Description of problem:<br />
Was connected to internet using wired connection. While wired connection was still active, turned wifi on. After wifi had connected to network, physically disconnected wired ethernet connection. <br />
<br />
Version-Release number of selected component:<br />
kernel<br />
<br />
Truncated backtrace:<br />
WARNING: CPU: 2 PID: 38 at drivers/net/wireless/realtek/rtlwifi/rtl8723be/fw.c:227 rtl8723be_fill_h2c_cmd+0x426/0x440 [rtl8723be]<br />
rtl8723be: error H2C cmd because of Fw download fail!!!<br />
Modules linked in: ip6t_rpfilter ipt_REJECT nf_reject_ipv4 ip6t_REJECT nf_reject_ipv6 xt_conntrack ip_set nfnetlink ebtable_nat ebtable_broute bridge stp llc ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle ip6table_security ip6table_raw iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack iptable_mangle iptable_security iptable_raw ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter bnep vfat fat snd_soc_skl snd_soc_skl_ipc snd_soc_sst_ipc snd_soc_sst_dsp snd_hda_ext_core snd_hda_codec_hdmi snd_soc_sst_match arc4 snd_hda_codec_realtek snd_hda_codec_generic rtl8723be snd_soc_core btcoexist snd_compress intel_powerclamp snd_hda_intel snd_hda_codec rtl8723_common snd_hda_core rtl_pci rtlwifi coretemp snd_hwdep snd_seq snd_seq_device<br />
snd_pcm iTCO_wdt iTCO_vendor_support snd_timer snd hp_wmi soundcore uvcvideo btusb mac80211 btrtl intel_rapl btbcm cfg80211 btintel bluetooth videobuf2_vmalloc videobuf2_memops videobuf2_core kvm videodev rfkill irqbypass mei_me mei sg i2c_i801 pcspkr joydev shpchp pinctrl_sunrisepoint pinctrl_intel int3400_thermal tpm_crb wmi acpi_pad intel_vbtn intel_hid hp_wireless sparse_keymap nfsd auth_rpcgss nfs_acl lockd grace sunrpc ip_tables xfs libcrc32c dm_crypt drbg ansi_cprng uas usb_storage hid_multitouch sr_mod sd_mod cdrom crc_t10dif crct10dif_generic i915 iosf_mbi crct10dif_pclmul crct10dif_common i2c_algo_bit crc32_pclmul drm_kms_helper crc32c_intel ghash_clmulni_intel syscopyarea sysfillrect sysimgblt fb_sys_fops ahci drm libahci libata aesni_intel glue_helper lrw gf128mul ablk_helper<br />
r8169 cryptd serio_raw mii i2c_hid video i2c_core dm_mirror dm_region_hash dm_log dm_mod<br />
CPU: 2 PID: 38 Comm: kworker/2:1 Not tainted 3.10.0-862.el7.x86_64 #1<br />
Hardware name: HP HP Notebook/81ED, BIOS F.17 09/08/2016<br />
Workqueue: rtl8723be_pci rtl_c2hcmd_wq_callback [rtlwifi]<br />
Call Trace:<br />
[<ffffffffb7f0d768>] dump_stack+0x19/0x1b<br />
[<ffffffffb78916d8>] __warn+0xd8/0x100<br />
[<ffffffffb789175f>] warn_slowpath_fmt+0x5f/0x80<br />
[<ffffffffc0b0d4f6>] rtl8723be_fill_h2c_cmd+0x426/0x440 [rtl8723be]<br />
[<ffffffffc0aa557c>] halbtc_set_bt_reg+0xdc/0xf0 [btcoexist]<br />
[<ffffffffc0a99a03>] ex_btc8723b1ant_bt_info_notify+0x643/0x6c0 [btcoexist]<br />
[<ffffffffc0aa67a4>] exhalbtc_bt_info_notify+0x94/0xc0 [btcoexist]<br />
[<ffffffffc0aa7108>] rtl_btc_btinfo_notify+0x18/0x20 [btcoexist]<br />
[<ffffffffc0b0e05e>] rtl8723be_c2h_content_parsing+0xbe/0xd0 [rtl8723be]<br />
[<ffffffffc0a3bb3e>] rtl_c2hcmd_launcher+0xbe/0xe0 [rtlwifi]<br />
[<ffffffffc0a3bbea>] rtl_c2hcmd_wq_callback+0x1a/0x20 [rtlwifi]<br />
[<ffffffffb78b2dff>] process_one_work+0x17f/0x440<br />
[<ffffffffb78b3ac6>] worker_thread+0x126/0x3c0<br />
[<ffffffffb78b39a0>] ? manage_workers.isra.24+0x2a0/0x2a0<br />
[<ffffffffb78bae31>] kthread+0xd1/0xe0<br />
[<ffffffffb78bad60>] ? insert_kthread_work+0x40/0x40<br />
[<ffffffffb7f1f637>] ret_from_fork_nospec_begin+0x21/0x21<br />
[<ffffffffb78bad60>] ? insert_kthread_work+0x40/0x40
↧
0014788: [abrt] kernel: WARNING: CPU: 2 PID: 38 at drivers/net/wireless/realtek/rtlwifi/rtl8723be/fw.c:227 rtl8723be_fill_h2c_cmd+0x42...
↧
0016235: Datadir / mysql homedir permissions do not follow secure deployment guidelines
By default the datadir for installs of mariadb-server (or mysql-server for centos6) is set to /var/lib/mysql. It has '755' set as the permissions for this directory. This is contrary to the MySQL secure deployment guide <a href="https://dev.mysql.com/doc/mysql-secure-deployment-guide/8.0/en/secure-deployment-permissions.html">https://dev.mysql.com/doc/mysql-secure-deployment-guide/8.0/en/secure-deployment-permissions.html</a> which states the data directory should not have world read/execute permissions.
↧
↧
0015740: kernel memory leak when performing xenstore operations
The CentOS 6.10 kernels (and RHEL 6.10) all have a memory leak that occurs with every operation on the /proc/xen/xenbus file. These operations can happen whenever CentOS 6.10 is running as a VM on any Xen system (the open source Xen Project and XenServer).
