Sometimes physical servers hung - random processes hung with trace below, also cann't execute some commands, like top, atop, iostat, finally all process stop write logs and system hung.<br />
[6175405.104220] [<ffffffffa6d18f39>] schedule+0x29/0x70<br />
[6175405.104252] [<ffffffffa6d1a56d>] rwsem_down_read_failed+0x10d/0x1a0<br />
[6175405.104262] [<ffffffffa695f3d8>] call_rwsem_down_read_failed+0x18/0x30<br />
[6175405.104291] [<ffffffffa6d18060>] down_read+0x20/0x40<br />
[6175405.104301] [<ffffffffa68985d2>] proc_pid_cmdline_read+0xb2/0x560<br />
[6175405.104334] [<ffffffffa68d549c>] ? security_file_permission+0x8c/0xa0<br />
[6175405.104342] [<ffffffffa681f0af>] vfs_read+0x9f/0x170<br />
[6175405.104347] [<ffffffffa681ff7f>] SyS_read+0x7f/0xf0<br />
[6175405.104380] [<ffffffffa6d2579b>] system_call_fastpath+0x22/0x27<br />
<br />
Full vmcore-dmesg in addition
↧
0015711: System hung on rwsem_down_read_failed+0x10d/0x1a0
↧
0015252: system hung on rwsem_down_read_failed
some proc hung on rwsem_down_read_failed.cat /proc/pid/cmdline also hung.<br />
call trace as below:<br />
kernel: INFO: task axserver:202459 blocked for more than 120 seconds.<br />
kernel: "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.<br />
kernel: bidserver D ffff887bf26d7de0 0 202459 198052 0x00000080<br />
kernel: ffff887bf26d7db8 0000000000000086 ffff88541f65eeb0 ffff887bf26d7fd8<br />
kernel: ffff887bf26d7fd8 ffff887bf26d7fd8 ffff88541f65eeb0 ffff88541f65eeb0<br />
kernel: ffff887f6af44538 ffffffffffffffff ffff887f6af44540 ffff887bf26d7de0<br />
kernel: Call Trace:<br />
kernel: [<ffffffff816a9ad9>] schedule+0x29/0x70<br />
kernel: [<ffffffff816ab10d>] rwsem_down_read_failed+0x10d/0x1a0<br />
kernel: [<ffffffff81331ba8>] call_rwsem_down_read_failed+0x18/0x30<br />
kernel: [<ffffffff816a8d70>] down_read+0x20/0x40<br />
kernel: [<ffffffff816b07dc>] __do_page_fault+0x37c/0x450<br />
kernel: [<ffffffff816b08e5>] do_page_fault+0x35/0x90<br />
kernel: [<ffffffff816acb08>] page_fault+0x28/0x30
↧
↧
0013142: [abrt] setroubleshoot-server: analyze.py:294:prune:ValueError: list modified during sort
Version-Release number of selected component:<br />
setroubleshoot-server-3.2.27.2-3.el7<br />
<br />
Truncated backtrace:<br />
analyze.py:294:prune:ValueError: list modified during sort<br />
<br />
Traceback (most recent call last):<br />
File "/usr/lib64/python2.7/site-packages/setroubleshoot/analyze.py", line 377, in auto_save_callback<br />
self.save()<br />
File "/usr/lib64/python2.7/site-packages/setroubleshoot/analyze.py", line 355, in save<br />
self.prune()<br />
File "/usr/lib64/python2.7/site-packages/setroubleshoot/analyze.py", line 294, in prune<br />
self.sigs.signature_list.sort(lambda a,b: cmp(a.last_seen_date, b.last_seen_date))<br />
ValueError: list modified during sort<br />
<br />
Local variables in innermost frame:<br />
self: <setroubleshoot.analyze.SETroubleshootDatabase object at 0x217dad0>
↧
0015682: accept invite to repo rhdt/saas-contracts
Can you please accept the invite for:<br />
<a href="https://github.com/rhdt/saas-contracts/invitations">https://github.com/rhdt/saas-contracts/invitations</a> ?
↧
0015712: Create a project and user for ovirt-devops team in CentoCI
Hi,<br />
<br />
I would like to ask for 2 projects that will serve ovirt-devops team to run CI workload for the oVirt project <a href="https://ovirt.org/">https://ovirt.org/</a><br />
We need 2 projects: "ovirt-production" and "ovirt-staging".<br />
The following users should be created, and granted with access to the projects above:<br />
<br />
Gal Ben Haim <<a href="mailto:gbenhaim@redhat.com">gbenhaim@redhat.com</a>><br />
Anton Marchukov <<a href="mailto:amarchuk@redhat.com">amarchuk@redhat.com</a>><br />
Evgheni Dereveanchin <<a href="mailto:ederevea@redhat.com">ederevea@redhat.com</a>><br />
Dusan Fodor <<a href="mailto:dfodor@redhat.com">dfodor@redhat.com</a>> <br />
Dafna Ron <<a href="mailto:dron@redhat.com">dron@redhat.com</a>> <br />
Liora Milbaum <<a href="mailto:lmilbaum@redhat.com">lmilbaum@redhat.com</a>> (the user already exists, need only to give permissions for the projects)<br />
Galit Rosenthal <<a href="mailto:grosenth@redhat.com">grosenth@redhat.com</a>><br />
Barak Korren <<a href="mailto:bkorren@redhat.com">bkorren@redhat.com</a>><br />
Daniel Belenky <<a href="mailto:dbelenky@redhat.com">dbelenky@redhat.com</a>><br />
Ehud Yonasi <<a href="mailto:eyonasi@redhat.com">eyonasi@redhat.com</a>><br />
Emil Natan <<a href="mailto:ena@redhat.com">ena@redhat.com</a>><br />
Eyal Edri <<a href="mailto:eedri@redhat.com">eedri@redhat.com</a>><br />
<br />
Thanks,<br />
<br />
Gal.
↧
↧
0015589: Please update livecd-tools to 26.1 - livecd-tools-21.4-2.el7 from 2015 is in Extras and has issues
Since the release of 7.6.1810, I've started having trouble building personal remix live media with livecd-creator. It seems to be related to this upstream bug (upstream being Fedora in this case):<br />
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=1658359">https://bugzilla.redhat.com/show_bug.cgi?id=1658359</a><br />
... with this fix:<br />
<a href="https://github.com/livecd-tools/livecd-tools/commit/c6dd265af7ccb3c51c37dcd89839f178832518ea">https://github.com/livecd-tools/livecd-tools/commit/c6dd265af7ccb3c51c37dcd89839f178832518ea</a><br />
<br />
Since Fedora has a much newer version of livecd-tools backporting the patch would require a bit of work.<br />
<br />
According to one of the Fedora maintainers (see rhb mentioned above):<br />
<br />
"As of EL7.6, it is now possible to run the latest version of livecd-tools on EL7. CentOS was planning on switching to livecd-tools v26, but this issue (which is now fixed in v26.1) came a bit late for the 7.6 GA. I made the spec fixes so that they could backport straight from Fedora Dist-Git to CentOS Extras.<br />
<br />
I'm hoping that Fabian Arrotin and Pablo Greco will ship v26.1 soon in their Extras (which I believe Scientific Linux and friends get it from...)."
