> user_key_via_command_allowed2: getpwnam("%u"): Success<br /> debug1: temporarily_use_uid: 100/101 (e=0/0)<br /> debug1: trying public key file /home/web/.ssh/authorized_keys<br /> debug1: Could not open authorized keys '/home/web/.ssh/authorized_keys': No such file or directory<br /> debug1: restore_uid: 0/0<br /> debug1: temporarily_use_uid: 100/101 (e=0/0)<br /> debug1: trying public key file /home/web/.ssh/authorized_keys2<br /> debug1: Could not open authorized keys '/home/web/.ssh/authorized_keys2': No such file or directory<br /> debug1: restore_uid: 0/0<br /> Failed publickey for web from 144.92.167.190 port 53874 ssh2<br /> <br /> I.e. the settings are accepted at startup and seem to be cvompletely ignored on connection attempts.

0015533: [abrt] xorg-x11-server-Xorg: Xorg server crashed

$
0
0
Description of problem:<br /> Happened a few hours after the upgrade to CentOS 7.6 (1810).<br /> During the time of the crash there was no human interaction with the system and nobody was logged in (neither to console nor system).<br /> System and framebuffer are virtual, running on VMware ESXi 6.5U2.<br /> <br /> Version-Release number of selected component:<br /> xorg-x11-server-Xorg-1.20.1-5.1.el7<br /> <br /> Truncated backtrace:<br /> 0: /usr/bin/X (xorg_backtrace+0x55) [0x564667b44185]<br /> 1: /usr/bin/X (0x564667993000+0x1b4e09) [0x564667b47e09]<br /> 2: /lib64/libpthread.so.0 (0x7fb5cc56f000+0xf5d0) [0x7fb5cc57e5d0]<br /> 3: /usr/bin/X (RROutputIsLeased+0x9e) [0x564667aabcfe]<br /> 4: /usr/bin/X (xf86DPMSSet+0x10d) [0x564667a5d74d]<br /> 5: /usr/lib64/xorg/modules/drivers/vmware_drv.so (0x7fb5c875e000+0x10ab7) [0x7fb5c876eab7]<br /> 6: /usr/lib64/xorg/modules/drivers/vmware_drv.so (0x7fb5c875e000+0xe5b3) [0x7fb5c876c5b3]<br /> 7: /usr/bin/X (0x564667993000+0xc88dc) [0x564667a5b8dc]<br /> 8: /usr/bin/X (0x564667993000+0xe7bf8) [0x564667a7abf8]<br /> 9: /usr/bin/X (0x564667993000+0x132d53) [0x564667ac5d53]<br /> 10: /usr/bin/X (0x564667993000+0x604c4) [0x5646679f34c4]<br /> 11: /lib64/libc.so.6 (__libc_start_main+0xf5) [0x7fb5cc1c43d5]<br /> 12: /usr/bin/X (0x564667993000+0x4a4ce) [0x5646679dd4ce]
Viewing all 19115 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>