↧
0016236: Frequent clone System-Calls with Apache, Perl and CURL with Threaded Resolver
Installed:<br />
- Apache 2.4.6 (httpd-2.4.6-88.el7.centos)<br />
- Perl module for Apache (mod_perl-2.0.10-3.el7 from EPEL 7)<br />
- CURL (curl and libcurl both 7.29.0-51.el7)<br />
<br />
In this scenario:<br />
- Apache is running in "prefork" MPM mode.<br />
- Certain web-requests are processed by Perl.<br />
- Certain of those result in calls to CURL.<br />
<br />
This combination results in frequent 'clone' system-calls, as observed with 'strace' and GDB. GDB reveals that the primary cloner is libcurl. The CentOS 7 CURL .spec file specifies the '--enable-threaded-resolver' option for 'configure'. Rebuilding libcurl with --enable-ares instead of --enable-threaded-resolver eliminates the frequent 'clone' system-calls, but doing so means diverging from the CentOS 7 packages for curl and libcurl.<br />
<br />
Is this a supported scenario? Are frequent 'clone' system-calls by libcurl in a multi-process (as opposed to a multi-threaded) server to be expected?<br />
<br />
(In this particular scenario, the libcurl invocations are expected to block the processing of the web-request, so starting up one or more threads for DNS resolution and then tearing those threads down seems pretty needless; no useful work is happening on behalf of the web-request until the DNS resolution and the curl-result have been completed.)
↧
0015315: AWS Centos 6 AMI: Enable use with new "T3 & M5" instance family
Hi All, Please could the Centos6 AWS AMI be updated to enable use on new T3 and M5 family of instances?<br />
<br />
<a href="https://aws.amazon.com/marketplace/pp/B00NQAYLWO?qid=1537806368807&sr=0-2&ref_=srh_res_product_title">https://aws.amazon.com/marketplace/pp/B00NQAYLWO?qid=1537806368807&sr=0-2&ref_=srh_res_product_title</a><br />
<br />
T3: <a href="https://aws.amazon.com/blogs/aws/new-t3-instances-burstable-cost-effective-performance/">https://aws.amazon.com/blogs/aws/new-t3-instances-burstable-cost-effective-performance/</a><br />
<br />
... I don't mean Centos OS software support as such, just whomever admins the AMI, to tick the box for "T3 & M5". To enable launching a "T3& M5" machine using the AMI ;-)<br />
<br />
thank you <br />
<br />
Frank
↧
↧
0016237: yum doesn't see latest thunderbird update
yum doesn't see the updated thunderbird for centos6 announced yesterday:<br />
<a href="https://lists.centos.org/pipermail/centos-announce/2019-July/023347.html">https://lists.centos.org/pipermail/centos-announce/2019-July/023347.html</a><br />
.. possibly because the repodata isn't updated properly.
↧
0016238: glibc-2.17-260.el7_6.6 for CENTOS 7.6
Just wondering when are you guys releasing the latest version of glibc-2.17-260.el7 with the following bugfix ? <br />
<br />
Redhat seems to have fixed it already and released 6.6.<br />
<br />
> glibc-2.17-260.el7_6.6.x86_64<br />
<br />
* Fri May 03 2019 Florian Weimer <<a href="mailto:fweimer@redhat.com">fweimer@redhat.com</a>> - 2.17-260.6<br />
- Backport libio vtable validation improvements (#1705899)
↧
0015723: high disk utilization
hi,<br />
<br />
After last kernel upgrade on several cPanel servers using NVMe SSD, we get a common high disk utilization according to iostat output, confirmed also by dstat -cd --disk-util (in case iostat would have a caveat : <a href="https://brooker.co.za/blog/2014/07/04/iostat-pct.html">https://brooker.co.za/blog/2014/07/04/iostat-pct.html</a>)<br />
It affects both disks.<br />
<br />
Issue is from this last kernel<br />
3.10.0-957.1.3.el7.x86_64 #1 SMP Thu Nov 29 14:49:43 UTC 2018 x86_64 x86_64 x86_64 GNU/Linux<br />
<br />
raid1 is fine :<br />
cat /proc/mdstat<br />
Personalities : [raid1]<br />
md3 : active raid1 nvme1n1p3[1] nvme0n1p3[0]<br />
356576192 blocks [2/2] [UU]<br />
bitmap: 3/3 pages [12KB], 65536KB chunk<br />
<br />
md2 : active raid1 nvme1n1p2[1] nvme0n1p2[0]<br />
71678912 blocks [2/2] [UU]<br />
<br />
unused devices: <none><br />
<br />
Initial investigation : <br />
- hardware is in perfect state in all servers, they use NVMe SSD for ages. <br />
- such high level of disk utilization has no justification in term of running processes from any user, or any scripts, no iowait also at all<br />
- what is reported by linux may be wrong, but this lets us a visible symptom that we can't trust, neither ignoring it util we have a realiable explanation.<br />
<br />
we observed that :<br />
- an upgrade centos on a basic server (with mechanic hdd in this case) is not causing this at reboot the following<br />
- an excessive update of file /.readahead, this is not happening on other cpanel server using cloudlinux by ie<br />
(our servers use no hard raid card)<br />
<br />
We tried to disable readahead and reboot in case, but no change at all :<br />
systemctl disable systemd-readahead-collect.service<br />
systemctl disable systemd-readahead-replay.service<br />
<br />
We contacted cPanel support, investigated deeply with 2 sysadmin, it appears that the answer will only come from centos 7 kernel developer<br />
<br />
Thanks for your attention,<br />
John
↧
0015504: SELinux is preventing /usr/bin/totem-video-thumbnailer from using the nnp_transition, nosuid_transition access on a process.