↧
0010819: [abrt] gnome-tweak-tool: zipfile.py:807:_RealGetContents:BadZipfile: File is not a zip file
Version-Release number of selected component:<br />
gnome-tweak-tool-3.14.3-2.el7<br />
<br />
Truncated backtrace:<br />
zipfile.py:807:_RealGetContents:BadZipfile: File is not a zip file<br />
<br />
Traceback (most recent call last):<br />
File "/usr/lib/python2.7/site-packages/gtweak/tweaks/tweak_group_interface.py", line 203, in _on_file_set<br />
with zipfile.ZipFile(f, 'r') as z:<br />
File "/usr/lib64/python2.7/zipfile.py", line 766, in __init__<br />
self._RealGetContents()<br />
File "/usr/lib64/python2.7/zipfile.py", line 807, in _RealGetContents<br />
raise BadZipfile, "File is not a zip file"<br />
BadZipfile: File is not a zip file<br />
<br />
Local variables in innermost frame:<br />
fp: <closed file '/home/fenglc/\xe4\xb8\x8b\xe8\xbd\xbd/xenlism-minimalism-cd37cf8.tar.gz.zip', mode 'rb' at 0x2b78f60><br />
self: <zipfile.ZipFile object at 0x2b98a90><br />
endrec: None
↧
0015713: SELinux denied /usr/bin/gsf-office-thumbnailer methods access 'nnp_transition, nosuid_transition' to process.
SELinux запрещает /usr/bin/gsf-office-thumbnailer методы доступа 'nnp_transition, nosuid_transition' к процессу.<br />
<br />
***** Модуль catchall предлагает (точность 100.) ***************************<br />
<br />
If you believe that gsf-office-thumbnailer should be allowed nnp_transition nosuid_transition access on processes labeled thumb_t by default.<br />
То рекомендуется создать отчет об ошибке.<br />
Чтобы разрешить доступ, можно создать локальный модуль политики.<br />
Сделать<br />
allow this access for now by executing:<br />
# ausearch -c 'gsf-office-thum' --raw | audit2allow -M my-gsfofficethum<br />
# semodule -i my-gsfofficethum.pp<br />
<br />
Дополнительные сведения:<br />
Исходный контекст unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1<br />
023<br />
Целевой контекст unconfined_u:unconfined_r:thumb_t:s0-s0:c0.c1023<br />
Целевые объекты Unknown [ process2 ]<br />
Источник gsf-office-thum<br />
Путь к источнику /usr/bin/gsf-office-thumbnailer<br />
Порт <Unknown><br />
Узел ca.alljoint.ru<br />
Исходные пакеты RPM totem-3.26.2-1.el7.x86_64<br />
Целевые пакеты RPM <br />
Пакет регламента selinux-policy-3.13.1-229.el7_6.6.noarch<br />
SELinux активен True<br />
Тип регламента targeted<br />
Режим Enforcing<br />
Имя узла ca.alljoint.ru<br />
Платформа Linux ca.alljoint.ru 3.10.0-957.1.3.el7.x86_64 #1<br />
SMP Thu Nov 29 14:49:43 UTC 2018 x86_64 x86_64<br />
Счетчик уведомлений 161<br />
Впервые обнаружено 2019-01-10 15:54:42 MSK<br />
В последний раз 2019-01-16 13:15:56 MSK<br />
Локальный ID 749e8e8a-20e0-4486-bfda-d9d87a3b652f<br />
<br />
Построчный вывод сообщений аудита<br />
type=AVC msg=audit(1547633756.531:6095): avc: denied { nnp_transition nosuid_transition } for pid=1174 comm="flatpak-bwrap" scontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tcontext=unconfined_u:unconfined_r:thumb_t:s0-s0:c0.c1023 tclass=process2 permissive=0<br />
<br />
<br />
type=SYSCALL msg=audit(1547633756.531:6095): arch=x86_64 syscall=execve success=yes exit=0 a0=7ffcb72916f8 a1=7ffcb7291080 a2=14c5160 a3=7ffcb728e560 items=0 ppid=1167 pid=1174 auid=1000 uid=1000 gid=1000 euid=1000 suid=1000 fsuid=1000 egid=1000 sgid=1000 fsgid=1000 tty=(none) ses=45 comm=totem-video-thu exe=/usr/bin/totem-video-thumbnailer subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 key=(null)<br />
<br />
Hash: gsf-office-thum,unconfined_t,thumb_t,process2,nnp_transition,nosuid_transition
↧
0015714: SELinux is preventing /usr/bin/spamc from 'read' accesses on the memoria compartida labeled unconfined_service_t.
Description of problem:<br />
SELinux is preventing /usr/bin/spamc from 'read' accesses on the memoria compartida labeled unconfined_service_t.<br />
<br />
***** Plugin catchall (100. confidence) suggests **************************<br />
<br />
Si cree que de manera predeterminada se debería permitir a spamc el acceso read sobre shm etiquetados como unconfined_service_t.<br />
Then debería reportar esto como un error.<br />
Puede generar un módulo de política local para permitir este acceso.<br />
Do<br />
permita el acceso temporalmente ejecutando:<br />
# ausearch -c 'spamc' --raw | audit2allow -M mi-spamc<br />
# semodule -i mi-spamc.pp<br />
<br />
Additional Information:<br />
Source Context system_u:system_r:spamc_t:s0<br />
Target Context system_u:system_r:unconfined_service_t:s0<br />
Target Objects Unknown [ shm ]<br />
Source spamc<br />
Source Path /usr/bin/spamc<br />
Port <Unknown><br />
Host (removed)<br />
Source RPM Packages spamassassin-3.4.0-4.el7_5.x86_64<br />
Target RPM Packages <br />
Policy RPM selinux-policy-3.13.1-229.el7_6.6.noarch<br />
Selinux Enabled True<br />
Policy Type targeted<br />
Enforcing Mode Permissive<br />
Host Name (removed)<br />
Platform Linux (removed) 3.10.0-957.1.3.el7.x86_64 #1 SMP<br />
Thu Nov 29 14:49:43 UTC 2018 x86_64 x86_64<br />
Alert Count 1<br />
First Seen 2019-01-16 13:26:41 CET<br />
Last Seen 2019-01-16 13:26:41 CET<br />
Local ID 91e763c0-e5f4-4e5a-ac7e-584c975683c2<br />
<br />
Raw Audit Messages<br />
type=AVC msg=audit(1547641601.943:297760): avc: denied { read } for pid=82923 comm="spamc" key=838875571 scontext=system_u:system_r:spamc_t:s0 tcontext=system_u:system_r:unconfined_service_t:s0 tclass=shm permissive=1<br />
<br />
<br />
type=AVC msg=audit(1547641601.943:297760): avc: denied { read } for pid=82923 comm="spamc" path=2F535953563332303033396233202864656C6574656429 dev="tmpfs" ino=0 scontext=system_u:system_r:spamc_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=file permissive=1<br />
<br />
<br />
type=SYSCALL msg=audit(1547641601.943:297760): arch=x86_64 syscall=shmat success=yes exit=139908526686208 a0=0 a1=0 a2=1000 a3=7ffd3be56160 items=0 ppid=82922 pid=82923 auid=4294967295 uid=30 gid=30 euid=30 suid=30 fsuid=30 egid=30 sgid=30 fsgid=30 tty=(none) ses=4294967295 comm=spamc exe=/usr/bin/spamc subj=system_u:system_r:spamc_t:s0 key=(null)<br />
<br />
Hash: spamc,spamc_t,unconfined_service_t,shm,read<br />
<br />