Description of problem:<br />
SELinux is preventing /usr/bin/totem-video-thumbnailer from using the nnp_transition, nosuid_transition access on a process.<br />
<br />
***** Plugin catchall (100. confidence) suggests **************************<br />
<br />
If you believe that totem-video-thumbnailer should be allowed nnp_transition nosuid_transition access on processes labeled thumb_t by default.<br />
Then you should report this as a bug.<br />
You can generate a local policy module to allow this access.<br />
Do<br />
allow this access for now by executing:<br />
# ausearch -c 'totem-video-thu' --raw | audit2allow -M my-totemvideothu<br />
# semodule -i my-totemvideothu.pp<br />
<br />
Additional Information:<br />
Source Context unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1<br />
023<br />
Target Context unconfined_u:unconfined_r:thumb_t:s0-s0:c0.c1023<br />
Target Objects Unknown [ process2 ]<br />
Source totem-video-thu<br />
Source Path /usr/bin/totem-video-thumbnailer<br />
Port <Unknown><br />
Host (removed)<br />
Source RPM Packages evince-3.28.2-5.el7.x86_64<br />
Target RPM Packages <br />
Policy RPM selinux-policy-3.13.1-229.el7_6.5.noarch<br />
Selinux Enabled True<br />
Policy Type targeted<br />
Enforcing Mode Enforcing<br />
Host Name (removed)<br />
Platform Linux (removed) 3.10.0-957.el7.x86_64 #1 SMP Thu<br />
Nov 8 23:39:32 UTC 2018 x86_64 x86_64<br />
Alert Count 7<br />
First Seen 2018-12-01 09:06:42 IST<br />
Last Seen 2018-12-01 09:06:48 IST<br />
Local ID ed1365ce-1934-406e-900a-664da20c8990<br />
<br />
Raw Audit Messages<br />
type=AVC msg=audit(1543635408.473:324): avc: denied { nnp_transition nosuid_transition } for pid=29079 comm="flatpak-bwrap" scontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tcontext=unconfined_u:unconfined_r:thumb_t:s0-s0:c0.c1023 tclass=process2 permissive=0<br />
<br />
<br />
type=SYSCALL msg=audit(1543635408.473:324): arch=x86_64 syscall=execve success=yes exit=0 a0=7ffe2b712f6f a1=7ffe2b7155a0 a2=b9c160 a3=2f736e6f6974616c items=0 ppid=29074 pid=29079 auid=1000 uid=1000 gid=1000 euid=1000 suid=1000 fsuid=1000 egid=1000 sgid=1000 fsgid=1000 tty=(none) ses=1 comm=evince-thumbnai exe=/usr/bin/evince-thumbnailer subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 key=(null)<br />
<br />
Hash: totem-video-thu,unconfined_t,thumb_t,process2,nnp_transition,nosuid_transition<br />
<br />
Version-Release number of selected component:<br />
selinux-policy-3.13.1-229.el7_6.5.noarch
↧
↧
0016239: XFS (sdk1): Corruption detected. Unmount and run xfs_repair
We've had 3 xfs corruption detected events. We have 128TB filesystems (16 of them), and have lost files (we have backups). We've seen this on older RHEL based distributions (Scientific Linux 6 - 2.6.32 kernel) but hoped new deployments on Centos7 with 3.10 kernel would remove these problems. <br />
<br />
[<a href="mailto:bgolliher@system1">bgolliher@system1</a> ~]$ xfs_info /dev/sdk1<br />
meta-data=/dev/sdk1 isize=512 agcount=128, agsize=268435440 blks<br />
= sectsz=4096 attr=2, projid32bit=1<br />
= crc=1 finobt=0 spinodes=0<br />
data = bsize=4096 blocks=34179644928, imaxpct=1<br />
= sunit=16 swidth=160 blks<br />
naming =version 2 bsize=8192 ascii-ci=0 ftype=1<br />
log =internal bsize=4096 blocks=521728, version=2<br />
= sectsz=4096 sunit=1 blks, lazy-count=1<br />
realtime =none extsz=4096 blocks=0, rtextents=0<br />
[<a href="mailto:bgolliher@system1">bgolliher@system1</a> ~]$ uname -a<br />
Linux system1.box.net 3.10.0-957.10.1.el7.x86_64 #1 SMP Mon Mar 18 15:06:45 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux<br />
[<a href="mailto:bgolliher@system1">bgolliher@system1</a> ~]$ xfs_info -V<br />
xfs_info version 4.5.0<br />
[<a href="mailto:bgolliher@system1">bgolliher@system1</a> ~]$<br />
<br />
We have more then 250 systems with xfs filesystems ranging from 25TB to 128TB. The new systems running CentOS7 are all 128TB filesystems.<br />
Those 128TB filesystems are laid over a raid volume presented by a AVAGO MegaRAID SAS 9380-8e (LSI Logic / Symbios Logic MegaRAID SAS-3 3108 [Invader] from lspci -nn). We're using Driver Name = megaraid_sas Driver Version = 07.709.08.00, and the cards themselves are on Firmware Package Build = 24.21.0-0091 and Firmware Version = 4.680.00-8446. There are two cards, each has a WDC Jbod attached so 204 drives across both jbods. Each raid set is Raid6 across 14 disks. Each disk is 14TB, WUH721414AL. The system is purpose built for density.<br />
<br />
-----------------------------------------------------------------------------<br />
DG Arr Row EID:Slot DID Type State BT Size PDC PI SED DS3 FSpace TR<br />
-----------------------------------------------------------------------------<br />
0 - - - - RAID6 Optl N 127.329 TB dflt N N dflt N N<br />
0 0 - - - RAID6 Optl N 127.329 TB dflt N N dflt N N<br />
0 0 0 8:0 50 DRIVE Onln N 12.732 TB dflt N N dflt - N<br />
0 0 1 8:1 46 DRIVE Onln N 12.732 TB dflt N N dflt - N<br />
0 0 2 8:2 49 DRIVE Onln N 12.732 TB dflt N N dflt - N<br />
0 0 3 8:3 53 DRIVE Onln N 12.732 TB dflt N N dflt - N<br />
0 0 4 8:4 80 DRIVE Onln N 12.732 TB dflt N N dflt - N<br />
0 0 5 8:5 65 DRIVE Onln N 12.732 TB dflt N N dflt - N<br />
0 0 6 8:6 66 DRIVE Onln N 12.732 TB dflt N N dflt - N<br />
0 0 7 8:7 67 DRIVE Onln N 12.732 TB dflt N N dflt - N<br />
0 0 8 8:8 61 DRIVE Onln N 12.732 TB dflt N N dflt - N<br />
0 0 9 8:9 58 DRIVE Onln N 12.732 TB dflt N N dflt - N<br />
0 0 10 8:10 69 DRIVE Onln N 12.732 TB dflt N N dflt - N<br />
0 0 11 8:11 76 DRIVE Onln N 12.732 TB dflt N N dflt - N<br />
<br />
We know how to recover, and have had to recover a handful of files from backup. We are looking for ways to prevent this from happening.
↧
0016240: setjmp&longjmp run unexcepetedly
my program test4.cpp is as follow:<br />
<br />
#include <setjmp.h><br />
#include <iostream><br />
<br />
using namespace std;<br />
<br />
jmp_buf g_jmp;<br />
<br />
<br />
int a()<br />
{<br />
cout<<"a"<<endl;<br />
if(setjmp(g_jmp)==0)<br />
{<br />
cout<<"setjmp called!"<<endl;<br />
}<br />
else<br />
{<br />
cout<<"longjmp called!"<<endl;<br />
return 2;<br />
}<br />
cout<<"a end."<<endl;<br />
return 1;<br />
<br />
}<br />
<br />
void b()<br />
{<br />
longjmp(g_jmp,-1);<br />
}<br />
<br />
int c()<br />
{<br />
cout<<"c"<<endl;<br />
b();<br />
cout<<"retrun from b"<<endl;<br />
return 0;<br />
}<br />
<br />
int d()<br />
{<br />
cout<<"d"<<endl;<br />
int text=c();<br />
cout<<"return from c"<<endl;<br />
return 0;<br />
}<br />
<br />
<br />
<br />
int main()<br />
{<br />
a();<br />
cout<<"a-b"<<endl;<br />
int i=d();<br />
cout<<i<<endl;<br />
}<br />
<br />
i use gcc4.8.5 to compile the program : g++ -g test4.cpp<br />
<br />
and i executed the ./a.out, the result is just like this:<br />
<br />
<a href="mailto:pengwei@BoardServer2">pengwei@BoardServer2</a>:~/test$ ./a.out<br />
a<br />
setjmp called!<br />
a end.<br />
a-b<br />
d<br />
c<br />
longjmp called!<br />
2<br />
d<br />
c<br />
longjmp called!<br />
d<br />
c<br />
longjmp called!<br />
.......<br />
<br />
it's an endless cycle, but the same program i run in x86 server, the result is normal as follow:<br />
<br />
<a href="mailto:pengwei@BoardServer2">pengwei@BoardServer2</a>:~/test$ ./a.out<br />
a<br />
setjmp called!<br />
a end.<br />
a-b<br />
d<br />
c<br />
longjmp called!<br />
2<br />
<br />
Please help to resolve the problem, tks.
↧
0013969: Anaconda ignores "--nohome" flag to autopart
According to documentation of both CentOS and RHEL 7.4, there is a new flag for autopart in kickstart, which is "--nohome", and this is meant for people who don't want a separate /home partition.<br />
The CentOS 7.4 installer ignores this option, and creates the /home mountpoint and partition/volume anyway. This is both with and without the also optional "--nolvm" flag.<br />
If one instead installs RHEL 7.4, using the exact same kickstart script, with --nohome option enabled, it does not create the /home mountpoint and partition/volume.
↧
0016241: kernel-headers-2.6.32-754.17.1.el6.x86_64.rpm 404 yum bug
kernel-headers-2.6.32-754.17.1.el6.x86_64.rpm 404导致yum不可用<br />
Dependencies Resolved<br />
<br />
=====================================================================================================================================================================================<br />
Package Arch Version Repository Size<br />
=====================================================================================================================================================================================<br />
Installing:<br />
automake noarch 1.11.1-4.el6 base 550 k<br />
gcc x86_64 4.4.7-23.el6 base 10 M<br />
gcc-c++ x86_64 4.4.7-23.el6 base 4.7 M<br />
Installing for dependencies:<br />
autoconf noarch 2.63-5.1.el6 base 781 k<br />
cloog-ppl x86_64 0.15.7-1.2.el6 base 93 k<br />
cpp x86_64 4.4.7-23.el6 base 3.7 M<br />
glibc-devel x86_64 2.12-1.212.el6_10.3 updates 991 k<br />
glibc-headers x86_64 2.12-1.212.el6_10.3 updates 620 k<br />
kernel-headers x86_64 2.6.32-754.17.1.el6 updates 4.6 M<br />
libgomp x86_64 4.4.7-23.el6 base 135 k<br />
libstdc++-devel x86_64 4.4.7-23.el6 base 1.6 M<br />
m4 x86_64 1.4.13-5.el6 base 278 k<br />
mpfr x86_64 2.4.1-6.el6 base 157 k<br />
ppl x86_64 0.10.2-11.el6 base 1.3 M<br />
<br />
Transaction Summary<br />
=====================================================================================================================================================================================<br />
Install 14 Package(s)<br />
<br />
Total size: 30 M<br />
Total download size: 4.6 M<br />
Installed size: 64 M<br />
Downloading Packages:<br />
<a href="http://mirrors.aliyun.com/centos/6/updates/x86_64/Packages/kernel-headers-2.6.32-754.17.1.el6.x86_64.rpm:">http://mirrors.aliyun.com/centos/6/updates/x86_64/Packages/kernel-headers-2.6.32-754.17.1.el6.x86_64.rpm:</a> [Errno 14] PYCURL ERROR 22 - "The requested URL returned error: 404 Not Found"<br />
Trying other mirror.<br />
To address this issue please refer to the below wiki article<br />
<br />
<a href="https://wiki.centos.org/yum-errors">https://wiki.centos.org/yum-errors</a><br />
<br />
If above article doesn't help to resolve this issue please use <a href="https://bugs.centos.org/">https://bugs.centos.org/.</a><br />
<br />
<br />
<br />
Error Downloading Packages:<br />
kernel-headers-2.6.32-754.17.1.el6.x86_64: failure: Packages/kernel-headers-2.6.32-754.17.1.el6.x86_64.rpm from updates: [Errno 256] No more mirrors to try.
↧
↧
0016242: SMB/CIFS server connection stalls accessing files using kernel-3.10.0-957.21.3.el7
When accessing files on a SMB share on a CentOS server running kernel 3.10.0-957.21.3.el7 the connection appears to stall. The client will hang and eventually log something along the line of:<br />
<br />
kernel: CIFS VFS: Server *** has not responded in 120 seconds. Reconnecting...<br />
kernel: CIFS VFS: Send error in read = -11<br />
<br />
- The issue does not occur when the server is running an older kernel, including kernel-3.10.0-957.21.2.el7.x86_64. <br />
- Reliably triggered by reading several files (e.g. `grep "something" * -R` or `git status`) <br />
- Listing files does not appear to trigger the issue<br />
- Tested with fully patched CentOS 7 and Ubuntu 18.04 as clients
↧
0013740: [abrt] libgnomekbd: get_preferred_height_for_width(): gkbd-keyboard-display killed by SIGSEGV
Version-Release number of selected component:<br />
libgnomekbd-3.22.0.1-1.el7<br />
<br />
Truncated backtrace:<br />
Thread no. 1 (10 frames)<br />
#0 get_preferred_height_for_width at /lib64/libgnomekbdui.so.8<br />
#1 gtk_widget_query_size_for_orientation at /lib64/libgtk-3.so.0<br />
#2 gtk_widget_compute_size_for_orientation at /lib64/libgtk-3.so.0<br />
#3 gtk_widget_get_preferred_height_for_width at /lib64/libgtk-3.so.0<br />
#4 gtk_box_get_content_size at /lib64/libgtk-3.so.0<br />
#5 gtk_css_custom_gadget_get_preferred_size at /lib64/libgtk-3.so.0<br />
#6 gtk_css_gadget_get_preferred_size at /lib64/libgtk-3.so.0<br />
#7 gtk_box_get_preferred_height_and_baseline_for_width at /lib64/libgtk-3.so.0<br />
#8 gtk_widget_query_size_for_orientation at /lib64/libgtk-3.so.0<br />
#9 gtk_widget_compute_size_for_orientation at /lib64/libgtk-3.so.0
↧
0014540: [abrt] createrepo: genpkgmetadata.py:293:main:OSError: [Errno 13] Permission denied: '/var/lib/yum/plugins/local/.repodata/pr...