Version-Release number of selected component:<br />
selinux-policy-3.13.1-229.el7_6.6.noarch
↧
↧
0015585: SELinux is preventing /usr/lib64/nagios/plugins/check_mailq from checking postfix mailq. since CentOS 7.6
SELINUX is preventing check_mailq from running properly.<br />
<br />
### AVC denied. ####<br />
msg=audit(1544537618.291:81322): avc: denied { read write } for pid=45806 comm="check_mailq" path="socket:[11479019]" dev="sockfs" ino=11479019 scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:system_r:nrpe_t:s0 tclass=tcp_socket permissive=1<br />
type=AVC msg=audit(1544537618.291:81322): avc: denied { rlimitinh } for pid=45806 comm="check_mailq" scontext=system_u:system_r:nrpe_t:s0 tcontext=system_u:system_r:nagios_system_plugin_t:s0 tclass=process permissive=1<br />
type=AVC msg=audit(1544537618.291:81322): avc: denied { siginh } for pid=45806 comm="check_mailq" scontext=system_u:system_r:nrpe_t:s0 tcontext=system_u:system_r:nagios_system_plugin_t:s0 tclass=process permissive=1<br />
type=AVC msg=audit(1544537618.291:81322): avc: denied { noatsecure } for pid=45806 comm="check_mailq" scontext=system_u:system_r:nrpe_t:s0 tcontext=system_u:system_r:nagios_system_plugin_t:s0 tclass=process permissive=1<br />
type=AVC msg=audit(1544537618.344:81323): avc: denied { execute } for pid=45807 comm="check_mailq" name="sudo" dev="dm-0" ino=35930127 scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1<br />
type=AVC msg=audit(1544537618.344:81323): avc: denied { read open } for pid=45807 comm="check_mailq" path="/usr/bin/sudo" dev="dm-0" ino=35930127 scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1<br />
type=AVC msg=audit(1544537618.344:81323): avc: denied { execute_no_trans } for pid=45807 comm="check_mailq" path="/usr/bin/sudo" dev="dm-0" ino=35930127 scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:object_r:sudo_exec_t:s0 tclass=file permissive=1<br />
type=AVC msg=audit(1544537618.348:81324): avc: denied { create } for pid=45807 comm="sudo" scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:system_r:nagios_system_plugin_t:s0 tclass=netlink_route_socket permissive=1<br />
type=AVC msg=audit(1544537618.348:81325): avc: denied { bind } for pid=45807 comm="sudo" scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:system_r:nagios_system_plugin_t:s0 tclass=netlink_route_socket permissive=1<br />
type=AVC msg=audit(1544537618.348:81326): avc: denied { getattr } for pid=45807 comm="sudo" scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:system_r:nagios_system_plugin_t:s0 tclass=netlink_route_socket permissive=1<br />
type=AVC msg=audit(1544537618.348:81327): avc: denied { write } for pid=45807 comm="sudo" scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:system_r:nagios_system_plugin_t:s0 tclass=netlink_route_socket permissive=1<br />
type=AVC msg=audit(1544537618.348:81327): avc: denied { nlmsg_read } for pid=45807 comm="sudo" scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:system_r:nagios_system_plugin_t:s0 tclass=netlink_route_socket permissive=1<br />
type=AVC msg=audit(1544537618.348:81328): avc: denied { read } for pid=45807 comm="sudo" scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:system_r:nagios_system_plugin_t:s0 tclass=netlink_route_socket permissive=1<br />
type=AVC msg=audit(1544537618.352:81329): avc: denied { setuid } for pid=45807 comm="sudo" capability=7 scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:system_r:nagios_system_plugin_t:s0 tclass=capability permissive=1<br />
type=AVC msg=audit(1544537618.352:81330): avc: denied { setgid } for pid=45807 comm="sudo" capability=6 scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:system_r:nagios_system_plugin_t:s0 tclass=capability permissive=1<br />
type=AVC msg=audit(1544537618.354:81331): avc: denied { sys_resource } for pid=45807 comm="sudo" capability=24 scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:system_r:nagios_system_plugin_t:s0 tclass=capability permissive=1<br />
type=AVC msg=audit(1544537618.354:81331): avc: denied { setrlimit } for pid=45807 comm="sudo" scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:system_r:nagios_system_plugin_t:s0 tclass=process permissive=1<br />
type=AVC msg=audit(1544537618.365:81332): avc: denied { execute } for pid=45808 comm="sudo" name="unix_chkpwd" dev="dm-0" ino=67288967 scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1<br />
type=AVC msg=audit(1544537618.365:81332): avc: denied { read open } for pid=45808 comm="sudo" path="/usr/sbin/unix_chkpwd" dev="dm-0" ino=67288967 scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1<br />
type=AVC msg=audit(1544537618.365:81332): avc: denied { execute_no_trans } for pid=45808 comm="sudo" path="/usr/sbin/unix_chkpwd" dev="dm-0" ino=67288967 scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:object_r:chkpwd_exec_t:s0 tclass=file permissive=1<br />
type=AVC msg=audit(1544537618.367:81333): avc: denied { read } for pid=45808 comm="unix_chkpwd" name="shadow" dev="dm-0" ino=70013445 scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file permissive=1<br />
type=AVC msg=audit(1544537618.367:81333): avc: denied { open } for pid=45808 comm="unix_chkpwd" path="/etc/shadow" dev="dm-0" ino=70013445 scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file permissive=1<br />
type=AVC msg=audit(1544537618.367:81334): avc: denied { getattr } for pid=45808 comm="unix_chkpwd" path="/etc/shadow" dev="dm-0" ino=70013445 scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:object_r:shadow_t:s0 tclass=file permissive=1<br />
type=AVC msg=audit(1544537618.367:81335): avc: denied { create } for pid=45807 comm="sudo" scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:system_r:nagios_system_plugin_t:s0 tclass=netlink_audit_socket permissive=1<br />
type=AVC msg=audit(1544537618.368:81336): avc: denied { write } for pid=45807 comm="sudo" scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:system_r:nagios_system_plugin_t:s0 tclass=netlink_audit_socket permissive=1<br />
type=AVC msg=audit(1544537618.368:81336): avc: denied { nlmsg_relay } for pid=45807 comm="sudo" scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:system_r:nagios_system_plugin_t:s0 tclass=netlink_audit_socket permissive=1<br />
type=AVC msg=audit(1544537618.368:81336): avc: denied { audit_write } for pid=45807 comm="sudo" capability=29 scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:system_r:nagios_system_plugin_t:s0 tclass=capability permissive=1<br />
type=AVC msg=audit(1544537618.368:81338): avc: denied { read } for pid=45807 comm="sudo" scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:system_r:nagios_system_plugin_t:s0 tclass=netlink_audit_socket permissive=1<br />
type=AVC msg=audit(1544537618.369:81341): avc: denied { setsched } for pid=45807 comm="sudo" scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:system_r:nagios_system_plugin_t:s0 tclass=process permissive=1<br />
type=AVC msg=audit(1544537618.369:81342): avc: denied { net_admin } for pid=45807 comm="sudo" capability=12 scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:system_r:nagios_system_plugin_t:s0 tclass=capability permissive=1<br />
type=AVC msg=audit(1544537618.369:81343): avc: denied { search } for pid=45807 comm="sudo" name="dbus" dev="tmpfs" ino=29495 scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:object_r:system_dbusd_var_run_t:s0 tclass=dir permissive=1<br />
type=AVC msg=audit(1544537618.392:81345): avc: denied { execute } for pid=45809 comm="sudo" name="sendmail.postfix" dev="dm-0" ino=68328044 scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:object_r:sendmail_exec_t:s0 tclass=file permissive=1<br />
type=AVC msg=audit(1544537618.392:81345): avc: denied { read open } for pid=45809 comm="sudo" path="/usr/lib64/plesk-9.0/sendmail/sendmail.postfix" dev="dm-0" ino=68328044 scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:object_r:sendmail_exec_t:s0 tclass=file permissive=1<br />
type=AVC msg=audit(1544537618.392:81345): avc: denied { execute_no_trans } for pid=45809 comm="sudo" path="/usr/lib64/plesk-9.0/sendmail/sendmail.postfix" dev="dm-0" ino=68328044 scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:object_r:sendmail_exec_t:s0 tclass=file permissive=1<br />
type=AVC msg=audit(1544537618.399:81346): avc: denied { execute } for pid=45809 comm="mailq" name="postqueue" dev="dm-0" ino=68449872 scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:object_r:postfix_postqueue_exec_t:s0 tclass=file permissive=1<br />
type=AVC msg=audit(1544537618.399:81346): avc: denied { read open } for pid=45809 comm="mailq" path="/usr/sbin/postqueue" dev="dm-0" ino=68449872 scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:object_r:postfix_postqueue_exec_t:s0 tclass=file permissive=1<br />
type=AVC msg=audit(1544537618.399:81346): avc: denied { execute_no_trans } for pid=45809 comm="mailq" path="/usr/sbin/postqueue" dev="dm-0" ino=68449872 scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:object_r:postfix_postqueue_exec_t:s0 tclass=file permissive=1<br />
type=AVC msg=audit(1544537714.982:81407): avc: denied { connectto } for pid=46208 comm="postqueue" path="/var/spool/postfix/public/showq" scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:system_r:postfix_master_t:s0 tclass=unix_stream_socket permissive=1<br />
type=AVC msg=audit(1544537852.367:81494): avc: denied { write } for pid=47190 comm="sudo" name="log" dev="devtmpfs" ino=311 scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:object_r:devlog_t:s0 tclass=sock_file permissive=1<br />
type=AVC msg=audit(1544537852.392:81498): avc: denied { read } for pid=47192 comm="mailq" name="main.cf" dev="dm-0" ino=2770958 scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=unconfined_u:object_r:postfix_etc_t:s0 tclass=file permissive=1<br />
type=AVC msg=audit(1544537852.392:81498): avc: denied { open } for pid=47192 comm="mailq" path="/etc/postfix/main.cf" dev="dm-0" ino=2770958 scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=unconfined_u:object_r:postfix_etc_t:s0 tclass=file permissive=1<br />
type=AVC msg=audit(1544537852.392:81499): avc: denied { getattr } for pid=47192 comm="mailq" path="/etc/postfix/main.cf" dev="dm-0" ino=2770958 scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=unconfined_u:object_r:postfix_etc_t:s0 tclass=file permissive=1<br />
type=AVC msg=audit(1544537852.392:81500): avc: denied { create } for pid=47192 comm="mailq" scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:system_r:nagios_system_plugin_t:s0 tclass=tcp_socket permissive=1<br />
type=AVC msg=audit(1544537852.400:81501): avc: denied { write } for pid=47192 comm="postqueue" name="showq" dev="dm-0" ino=34367853 scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:object_r:postfix_public_t:s0 tclass=sock_file permissive=1<br />
type=AVC msg=audit(1544537852.408:81502): avc: denied { connectto } for pid=47190 comm="sudo" path="/run/dbus/system_bus_socket" scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tclass=unix_stream_socket permissive=1<br />
type=USER_AVC msg=audit(1544539909.518:82692): pid=5323 uid=81 auid=4294967295 ses=4294967295 subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc: denied { send_msg } for msgtype=method_return dest=:1.8166 spid=5333 tpid=55270 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:system_r:nagios_system_plugin_t:s0 tclass=dbus exe="/usr/bin/dbus-daemon" sauid=81 hostname=? addr=? terminal=?'<br />
type=AVC msg=audit(1544539919.990:82694): avc: denied { write } for pid=55236 comm="sudo" scontext=system_u:system_r:nagios_system_plugin_t:s0 tcontext=system_u:system_r:nagios_system_plugin_t:s0 tclass=key permissive=1<br />
<br />
# Opinion<br />
<br />
The package is EPEL maintained and should run out of the box without any issues.
↧
0015684: Error syncing pod
namespace: ember-csi<br />
<br />
Today, I run into the following error: "Error syncing pod" which broke the pipeline.
↧
0015715: process hang on shrink_inactive_list when reach the memory limit of cgroup
we found that some filebeat process stop working wtih the stack:<br />
[<ffffffff810f5126>] futex_wait_queue_me+0xc6/0x130<br />
[<ffffffff810f5deb>] futex_wait+0x17b/0x280<br />
[<ffffffff810f7b26>] do_futex+0x106/0x5a0<br />
[<ffffffff810f8040>] SyS_futex+0x80/0x180<br />