Version-Release number of selected component:<br />
createrepo-0.9.9-28.el7<br />
<br />
Truncated backtrace:<br />
genpkgmetadata.py:293:main:OSError: [Errno 13] Permission denied: '/var/lib/yum/plugins/local/.repodata/primary.xml.gz'<br />
<br />
Traceback (most recent call last):<br />
File "/usr/share/createrepo/genpkgmetadata.py", line 309, in <module><br />
main(sys.argv[1:])<br />
File "/usr/share/createrepo/genpkgmetadata.py", line 293, in main<br />
os.unlink(os.path.join(tmp, name))<br />
OSError: [Errno 13] Permission denied: '/var/lib/yum/plugins/local/.repodata/primary.xml.gz'<br />
<br />
Local variables in innermost frame:<br />
tmp: '/var/lib/yum/plugins/local/.repodata'<br />
conf: <createrepo.MetaDataConfig object at 0x133a210><br />
mdgen: None<br />
errormsg: MDError()<br />
args: ['--quiet', '--database', '--update', '--unique-md-filenames', '/var/lib/yum/plugins/local']<br />
start_st: 1519742203.122192<br />
mid_st: 1519742203.129707<br />
name: 'primary.xml.gz'
↧
0016243: SELinux is preventing clamdscan from 'append' accesses on the file /usr/local/maldetect/logs/clamscan_log.
Description of problem:<br />
maldet uses clamscan/clamdscan to scan for malware. It can write / append to clamscan log file /usr/local/maldetect/logs/clamscan_log. This should be allowed or softlink should take to /var/log/clamd.scan as the log used for all clamav scans. Maldetect directories selinux setting need adjusting to allow.<br />
SELinux is preventing clamdscan from 'append' accesses on the file /usr/local/maldetect/logs/clamscan_log.<br />
<br />
***** Plugin catchall_labels (83.8 confidence) suggests *******************<br />
<br />
If you want to allow clamdscan to have append access on the clamscan_log file<br />
Then you need to change the label on /usr/local/maldetect/logs/clamscan_log<br />
Do<br />
# semanage fcontext -a -t FILE_TYPE '/usr/local/maldetect/logs/clamscan_log'<br />
where FILE_TYPE is one of the following: NetworkManager_log_t, NetworkManager_tmp_t, abrt_tmp_t, abrt_upload_watch_tmp_t, abrt_var_cache_t, abrt_var_log_t, acct_data_t, admin_crontab_tmp_t, afs_logfile_t, aide_log_t, alsa_tmp_t, amanda_log_t, amanda_tmp_t, antivirus_db_t, antivirus_home_t, antivirus_log_t, antivirus_tmp_t, antivirus_var_run_t, apcupsd_log_t, apcupsd_tmp_t, apmd_log_t, apmd_tmp_t, arpwatch_tmp_t, asterisk_log_t, asterisk_tmp_t, auditadm_sudo_tmp_t, auth_cache_t, automount_tmp_t, awstats_tmp_t, bacula_log_t, bacula_tmp_t, bitlbee_log_t, bitlbee_tmp_t, bluetooth_helper_tmp_t, bluetooth_helper_tmpfs_t, bluetooth_tmp_t, boinc_log_t, boinc_project_tmp_t, boinc_tmp_t, bootloader_tmp_t, brltty_log_t, bugzilla_tmp_t, calamaris_log_t, callweaver_log_t, canna_log_t, cardmgr_dev_t, ccs_tmp_t, ccs_var_lib_t, ccs_var_log_t, cdcc_tmp_t, certmaster_var_log_t, cfengine_log_t, cgred_log_t, checkpc_log_t, chrome_sandbox_tmp_t, chronyd_tmp_t, chronyd_var_log_t, cinder_api_tmp_t, cinder_backup_tmp_t, cinder_log_t, cinder_scheduler_tmp_t, cinder_volume_tmp_t, cloud_init_tmp_t, cloud_log_t, cluster_tmp_t, cluster_var_log_t, cobbler_tmp_t, cobbler_var_log_t, cockpit_tmp_t, collectd_script_tmp_t, colord_tmp_t, comsat_tmp_t, condor_log_t, condor_master_tmp_t, condor_schedd_tmp_t, condor_startd_tmp_t, conman_log_t, conman_tmp_t, consolekit_log_t, container_log_t, container_runtime_tmp_t, couchdb_log_t, couchdb_tmp_t, crack_tmp_t, cron_log_t, crond_tmp_t, crontab_tmp_t, ctdbd_log_t, ctdbd_tmp_t, cups_pdf_tmp_t, cupsd_log_t, cupsd_lpd_tmp_t, cupsd_tmp_t, cvs_tmp_t, cyphesis_log_t, cyphesis_tmp_t, cyrus_tmp_t, dbadm_sudo_tmp_t, dbskkd_tmp_t, dcc_client_tmp_t, dcc_dbclean_tmp_t, dccd_tmp_t, dccifd_tmp_t, dccm_tmp_t, ddclient_log_t, ddclient_tmp_t, deltacloudd_log_t, deltacloudd_tmp_t, denyhosts_var_log_t, devicekit_tmp_t, devicekit_var_log_t, dhcpc_tmp_t, dhcpd_tmp_t, dirsrv_snmp_var_log_t, dirsrv_tmp_t, dirsrv_var_log_t, dirsrvadmin_tmp_t, disk_munin_plugin_tmp_t, dkim_milter_tmp_t, dlm_controld_var_log_t, dnsmasq_tmp_t, dnsmasq_var_log_t, dnssec_trigger_tmp_t, dovecot_auth_tmp_t, dovecot_deliver_tmp_t, dovecot_tmp_t, dovecot_var_log_t, drbd_tmp_t, dspam_log_t, evtchnd_var_log_t, exim_log_t, exim_tmp_t, fail2ban_log_t, fail2ban_tmp_t, faillog_t, fenced_tmp_t, fenced_var_log_t, fetchmail_log_t, fingerd_log_t, firewalld_tmp_t, firewalld_var_log_t, firewallgui_tmp_t, foghorn_var_log_t, fsadm_log_t, fsadm_tmp_t, fsdaemon_tmp_t, ftpd_tmp_t, ftpdctl_tmp_t, games_tmp_t, games_tmpfs_t, ganesha_tmp_t, ganesha_var_log_t, gconf_tmp_t, geoclue_tmp_t, getty_log_t, getty_tmp_t, gfs_controld_var_log_t, git_script_tmp_t, gkeyringd_tmp_t, glance_log_t, glance_registry_tmp_t, glance_tmp_t, glusterd_log_t, glusterd_tmp_t, gpg_agent_tmp_t, gpg_pinentry_tmp_t, gpg_pinentry_tmpfs_t, gpm_tmp_t, groupd_var_log_t, gssd_tmp_t, haproxy_var_log_t, hsqldb_tmp_t, httpd_log_t, httpd_php_tmp_t, httpd_suexec_tmp_t, httpd_tmp_t, icecast_log_t, inetd_child_tmp_t, inetd_log_t, inetd_tmp_t, init_tmp_t, initrc_tmp_t, initrc_var_log_t, innd_log_t, ipa_log_t, ipa_tmp_t, ipsec_log_t, ipsec_tmp_t, iptables_tmp_t, iscsi_log_t, iscsi_tmp_t, iwhd_log_t, jetty_log_t, jockey_var_log_t, kadmind_log_t, kadmind_tmp_t, kdumpctl_tmp_t, kdumpgui_tmp_t, keystone_log_t, keystone_tmp_t, kismet_log_t, kismet_tmp_t, kismet_tmpfs_t, klogd_tmp_t, krb5_host_rcache_t, krb5kdc_log_t, krb5kdc_tmp_t, ksmtuned_log_t, ktalkd_log_t, ktalkd_tmp_t, l2tpd_tmp_t, lastlog_t, ldconfig_tmp_t, livecd_tmp_t, logrotate_mail_tmp_t, logrotate_tmp_t, logwatch_mail_tmp_t, logwatch_tmp_t, lpd_tmp_t, lpr_tmp_t, lsassd_tmp_t, lsmd_plugin_tmp_t, lvm_tmp_t, mail_munin_plugin_tmp_t, mailman_cgi_tmp_t, mailman_log_t, mailman_mail_tmp_t, mailman_queue_tmp_t, mcelog_log_t, mdadm_log_t, mdadm_tmp_t, mediawiki_tmp_t, minidlna_log_t, mirrormanager_log_t, mock_tmp_t, mojomojo_tmp_t, mongod_log_t, mongod_tmp_t, motion_log_t, mount_tmp_t, mozilla_plugin_tmp_t, mozilla_plugin_tmpfs_t, mozilla_tmp_t, mozilla_tmpfs_t, mpd_log_t, mpd_tmp_t, mplayer_tmpfs_t, mrtg_log_t, mscan_tmp_t, munin_log_t, munin_script_tmp_t, munin_tmp_t, mysqld_log_t, mysqld_tmp_t, mythtv_var_log_t, nagios_eventhandler_plugin_tmp_t, nagios_log_t, nagios_openshift_plugin_tmp_t, nagios_system_plugin_tmp_t, nagios_tmp_t, named_log_t, named_tmp_t, netutils_tmp_t, neutron_log_t, neutron_tmp_t, nova_log_t, nova_tmp_t, nscd_log_t, nsd_log_t, nsd_tmp_t, ntop_tmp_t, ntpd_log_t, ntpd_tmp_t, numad_var_log_t, nut_upsd_tmp_t, nut_upsdrvctl_tmp_t, nut_upsmon_tmp_t, nx_server_tmp_t, opendnssec_tmp_t, openhpid_log_t, openshift_cgroup_read_tmp_t, openshift_cron_tmp_t, openshift_initrc_tmp_t, openshift_log_t, openshift_tmp_t, opensm_log_t, openvpn_status_t, openvpn_tmp_t, openvpn_var_log_t, openvswitch_log_t, openvswitch_tmp_t, openwsman_log_t, openwsman_tmp_t, oracleasm_tmp_t, osad_log_t, pam_timestamp_tmp_t, passenger_log_t, passenger_tmp_t, pcp_log_t, pcp_tmp_t, pegasus_openlmi_storage_tmp_t, pegasus_tmp_t, pesign_tmp_t, piranha_log_t, piranha_web_tmp_t, pkcs_slotd_log_t, pkcs_slotd_tmp_t, pki_log_t, pki_ra_log_t, pki_tomcat_log_t, pki_tomcat_tmp_t, pki_tps_log_t, plymouthd_var_log_t, podsleuth_tmp_t, podsleuth_tmpfs_t, policykit_tmp_t, polipo_log_t, portmap_tmp_t, postfix_bounce_tmp_t, postfix_cleanup_tmp_t, postfix_local_tmp_t, postfix_map_tmp_t, postfix_pickup_tmp_t, postfix_pipe_tmp_t, postfix_qmgr_tmp_t, postfix_smtp_tmp_t, postfix_smtpd_tmp_t, postfix_virtual_tmp_t, postgresql_log_t, postgresql_tmp_t, pppd_log_t, pppd_tmp_t, pptp_log_t, prelink_log_t, prelink_tmp_t, prelude_lml_tmp_t, prelude_log_t, privoxy_log_t, procmail_log_t, procmail_tmp_t, prosody_log_t, prosody_tmp_t, psad_tmp_t, psad_var_log_t, pulseaudio_tmpfs_t, puppet_log_t, puppet_tmp_t, puppetmaster_tmp_t, pyicqt_log_t, qdiskd_var_log_t, qpidd_tmp_t, rabbitmq_tmp_t, rabbitmq_var_log_t, racoon_tmp_t, radiusd_log_t, realmd_tmp_t, redis_log_t, rhev_agentd_log_t, rhev_agentd_tmp_t, rhsmcertd_log_t, rhsmcertd_tmp_t, ricci_modcluster_var_log_t, ricci_tmp_t, ricci_var_log_t, rkhunter_var_lib_t, rlogind_tmp_t, rpcbind_tmp_t, rpm_log_t, rpm_script_tmp_t, rpm_tmp_t, rsync_log_t, rsync_tmp_t, rtas_errd_log_t, rtas_errd_tmp_t, samba_log_t, samba_net_tmp_t, sanlock_log_t, sbd_tmpfs_t, sblim_tmp_t, secadm_sudo_tmp_t, sectool_tmp_t, sectool_var_log_t, selinux_munin_plugin_tmp_t, semanage_tmp_t, sendmail_log_t, sendmail_tmp_t, sensord_log_t, services_munin_plugin_tmp_t, session_dbusd_tmp_t, setroubleshoot_var_log_t, sge_tmp_t, shorewall_log_t, shorewall_tmp_t, slapd_log_t, slapd_tmp_t, slpd_log_t, smbd_tmp_t, smoltclient_tmp_t, smsd_log_t, smsd_tmp_t, snapperd_log_t, snmpd_log_t, snmpd_var_lib_t, snort_log_t, snort_tmp_t, sosreport_tmp_t, soundd_tmp_t, spamc_tmp_t, spamd_log_t, spamd_tmp_t, speech-dispatcher_log_t, speech-dispatcher_tmp_t, squid_log_t