[<ffffffff816b4fc9>] system_call_fastpath+0x16/0x1b<br />
[<ffffffffffffffff>] 0xffffffffffffffff<br />
<br />
and if you kill , it will become <defunct> state.<br />
<br />
in the dmesg, there is some info:<br />
Jan 15 14:30:57 kernel: INFO: task filebeat:34257 blocked for more than 120 seconds.<br />
Jan 15 14:30:57 kernel: "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.<br />
Jan 15 14:30:57 kernel: INFO: task filebeat:34257 blocked for more than 120 seconds.<br />
Jan 15 14:30:57 kernel: "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.<br />
Jan 15 14:30:57 kernel: filebeat D ffffffff816a75f0 0 34257 30603 0x00000080<br />
Jan 15 14:30:57 kernel: filebeat D ffffffff816a75f0 0 34257 30603 0x00000080<br />
Jan 15 14:30:57 kernel: ffff882b012aafe0 0000000000000086 ffff883b93e4eeb0 ffff882b012abfd8<br />
Jan 15 14:30:57 kernel: ffff882b012aafe0 0000000000000086 ffff883b93e4eeb0 ffff882b012abfd8<br />
Jan 15 14:30:57 kernel: ffff882b012abfd8 ffff882b012abfd8 ffff883b93e4eeb0 ffff881fbfc16cc0<br />
Jan 15 14:30:57 kernel: ffff882b012abfd8 ffff882b012abfd8 ffff883b93e4eeb0 ffff881fbfc16cc0<br />
Jan 15 14:30:57 kernel: 0000000000000000 7fffffffffffffff ffff88203ff958e8 ffffffff816a75f0<br />
Jan 15 14:30:57 kernel: Call Trace:<br />
Jan 15 14:30:57 kernel: 0000000000000000 7fffffffffffffff ffff88203ff958e8 ffffffff816a75f0<br />
Jan 15 14:30:57 kernel: Call Trace:<br />
Jan 15 14:30:57 kernel: [<ffffffff816a75f0>] ? bit_wait+0x50/0x50<br />
Jan 15 14:30:57 kernel: [<ffffffff816a75f0>] ? bit_wait+0x50/0x50<br />
Jan 15 14:30:57 kernel: [<ffffffff816a94c9>] schedule+0x29/0x70<br />
Jan 15 14:30:57 kernel: [<ffffffff816a94c9>] schedule+0x29/0x70<br />
Jan 15 14:30:57 kernel: [<ffffffff816a6fd9>] schedule_timeout+0x239/0x2c0<br />
Jan 15 14:30:57 kernel: [<ffffffff816a6fd9>] schedule_timeout+0x239/0x2c0<br />
Jan 15 14:30:57 kernel: [<ffffffff811de581>] ? __slab_free+0x81/0x2f0<br />
Jan 15 14:30:57 kernel: [<ffffffff811de581>] ? __slab_free+0x81/0x2f0<br />
Jan 15 14:30:57 kernel: [<ffffffff81062efe>] ? kvm_clock_get_cycles+0x1e/0x20<br />
Jan 15 14:30:57 kernel: [<ffffffff81062efe>] ? kvm_clock_get_cycles+0x1e/0x20<br />
Jan 15 14:30:57 kernel: [<ffffffff810e939c>] ? ktime_get_ts64+0x4c/0xf0<br />
Jan 15 14:30:57 kernel: [<ffffffff810e939c>] ? ktime_get_ts64+0x4c/0xf0<br />
Jan 15 14:30:57 kernel: [<ffffffff816a75f0>] ? bit_wait+0x50/0x50<br />
Jan 15 14:30:57 kernel: [<ffffffff816a75f0>] ? bit_wait+0x50/0x50<br />
Jan 15 14:30:57 kernel: [<ffffffff816a8b4d>] io_schedule_timeout+0xad/0x130<br />
Jan 15 14:30:57 kernel: [<ffffffff816a8b4d>] io_schedule_timeout+0xad/0x130<br />
Jan 15 14:30:57 kernel: [<ffffffff816a8be8>] io_schedule+0x18/0x20<br />
Jan 15 14:30:57 kernel: [<ffffffff816a8be8>] io_schedule+0x18/0x20<br />
Jan 15 14:30:57 kernel: [<ffffffff816a7601>] bit_wait_io+0x11/0x50<br />
Jan 15 14:30:57 kernel: [<ffffffff816a7601>] bit_wait_io+0x11/0x50<br />
Jan 15 14:30:57 kernel: [<ffffffff816a7125>] __wait_on_bit+0x65/0x90<br />
Jan 15 14:30:57 kernel: [<ffffffff816a7125>] __wait_on_bit+0x65/0x90<br />
Jan 15 14:30:57 kernel: [<ffffffff812361f2>] ? free_buffer_head+0x22/0x50<br />
Jan 15 14:30:57 kernel: [<ffffffff812361f2>] ? free_buffer_head+0x22/0x50<br />
Jan 15 14:30:57 kernel: [<ffffffff81181cb1>] wait_on_page_bit+0x81/0xa0<br />
Jan 15 14:30:57 kernel: [<ffffffff81181cb1>] wait_on_page_bit+0x81/0xa0<br />
Jan 15 14:30:57 kernel: [<ffffffff810b19d0>] ? wake_bit_function+0x40/0x40<br />
Jan 15 14:30:57 kernel: [<ffffffff810b19d0>] ? wake_bit_function+0x40/0x40<br />
Jan 15 14:30:57 kernel: [<ffffffff811965c2>] shrink_page_list+0x842/0xad0<br />
Jan 15 14:30:57 kernel: [<ffffffff811965c2>] shrink_page_list+0x842/0xad0<br />
Jan 15 14:30:57 kernel: [<ffffffff81196e7a>] shrink_inactive_list+0x1ca/0x5d0<br />
Jan 15 14:30:57 kernel: [<ffffffff81196e7a>] shrink_inactive_list+0x1ca/0x5d0<br />
Jan 15 14:30:57 kernel: [<ffffffff81197975>] shrink_lruvec+0x385/0x730<br />
Jan 15 14:30:57 kernel: [<ffffffff81197975>] shrink_lruvec+0x385/0x730<br />
Jan 15 14:30:57 kernel: [<ffffffffc0280400>] ? kmem_zone_alloc+0x60/0x130 [xfs]<br />
Jan 15 14:30:57 kernel: [<ffffffffc0280400>] ? kmem_zone_alloc+0x60/0x130 [xfs]<br />
Jan 15 14:30:57 kernel: [<ffffffff81197d96>] shrink_zone+0x76/0x1a0<br />
Jan 15 14:30:57 kernel: [<ffffffff81197d96>] shrink_zone+0x76/0x1a0<br />
Jan 15 14:30:57 kernel: [<ffffffff811982a0>] do_try_to_free_pages+0xf0/0x4e0<br />
Jan 15 14:30:57 kernel: [<ffffffff811982a0>] do_try_to_free_pages+0xf0/0x4e0<br />
Jan 15 14:30:57 kernel: [<ffffffff8133d9dd>] ? list_del+0xd/0x30<br />
Jan 15 14:30:57 kernel: [<ffffffff8133d9dd>] ? list_del+0xd/0x30<br />
Jan 15 14:30:57 kernel: [<ffffffff811988ea>] try_to_free_mem_cgroup_pages+0xda/0x170<br />
Jan 15 14:30:57 kernel: [<ffffffff811988ea>] try_to_free_mem_cgroup_pages+0xda/0x170<br />
Jan 15 14:30:57 kernel: [<ffffffff811f386e>] mem_cgroup_reclaim+0x4e/0x120<br />
Jan 15 14:30:57 kernel: [<ffffffff811f386e>] mem_cgroup_reclaim+0x4e/0x120<br />
Jan 15 14:30:57 kernel: [<ffffffff811f3e2c>] __mem_cgroup_try_charge+0x4ec/0x670<br />
Jan 15 14:30:57 kernel: [<ffffffff811f3e2c>] __mem_cgroup_try_charge+0x4ec/0x670<br />
Jan 15 14:30:57 kernel: [<ffffffff811f6126>] __memcg_kmem_newpage_charge+0xf6/0x180<br />
Jan 15 14:30:57 kernel: [<ffffffff811f6126>] __memcg_kmem_newpage_charge+0xf6/0x180<br />
Jan 15 14:30:57 kernel: [<ffffffff8118cbad>] __alloc_pages_nodemask+0x22d/0x420<br />
Jan 15 14:30:57 kernel: [<ffffffff811d1108>] ? alloc_pages_current+0x98/0x110<br />
Jan 15 14:30:57 kernel: [<ffffffff8118cbad>] __alloc_pages_nodemask+0x22d/0x420<br />
Jan 15 14:30:57 kernel: [<ffffffff811d1108>] ? alloc_pages_current+0x98/0x110<br />
Jan 15 14:30:57 kernel: [<ffffffff811d1108>] alloc_pages_current+0x98/0x110<br />
Jan 15 14:30:57 kernel: [<ffffffff811d1108>] alloc_pages_current+0x98/0x110<br />
Jan 15 14:30:57 kernel: [<ffffffff811dbe7c>] new_slab+0x2fc/0x310<br />
Jan 15 14:30:57 kernel: [<ffffffff811dd70c>] ___slab_alloc+0x3ac/0x4f0<br />
Jan 15 14:30:57 kernel: [<ffffffff811dbe7c>] new_slab+0x2fc/0x310<br />