, squid_tmp_t, squirrelmail_spool_t, ssh_agent_tmp_t, ssh_keygen_tmp_t, ssh_tmpfs_t, sssd_var_log_t, staff_sudo_tmp_t, stapserver_log_t, stapserver_tmp_t, stunnel_log_t, stunnel_tmp_t, sudo_log_t, svirt_tmp_t, svnserve_log_t, svnserve_tmp_t, swat_tmp_t, swift_tmp_t, sysadm_passwd_tmp_t, sysadm_sudo_tmp_t, syslogd_tmp_t, sysstat_log_t, system_cronjob_tmp_t, system_dbusd_tmp_t, system_mail_tmp_t, system_munin_plugin_tmp_t, systemd_passwd_var_run_t, targetd_tmp_t, tcpd_tmp_t, telepathy_gabble_tmp_t, telepathy_idle_tmp_t, telepathy_logger_tmp_t, telepathy_mission_control_tmp_t, telepathy_msn_tmp_t, telepathy_salut_tmp_t, telepathy_sofiasip_tmp_t, telepathy_stream_engine_tmp_t, telepathy_sunshine_tmp_t, telnetd_tmp_t, tetex_data_t, tgtd_tmp_t, thin_aeolus_configserver_log_t, thin_log_t, thumb_tmp_t, tmp_t, tomcat_log_t, tomcat_tmp_t, tor_var_log_t, tuned_log_t, tuned_tmp_t, tvtime_tmp_t, tvtime_tmpfs_t, udev_tmp_t, ulogd_var_log_t, uml_tmp_t, uml_tmpfs_t, unconfined_munin_plugin_tmp_t, update_modules_tmp_t, user_cron_spool_t, user_fonts_t, user_home_t, user_mail_tmp_t, user_tmp_t, uucpd_log_t, uucpd_tmp_t, var_log_t, var_spool_t, varnishd_tmp_t, varnishlog_log_t, vdagent_log_t, virt_log_t, virt_qemu_ga_log_t, virt_qemu_ga_tmp_t, virt_tmp_t, vmtools_tmp_t, vmware_host_tmp_t, vmware_log_t, vmware_tmp_t, vmware_tmpfs_t, vpnc_tmp_t, w3c_validator_tmp_t, watchdog_log_t, webadm_tmp_t, webalizer_tmp_t, winbind_log_t, wireshark_tmp_t, wireshark_tmpfs_t, wtmp_t, xauth_tmp_t, xdm_log_t, xend_tmp_t, xend_var_log_t, xenstored_tmp_t, xenstored_var_log_t, xferlog_t, xserver_log_t, xserver_tmpfs_t, ypbind_tmp_t, ypserv_tmp_t, zabbix_log_t, zabbix_tmp_t, zarafa_deliver_log_t, zarafa_deliver_tmp_t, zarafa_gateway_log_t, zarafa_ical_log_t, zarafa_indexer_log_t, zarafa_indexer_tmp_t, zarafa_monitor_log_t, zarafa_server_log_t, zarafa_server_tmp_t, zarafa_spooler_log_t, zarafa_var_lib_t, zebra_log_t, zebra_tmp_t, zoneminder_log_t.<br />
Then execute:<br />
restorecon -v '/usr/local/maldetect/logs/clamscan_log'<br />
<br />
<br />
***** Plugin catchall (17.1 confidence) suggests **************************<br />
<br />
If you believe that clamdscan should be allowed append access on the clamscan_log file by default.<br />
Then you should report this as a bug.<br />
You can generate a local policy module to allow this access.<br />
Do<br />
allow this access for now by executing:<br />
# ausearch -c 'clamdscan' --raw | audit2allow -M my-clamdscan<br />
# semodule -i my-clamdscan.pp<br />
<br />
Additional Information:<br />
Source Context system_u:system_r:antivirus_t:s0-s0:c0.c1023<br />
Target Context system_u:object_r:usr_t:s0<br />
Target Objects /usr/local/maldetect/logs/clamscan_log [ file ]<br />
Source clamdscan<br />
Source Path clamdscan<br />
Port <Unknown><br />
Host (removed)<br />
Source RPM Packages <br />
Target RPM Packages <br />
Policy RPM selinux-policy-3.13.1-229.el7_6.12.noarch<br />
Selinux Enabled True<br />
Policy Type targeted<br />
Enforcing Mode Enforcing<br />
Host Name (removed)<br />
Platform Linux (removed) 3.10.0-957.21.2.el7.x86_64 #1 SMP<br />
Wed Jun 5 14:26:44 UTC 2019 x86_64 x86_64<br />
Alert Count 570<br />
First Seen 2019-07-07 03:51:23 AEST<br />
Last Seen 2019-07-07 13:30:16 AEST<br />
Local ID 2535a191-1b7d-4652-aa8c-c73387fa5eb6<br />
<br />
Raw Audit Messages<br />
type=AVC msg=audit(1562470216.936:435523): avc: denied { append } for pid=206660 comm="clamdscan" path="/usr/local/maldetect/logs/clamscan_log" dev="dm-1" ino=137515499 scontext=system_u:system_r:antivirus_t:s0-s0:c0.c1023 tcontext=system_u:object_r:usr_t:s0 tclass=file permissive=0<br />
<br />
<br />
Hash: clamdscan,antivirus_t,usr_t,file,append<br />
<br />
Version-Release number of selected component:<br />
selinux-policy-3.13.1-229.el7_6.12.noarch
↧
↧
0016228: systemd-tmpfiles `x` and `X` no difference
man tmpfiles.d<br />
<br />
> X<br />
> Ignore a path during cleaning. Use this type to exclude paths from clean-up as controlled with the Age parameter.<br />
> Unlike x, this parameter will not exclude the content if path is a directory,<br />
> but only directory itself. Note that lines of this type do not influence the effect of r or R lines.<br />
> Lines of this type accept shell-style globs in place of normal path names.<br />
<br />
But, `x` and` X` no difference, they do same thing.