Jan 15 14:30:57 kernel: [<ffffffff811dd70c>] ___slab_alloc+0x3ac/0x4f0<br />
Jan 15 14:30:57 kernel: [<ffffffffc0280437>] ? kmem_zone_alloc+0x97/0x130 [xfs]<br />
Jan 15 14:30:57 kernel: [<ffffffff811df6a3>] ? kmem_cache_alloc+0x193/0x1e0<br />
Jan 15 14:30:57 kernel: [<ffffffffc0280437>] ? kmem_zone_alloc+0x97/0x130 [xfs]<br />
Jan 15 14:30:57 kernel: [<ffffffff811df6a3>] ? kmem_cache_alloc+0x193/0x1e0<br />
Jan 15 14:30:57 kernel: [<ffffffff81185455>] ? mempool_alloc_slab+0x15/0x20<br />
Jan 15 14:30:57 kernel: [<ffffffff81185455>] ? mempool_alloc_slab+0x15/0x20<br />
Jan 15 14:30:57 kernel: [<ffffffffc0280437>] ? kmem_zone_alloc+0x97/0x130 [xfs]<br />
Jan 15 14:30:57 kernel: [<ffffffffc0280437>] ? kmem_zone_alloc+0x97/0x130 [xfs]<br />
Jan 15 14:30:57 kernel: [<ffffffff816a10ce>] __slab_alloc+0x40/0x5c<br />
Jan 15 14:30:57 kernel: [<ffffffff816a10ce>] __slab_alloc+0x40/0x5c<br />
Jan 15 14:30:57 kernel: [<ffffffff811df6a3>] kmem_cache_alloc+0x193/0x1e0<br />
Jan 15 14:30:57 kernel: [<ffffffff811df6a3>] kmem_cache_alloc+0x193/0x1e0<br />
Jan 15 14:30:57 kernel: [<ffffffffc0280437>] ? kmem_zone_alloc+0x97/0x130 [xfs]<br />
Jan 15 14:30:57 kernel: [<ffffffffc0280437>] ? kmem_zone_alloc+0x97/0x130 [xfs]<br />
Jan 15 14:30:57 kernel: [<ffffffffc0280437>] kmem_zone_alloc+0x97/0x130 [xfs]<br />
Jan 15 14:30:57 kernel: [<ffffffffc0280437>] kmem_zone_alloc+0x97/0x130 [xfs]<br />
Jan 15 14:30:57 kernel: [<ffffffffc027f99d>] xfs_trans_alloc+0x6d/0x140 [xfs]<br />
Jan 15 14:30:57 kernel: [<ffffffffc02593de>] xfs_setfilesize_trans_alloc.isra.14+0x3e/0x90 [xfs]<br />
Jan 15 14:30:57 kernel: [<ffffffffc027f99d>] xfs_trans_alloc+0x6d/0x140 [xfs]<br />
Jan 15 14:30:57 kernel: [<ffffffffc02593de>] xfs_setfilesize_trans_alloc.isra.14+0x3e/0x90 [xfs]<br />
Jan 15 14:30:57 kernel: [<ffffffffc0259638>] xfs_submit_ioend.isra.16+0xb8/0xe0 [xfs]<br />
Jan 15 14:30:57 kernel: [<ffffffffc0259638>] xfs_submit_ioend.isra.16+0xb8/0xe0 [xfs]<br />
Jan 15 14:30:57 kernel: [<ffffffffc0259e44>] xfs_do_writepage+0x4c4/0x530 [xfs]<br />
Jan 15 14:30:57 kernel: [<ffffffffc0259e44>] xfs_do_writepage+0x4c4/0x530 [xfs]<br />
Jan 15 14:30:57 kernel: [<ffffffff8118dc91>] write_cache_pages+0x251/0x4d0<br />
Jan 15 14:30:57 kernel: [<ffffffff8118dc91>] write_cache_pages+0x251/0x4d0<br />
Jan 15 14:30:57 kernel: [<ffffffffc0259980>] ? xfs_aops_discard_page+0x150/0x150 [xfs]<br />
Jan 15 14:30:57 kernel: [<ffffffffc0259980>] ? xfs_aops_discard_page+0x150/0x150 [xfs]<br />
Jan 15 14:30:57 kernel: [<ffffffffc025978d>] xfs_vm_writepages+0xbd/0xe0 [xfs]<br />
Jan 15 14:30:57 kernel: [<ffffffff8118effe>] do_writepages+0x1e/0x40<br />
Jan 15 14:30:57 kernel: [<ffffffffc025978d>] xfs_vm_writepages+0xbd/0xe0 [xfs]<br />
Jan 15 14:30:57 kernel: [<ffffffff8118effe>] do_writepages+0x1e/0x40<br />
Jan 15 14:30:57 kernel: [<ffffffff81183c55>] __filemap_fdatawrite_range+0x65/0x80<br />
Jan 15 14:30:57 kernel: [<ffffffff81183c55>] __filemap_fdatawrite_range+0x65/0x80<br />
Jan 15 14:30:57 kernel: [<ffffffff81183da1>] filemap_write_and_wait_range+0x41/0x90<br />
Jan 15 14:30:57 kernel: [<ffffffff81183da1>] filemap_write_and_wait_range+0x41/0x90<br />
Jan 15 14:30:57 kernel: [<ffffffffc0264b16>] xfs_file_fsync+0x66/0x1e0 [xfs]<br />
Jan 15 14:30:57 kernel: [<ffffffff8123331d>] generic_write_sync+0x4d/0x60<br />
Jan 15 14:30:57 kernel: [<ffffffffc0264b16>] xfs_file_fsync+0x66/0x1e0 [xfs]<br />
Jan 15 14:30:57 kernel: [<ffffffff8123331d>] generic_write_sync+0x4d/0x60<br />
Jan 15 14:30:57 kernel: [<ffffffffc0266d55>] xfs_file_aio_write+0x155/0x1b0 [xfs]<br />
Jan 15 14:30:57 kernel: [<ffffffffc0266d55>] xfs_file_aio_write+0x155/0x1b0 [xfs]<br />
Jan 15 14:30:57 kernel: [<ffffffff8120026d>] do_sync_write+0x8d/0xd0<br />
Jan 15 14:30:57 kernel: [<ffffffff8120026d>] do_sync_write+0x8d/0xd0<br />
Jan 15 14:30:57 kernel: [<ffffffff81200d2d>] vfs_write+0xbd/0x1e0<br />
Jan 15 14:30:57 kernel: [<ffffffff81200d2d>] vfs_write+0xbd/0x1e0<br />
Jan 15 14:30:57 kernel: [<ffffffff81201b3f>] SyS_write+0x7f/0xe0<br />
Jan 15 14:30:57 kernel: [<ffffffff81201b3f>] SyS_write+0x7f/0xe0<br />
Jan 15 14:30:57 kernel: [<ffffffff816b4fc9>] system_call_fastpath+0x16/0x1b<br />
Jan 15 14:30:57 kernel: [<ffffffff816b4fc9>] system_call_fastpath+0x16/0x1b<br />
<br />
the filebeat running inside a docker with 2G memory limit, and from our monitoring system, we found that when this happened, the memory usage of docker around 1.95G.<br />
<br />
the filebeat is under a heavy load with 5000 log files opened for collecting, and use lots of filesystem cache, and if you execute sync, it will became D state with stack :<br />
<br />
[<ffffffff81181cb1>] wait_on_page_bit+0x81/0xa0<br />
[<ffffffff81181de1>] __filemap_fdatawait_range+0x111/0x190<br />
[<ffffffff81184bd7>] filemap_fdatawait_keep_errors+0x27/0x30<br />
[<ffffffff8122dd1d>] sync_inodes_sb+0x16d/0x1f0<br />
[<ffffffff81233349>] sync_inodes_one_sb+0x19/0x20<br />
[<ffffffff81204ea1>] iterate_supers+0xc1/0x120<br />
[<ffffffff81233614>] sys_sync+0x44/0xb0<br />
[<ffffffff816b4fc9>] system_call_fastpath+0x16/0x1b<br />
[<ffffffffffffffff>] 0xffffffffffffffff
↧
0015570: CentOS 7.6.1810 running on a VirtualBox guest with a GUI has a mouse problem
The mouse problem was first reported for RHEL 7.6 in the following virtualbox forum post:<br />
<br />
<a href="https://forums.virtualbox.org/viewtopic.php?f=3&t=90267">https://forums.virtualbox.org/viewtopic.php?f=3&t=90267</a><br />
"Mouse only usable within single application after mouse click on RHEL 7.6"<br />
<br />
and later in the RHEL discussion session:<br />
<br />
<a href="https://access.redhat.com/discussions/3714911">https://access.redhat.com/discussions/3714911</a><br />
"Mouse only usable within single application after mouse click on RHEL 7.6 as a VirtualBox guest"<br />
<br />
Turns out the issue is related to the kernel version. Only the 7.6 kernels (3.10.0-957.x.el7) seem to be affected. With earlier versions or newer kernels (tested with ELRepo's kernel-lt and kernel-ml), mouse works fine.
↧
↧
0015716: [abrt] kernel: WARNING: CPU: 0 PID: 4981 at drivers/net/wireless/intel/iwlwifi/pcie/trans.c:2088 iwl_trans_pcie_wait_txq_empt...