↧
0016244: [abrt] kernel: WARNING: CPU: 2 PID: 58 at drivers/thunderbolt/switch.c:587 tb_switch_add+0x6f6/0x7c0
Description of problem:<br />
The problem occurred just after having switched on the laptop.<br />
<br />
Version-Release number of selected component:<br />
kernel<br />
<br />
Truncated backtrace:<br />
WARNING: CPU: 2 PID: 58 at drivers/thunderbolt/switch.c:587 tb_switch_add+0x6f6/0x7c0<br />
Device: thunderbolt#0120:2: non switch port without a PHY<br />
Modules linked in: tcp_lp fuse xt_CHECKSUM ipt_MASQUERADE nf_nat_masquerade_ipv4 tun devlink nls_utf8 cifs ccm dns_resolver ip6t_rpfilter ipt_REJECT nf_reject_ipv4 ip6t_REJECT nf_reject_ipv6 xt_conntrack ip_set nfnetlink ebtable_nat ebtable_broute bridge stp llc ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle ip6table_security ip6table_raw iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack iptable_mangle iptable_security iptable_raw ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter bnep sunrpc iTCO_wdt iTCO_vendor_support mei_wdt intel_wmi_thunderbolt arc4 vfat iwlmvm fat intel_pmc_core intel_powerclamp coretemp intel_rapl mac80211 kvm irqbypass crc32_pclmul ghash_clmulni_intel snd_hda_codec_hdmi aesni_intel lrw gf128mul<br />
glue_helper ablk_helper snd_hda_codec_conexant cryptd snd_hda_codec_generic snd_soc_skl snd_soc_skl_ipc snd_hda_ext_core snd_soc_sst_dsp snd_soc_sst_ipc iwlwifi snd_soc_acpi snd_soc_core snd_compress snd_hda_intel snd_hda_codec pcspkr snd_hda_core snd_hwdep snd_seq snd_seq_device btusb btrtl btbcm btintel snd_pcm bluetooth cfg80211 rtsx_pci_ms i2c_i801 uvcvideo snd_timer memstick videobuf2_vmalloc videobuf2_memops videobuf2_core joydev videodev mei_me mei hid_sensor_accel_3d hid_sensor_magn_3d hid_sensor_gyro_3d hid_sensor_rotation hid_sensor_als hid_sensor_trigger hid_sensor_iio_common industrialio_triggered_buffer idma64 virt_dma i2c_designware_platform i2c_designware_core thinkpad_acpi snd soundcore rfkill pinctrl_sunrisepoint pinctrl_intel wmi tpm_crb acpi_pad sch_fq_codel ip_tables<br />
xfs libcrc32c rtsx_pci_sdmmc mmc_core hid_wacom hid_sensor_custom i915 crct10dif_pclmul crct10dif_common crc32c_intel serio_raw nvme e1000e nvme_core rtsx_pci ptp pps_core i2c_algo_bit iosf_mbi drm_kms_helper syscopyarea i2c_hid sysfillrect video sysimgblt fb_sys_fops drm hid_sensor_hub drm_panel_orientation_quirks dm_mirror dm_region_hash dm_log dm_mod<br />
CPU: 2 PID: 58 Comm: kworker/u16:1 Kdump: loaded Not tainted 3.10.0-957.5.1.el7.x86_64 #1<br />
Hardware name: LENOVO 20JHCTO1WW/20JHCTO1WW, BIOS R0HET39W (1.19 ) 09/29/2017<br />
Workqueue: kacpi_hotplug acpi_hotplug_work_fn<br />
Call Trace:<br />
[<ffffffffab361e41>] dump_stack+0x19/0x1b<br />
[<ffffffffaac97688>] __warn+0xd8/0x100<br />
[<ffffffffaac9770f>] warn_slowpath_fmt+0x5f/0x80<br />
[<ffffffffab202e06>] tb_switch_add+0x6f6/0x7c0<br />
[<ffffffffab202379>] ? tb_switch_alloc+0x409/0x560<br />
[<ffffffffab208e76>] icm_start+0x56/0xb0<br />
[<ffffffffab206867>] tb_domain_add+0xc7/0x110<br />
[<ffffffffab1fc634>] nhi_probe+0x174/0x320<br />
[<ffffffffaafc514a>] local_pci_probe+0x4a/0xb0<br />
[<ffffffffaafc6889>] pci_device_probe+0x109/0x160<br />
[<ffffffffab0a8905>] driver_probe_device+0xc5/0x3e0<br />
[<ffffffffab0a8c20>] ? driver_probe_device+0x3e0/0x3e0<br />
[<ffffffffab0a8c63>] __device_attach+0x43/0x50<br />
[<ffffffffab0a6585>] bus_for_each_drv+0x75/0xc0<br />
[<ffffffffab0a8740>] device_attach+0x90/0xb0<br />
[<ffffffffaafba4ef>] pci_bus_add_device+0x4f/0xa0<br />
[<ffffffffaafba579>] pci_bus_add_devices+0x39/0x80<br />
[<ffffffffaafba5a7>] pci_bus_add_devices+0x67/0x80<br />
[<ffffffffaafba5a7>] pci_bus_add_devices+0x67/0x80<br />
[<ffffffffaafe2969>] enable_slot+0x239/0x4a0<br />
[<ffffffffaafe1b88>] ? get_slot_status+0xa8/0x110<br />
[<ffffffffaafe2cd7>] acpiphp_check_bridge.part.9+0x107/0x140<br />
[<ffffffffaafe2f18>] acpiphp_hotplug_notify+0x138/0x210<br />
[<ffffffffaafe2de0>] ? acpiphp_post_dock_fixup+0xd0/0xd0<br />
[<ffffffffab00900e>] acpi_device_hotplug+0x3b7/0x41a<br />
[<ffffffffab0020d7>] acpi_hotplug_work_fn+0x1e/0x29<br />
[<ffffffffaacb9d8f>] process_one_work+0x17f/0x440<br />
[<ffffffffaacbae26>] worker_thread+0x126/0x3c0<br />
[<ffffffffaacbad00>] ? manage_workers.isra.25+0x2a0/0x2a0<br />
[<ffffffffaacc1c71>] kthread+0xd1/0xe0<br />
[<ffffffffaacc1ba0>] ? insert_kthread_work+0x40/0x40<br />
[<ffffffffab374c1d>] ret_from_fork_nospec_begin+0x7/0x21<br />
[<ffffffffaacc1ba0>] ? insert_kthread_work+0x40/0x40
↧
0016245: Installation of @X Window System or @Xfce seems to be broken as depends on glibc-2.17-260.el7_6.5
I have been trying to install Xfce on Centos 7 () and have found that I am getting an issue where there is a mismatch between the version of glibc-common which different packages depend upon.<br />
<br />
I have found that <span class="mention"><a class="user" href="https://bugs.centos.org/view_user_page.php?id=3936">@X</a></span> Window <a href="mailto:System/@Xfce">System/@Xfce</a> seems to depend upon glibc-common-2.17-260.el7_6.5, but that other items such as openssh/pam depend upon glibc-common-2.17-260.el7_6.6 - this seems to be a hard-dependency.
↧