Version-Release number of selected component:<br />
kernel<br />
<br />
Truncated backtrace:<br />
WARNING: CPU: 0 PID: 4981 at drivers/net/wireless/intel/iwlwifi/pcie/trans.c:2088 iwl_trans_pcie_wait_txq_empty+0x12f/0x140 [iwlwifi]<br />
WR pointer moved while flushing 25 -> 26<br />
Modules linked in: rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver nfs lockd grace fscache rfcomm cmac nf_conntrack_netbios_ns nf_conntrack_broadcast drbg ansi_cprng ccm ip6t_rpfilter ipt_REJECT nf_reject_ipv4 ip6t_REJECT nf_reject_ipv6 xt_conntrack ip_set nfnetlink ebtable_nat ebtable_broute bridge stp llc ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle ip6table_security ip6table_raw iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack iptable_mangle iptable_security iptable_raw ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter bnep sunrpc vfat fat arc4 iwldvm mac80211 mxm_wmi iTCO_wdt iTCO_vendor_support iwlwifi intel_powerclamp coretemp intel_rapl kvm_intel kvm btusb btrtl btbcm irqbypass btintel crc32_pclmul cfg80211<br />
snd_hda_codec_hdmi ghash_clmulni_intel bluetooth aesni_intel lrw gf128mul glue_helper ablk_helper cryptd joydev sparse_keymap uvcvideo i2c_i801 rfkill videobuf2_vmalloc sg videobuf2_memops videobuf2_core pcspkr videodev snd_hda_codec_idt snd_hda_codec_generic mei_me snd_hda_intel ite_cir snd_hda_codec mei rc_core snd_hda_core toshiba_bluetooth ie31200_edac snd_hwdep snd_seq snd_seq_device snd_pcm snd_timer snd wmi lpc_ich soundcore binfmt_misc ip_tables xfs libcrc32c sr_mod cdrom sd_mod crc_t10dif crct10dif_generic uas usb_storage i915 crct10dif_pclmul crct10dif_common crc32c_intel serio_raw i2c_algo_bit iosf_mbi drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ahci drm libahci video libata alx mdio drm_panel_orientation_quirks dm_mirror dm_region_hash dm_log dm_mod<br />
CPU: 0 PID: 4981 Comm: wpa_supplicant Not tainted 3.10.0-957.1.3.el7.x86_64 #1<br />
Hardware name: TOSHIBA SATELLITE P50-A-11J/VG10S, BIOS 1.90 09/19/2014<br />
Call Trace:<br />
[<ffffffff8db61e41>] dump_stack+0x19/0x1b<br />
[<ffffffff8d497648>] __warn+0xd8/0x100<br />
[<ffffffff8d4976cf>] warn_slowpath_fmt+0x5f/0x80<br />
[<ffffffff8db66eb3>] ? schedule_hrtimeout_range+0x13/0x20<br />
[<ffffffffc0d5e0df>] iwl_trans_pcie_wait_txq_empty+0x12f/0x140 [iwlwifi]<br />
[<ffffffffc0d5e15b>] iwl_trans_pcie_wait_txqs_empty+0x6b/0xa0 [iwlwifi]<br />
[<ffffffffc0d874d2>] iwlagn_mac_flush+0x82/0x130 [iwldvm]<br />
[<ffffffffc0c9c7bb>] __ieee80211_flush_queues+0xbb/0x1c0 [mac80211]<br />
[<ffffffffc0c9c8d3>] ieee80211_flush_queues+0x13/0x20 [mac80211]<br />
[<ffffffffc0cbd718>] ieee80211_set_disassoc+0x428/0x550 [mac80211]<br />
[<ffffffffc0cc19bc>] ieee80211_mgd_deauth+0x13c/0x250 [mac80211]<br />
[<ffffffffc0c83e28>] ieee80211_deauth+0x18/0x20 [mac80211]<br />
[<ffffffffc0a89b0d>] cfg80211_mlme_deauth+0xbd/0x200 [cfg80211]<br />
[<ffffffffc0a6a393>] nl80211_deauthenticate+0xe3/0x140 [cfg80211]<br />
[<ffffffff8da77918>] genl_family_rcv_msg+0x208/0x430<br />
[<ffffffff8da23a54>] ? consume_skb+0x34/0x90<br />
[<ffffffff8db66612>] ? mutex_lock_interruptible+0x12/0x3c<br />
[<ffffffff8da77b9b>] genl_rcv_msg+0x5b/0xc0<br />
[<ffffffff8da73ec0>] ? __netlink_lookup+0xc0/0x110<br />
[<ffffffff8da77b40>] ? genl_family_rcv_msg+0x430/0x430<br />
[<ffffffff8da75bab>] netlink_rcv_skb+0xab/0xc0<br />
[<ffffffff8da760e8>] genl_rcv+0x28/0x40<br />
[<ffffffff8da75530>] netlink_unicast+0x170/0x210<br />
[<ffffffff8da758d8>] netlink_sendmsg+0x308/0x420<br />
[<ffffffff8da193a6>] sock_sendmsg+0xb6/0xf0<br />
[<ffffffff8da194f5>] ? sock_recvmsg+0xc5/0x100<br />
[<ffffffff8d656fe0>] ? __pollwait+0xf0/0xf0<br />
[<ffffffff8da1a269>] ___sys_sendmsg+0x3e9/0x400<br />
[<ffffffff8d4ac4ab>] ? recalc_sigpending+0x1b/0x70<br />
[<ffffffff8d4ace21>] ? __set_task_blocked+0x41/0xa0<br />
[<ffffffff8d4af852>] ? __set_current_blocked+0x42/0x70<br />
[<ffffffff8d63e2aa>] ? __check_object_size+0x1ca/0x250<br />
[<ffffffff8d437d5c>] ? __restore_xstate_sig+0xac/0x630<br />
[<ffffffff8da1b921>] __sys_sendmsg+0x51/0x90<br />
[<ffffffff8da1b972>] SyS_sendmsg+0x12/0x20<br />
[<ffffffff8db74ddb>] system_call_fastpath+0x22/0x27
↧
0015717: Grub2 relocator module bug loading Xen under UEFI
On HP DL360g9 using EEFI<br />
Using multiboot2 and module2 to boot xen-410 with kernel 4.9.127-32.el7.x86_64<br />
<br />
grub displays "Loading initial ramdisk ..." then hangs.<br />
debugging grub outputs this just before the hang:<br />
mmap/efi/mmap.c:66: EFI memory region 0x7b7ff000-0x7b800000: 4<br />
mmap/efi/mmap.c:66: EFI memory region 0x100000000-0x480000000: 7<br />
mmap/efi/mmap.c:66: EFI memory region 0x80000000-0x90000000: 11<br />
video/efi_gop.c:390: GOP: keeping mode 2<br />
video/efi_gop.c:498: GOP: initialising FB @ 0x91000000 1024x768x32<br />
video/efi_gop.c:523: GOP: Success<br />
lib/relocator.c:1387: chunks = 0x3eb93040<br />
lib/relocator.c:434: trying to allocate in 0x1000-0x99f10 aligned 0x10 size<br />
0xf0<br />
lib/relocator.c:1188: allocated: 0x6000+0xf0<br />
lib/relocator.c:1399: allocated 0x6000/0x6000<br />
lib/relocator.c:1400: chunks = 0x3eb93040<br />
lib/relocator.c:1523: Preparing relocs (size=12)<br />
lib/relocator.c:434: trying to allocate in 0x0-0xfffffffffffffff4 aligned 0x1<br />
size 0xc<br />
lib/relocator.c:1188: allocated: 0x7000+0xc<br />
lib/relocator.c:1535: Relocs allocated at 0x7000<br />
lib/relocator.c:1550: chunk 0x6000->0x6000, 0xf0<br />
lib/relocator.c:1550: chunk 0x1000->0x1000, 0x4862<br />
lib/relocator.c:1550: chunk 0xcaa000->0xcaa000, 0x14aca65<br />
lib/relocator.c:1550: chunk 0x579000->0x579000, 0x730720<br />
lib/relocator.c:1550: chunk 0x0->0x0, 0x18<br />
lib/relocator.c:1550: chunk 0x200000->0x200000, 0x379000<br />
lib/relocator.c:1594: sorted chunk 0x0->0x0, 0x18<br />
lib/relocator.c:1594: sorted chunk 0x1000->0x1000, 0x4862<br />
lib/relocator.c:1594: sorted chunk 0x6000->0x6000, 0xf0<br />
lib/relocator.c:1594: sorted chunk 0x200000->0x200000, 0x379000<br />
lib/relocator.c:1594: sorted chunk 0x579000->0x579000, 0x730720<br />
lib/relocator.c:1594: sorted chunk 0xcaa000->0xcaa000, 0x14aca65
↧
0006828: Tracking for centosplus kernels for CentOS-7
Build and maintain centosplus kernels for EL7.
↧
0015526: autofs stop working after upgrade to CentOS 7.6.1810
This morning yum-cron updated CentOS to 7.6.1810 and autofs stopped working. It's been working for at least one year before.<br />
<br />
When starting "/usr/sbin/automount -d -v --foreground --dont-check-daemon" I get the output shown in attached file "automount.txt". <br />
<br />
Dmesg shows:<br />
automount[25212]: segfault at 7fa6c8516320 ip 00007fa6c99926d0 sp 00007fa6c8dd63e8 error 4 in libcrypto.so.1.0.2k[7fa6c986b000+234000]<br />
<br />
Abrt message: see attached abort.txt<br />
<br />
The relevant Ldap entries are:<br />
<br />
ou=automount,ou=auto.master,BASEDN<br />
objectClass = automountMap<br />
(children)<br />
-- cn=/-<br />
automountInformation = auto.shares<br />
objectClass = automount<br />
<br />
ou=auto.shares,ou=automount,BASEDN<br />
objectClass = automountMap<br />
(children)<br />
-- cn = /data<br />
objectClass = automount<br />
automountInformation = -nfsvers=3 serverX:/export/data
↧
↧
0015586: Unable to create new files or folders using samba and vfs_glusterfs
Samba 4.8.3 using vfs_gluster prevents users on Windows clients from creating new files. See samba bug for full details:<br />
<br />
<a href="https://bugzilla.samba.org/show_bug.cgi?id=13585">https://bugzilla.samba.org/show_bug.cgi?id=13585</a><br />
<br />
This affects a combination of samba 4.8.3 and glusterfs 4.1.6<br />
<br />
Also files a RHEL bug at:<br />
<br />
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=1659533">https://bugzilla.redhat.com/show_bug.cgi?id=1659533</a>
↧
0015718: AuthorizedKeysCommand is ignored by sshd
Config:<br />
----------<br />
<br />
AuthorizedKeysCommand /etc/ssh/cat_keys_d.sh %u<br />
AuthorizedKeysCommandRunAs %u<br />
<br />
The script: <br />
----------------<br />
<br />
#!/bin/sh<br />
for i in `ls "/home/${1}/.ssh/authorized_keys.d/"`<br />
do<br />
cat "/home/${1}/.ssh/authorized_keys.d/$i"<br />
done<br />
<br />
Debug (sshd -ddd):<br />
-----------------------------<br />
<br />
debug3: /etc/ssh/sshd_config:53 setting AuthorizedKeysCommand /etc/ssh/cat_keys_d.sh %u<br />
debug3: /etc/ssh/sshd_config:54 setting AuthorizedKeysCommandRunAs %u<br />
...<br />
debug1: userauth-request for user web service ssh-connection method publickey<br />
debug1: attempt 1 failures 0<br />
debug2: input_userauth_request: try method publickey<br />
debug1: test whether pkalg/pkblob are acceptable<br />
debug3: mm_key_allowed entering<br />
debug3: mm_request_send entering: type 21<br />
debug3: mm_key_allowed: waiting for MONITOR_ANS_KEYALLOWED<br />
debug3: mm_request_receive_expect entering: type 22<br />
debug3: mm_request_receive entering<br />
debug3: monitor_read: checking request 21<br />
debug3: mm_answer_keyallowed entering<br />
debug3: mm_answer_keyallowed: key_from_blob: 0x56542d414560<br />
user_key_via_command_allowed2: getpwnam("%u"): Success<br />
debug1: temporarily_use_uid: 100/101 (e=0/0)<br />
debug1: trying public key file /home/web/.ssh/authorized_keys<br />
debug1: Could not open authorized keys '/home/web/.ssh/authorized_keys': No such file or directory<br />
debug1: restore_uid: 0/0<br />
debug1: temporarily_use_uid: 100/101 (e=0/0)<br />
debug1: trying public key file /home/web/.ssh/authorized_keys2<br />
debug1: Could not open authorized keys '/home/web/.ssh/authorized_keys2': No such file or directory<br />
debug1: restore_uid: 0/0<br />
Failed publickey for web from 144.92.167.190 port 53874 ssh2<br />
debug3: mm_answer_keyallowed: key 0x56542d414560 is not allowed<br />
debug3: mm_request_send entering: type 22<br />
debug3: mm_request_receive entering<br />
debug2: userauth_pubkey: authenticated 0 pkalg ssh-rsa<br />
debug3: Wrote 72 bytes for a total of 2429<br />
debug1: userauth-request for user web service ssh-connection method publickey<br />
debug1: attempt 2 failures 1<br />
debug2: input_userauth_request: try method publickey<br />
debug1: test whether pkalg/pkblob are acceptable<br />
debug3: mm_key_allowed entering<br />
debug3: mm_request_send entering: type 21<br />
debug3: mm_key_allowed: waiting for MONITOR_ANS_KEYALLOWED<br />
debug3: mm_request_receive_expect entering: type 22<br />
debug3: mm_request_receive entering<br />
debug3: monitor_read: checking request 21<br />
debug3: mm_answer_keyallowed entering<br />
debug3: mm_answer_keyallowed: key_from_blob: 0x56542d414680<br />
user_key_via_command_allowed2: getpwnam("%u"): Success<br />
debug1: temporarily_use_uid: 100/101 (e=0/0)<br />
debug1: trying public key file /home/web/.ssh/authorized_keys<br />
debug1: Could not open authorized keys '/home/web/.ssh/authorized_keys': No such file or directory<br />
debug1: restore_uid: 0/0<br />
debug1: temporarily_use_uid: 100/101 (e=0/0)<br />
debug1: trying public key file /home/web/.ssh/authorized_keys2<br />
debug1: Could not open authorized keys '/home/web/.ssh/authorized_keys2': No such file or directory<br />
debug1: restore_uid: 0/0<br />
Failed publickey for web from 144.92.167.190 port 53874 ssh2<br />
<br />
I.e. the settings are accepted at startup and seem to be cvompletely ignored on connection attempts.
↧
0015533: [abrt] xorg-x11-server-Xorg: Xorg server crashed
Description of problem:<br />
Happened a few hours after the upgrade to CentOS 7.6 (1810).<br />
During the time of the crash there was no human interaction with the system and nobody was logged in (neither to console nor system).<br />
System and framebuffer are virtual, running on VMware ESXi 6.5U2.<br />
<br />
Version-Release number of selected component:<br />
xorg-x11-server-Xorg-1.20.1-5.1.el7<br />
<br />
Truncated backtrace:<br />
0: /usr/bin/X (xorg_backtrace+0x55) [0x564667b44185]<br />
1: /usr/bin/X (0x564667993000+0x1b4e09) [0x564667b47e09]<br />
2: /lib64/libpthread.so.0 (0x7fb5cc56f000+0xf5d0) [0x7fb5cc57e5d0]<br />
3: /usr/bin/X (RROutputIsLeased+0x9e) [0x564667aabcfe]<br />
4: /usr/bin/X (xf86DPMSSet+0x10d) [0x564667a5d74d]<br />
5: /usr/lib64/xorg/modules/drivers/vmware_drv.so (0x7fb5c875e000+0x10ab7) [0x7fb5c876eab7]<br />
6: /usr/lib64/xorg/modules/drivers/vmware_drv.so (0x7fb5c875e000+0xe5b3) [0x7fb5c876c5b3]<br />
7: /usr/bin/X (0x564667993000+0xc88dc) [0x564667a5b8dc]<br />
8: /usr/bin/X (0x564667993000+0xe7bf8) [0x564667a7abf8]<br />
9: /usr/bin/X (0x564667993000+0x132d53) [0x564667ac5d53]<br />
10: /usr/bin/X (0x564667993000+0x604c4) [0x5646679f34c4]<br />
11: /lib64/libc.so.6 (__libc_start_main+0xf5) [0x7fb5cc1c43d5]<br />
12: /usr/bin/X (0x564667993000+0x4a4ce) [0x5646679dd4ce]
↧