Quantcast
Channel: CentOS Bug Tracker - Issues
Viewing all 19115 articles
Browse latest View live

0016275: [abrt] httpd: httpd killed by SIGSEGV

$
0
0
Version-Release number of selected component:<br /> httpd-2.4.6-89.el7.centos<br /> <br /> Truncated backtrace:<br /> Thread no. 1 (10 frames)<br /> #0 ??<br /> #1 zm_startup_pdo_sqlsrv at /usr/lib64/php/modules/pdo_sqlsrv.so<br /> #2 zend_startup_module_ex at /usr/src/debug/php-7.3.7/Zend/zend_API.c:1878<br /> #3 zend_startup_module_zval at /usr/src/debug/php-7.3.7/Zend/zend_API.c:1893<br /> #4 zend_hash_apply at /usr/src/debug/php-7.3.7/Zend/zend_hash.c:1689<br /> #5 zend_startup_modules at /usr/src/debug/php-7.3.7/Zend/zend_API.c:2004<br /> #6 php_module_startup at /usr/src/debug/php-7.3.7/main/main.c:2333<br /> #7 php_apache2_startup at /usr/src/debug/php-7.3.7/sapi/apache2handler/sapi_apache2.c:372<br /> #8 php_apache_server_startup at /usr/src/debug/php-7.3.7/sapi/apache2handler/sapi_apache2.c:485<br /> #9 ap_run_post_config at config.c:103

0015504: SELinux is preventing /usr/bin/totem-video-thumbnailer from using the nnp_transition, nosuid_transition access on a process.

$
0
0
Description of problem:<br /> SELinux is preventing /usr/bin/totem-video-thumbnailer from using the nnp_transition, nosuid_transition access on a process.<br /> <br /> ***** Plugin catchall (100. confidence) suggests **************************<br /> <br /> If you believe that totem-video-thumbnailer should be allowed nnp_transition nosuid_transition access on processes labeled thumb_t by default.<br /> Then you should report this as a bug.<br /> You can generate a local policy module to allow this access.<br /> Do<br /> allow this access for now by executing:<br /> # ausearch -c 'totem-video-thu' --raw | audit2allow -M my-totemvideothu<br /> # semodule -i my-totemvideothu.pp<br /> <br /> Additional Information:<br /> Source Context unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1<br /> 023<br /> Target Context unconfined_u:unconfined_r:thumb_t:s0-s0:c0.c1023<br /> Target Objects Unknown [ process2 ]<br /> Source totem-video-thu<br /> Source Path /usr/bin/totem-video-thumbnailer<br /> Port <Unknown><br /> Host (removed)<br /> Source RPM Packages evince-3.28.2-5.el7.x86_64<br /> Target RPM Packages <br /> Policy RPM selinux-policy-3.13.1-229.el7_6.5.noarch<br /> Selinux Enabled True<br /> Policy Type targeted<br /> Enforcing Mode Enforcing<br /> Host Name (removed)<br /> Platform Linux (removed) 3.10.0-957.el7.x86_64 #1 SMP Thu<br /> Nov 8 23:39:32 UTC 2018 x86_64 x86_64<br /> Alert Count 7<br /> First Seen 2018-12-01 09:06:42 IST<br /> Last Seen 2018-12-01 09:06:48 IST<br /> Local ID ed1365ce-1934-406e-900a-664da20c8990<br /> <br /> Raw Audit Messages<br /> type=AVC msg=audit(1543635408.473:324): avc: denied { nnp_transition nosuid_transition } for pid=29079 comm="flatpak-bwrap" scontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tcontext=unconfined_u:unconfined_r:thumb_t:s0-s0:c0.c1023 tclass=process2 permissive=0<br /> <br /> <br /> type=SYSCALL msg=audit(1543635408.473:324): arch=x86_64 syscall=execve success=yes exit=0 a0=7ffe2b712f6f a1=7ffe2b7155a0 a2=b9c160 a3=2f736e6f6974616c items=0 ppid=29074 pid=29079 auid=1000 uid=1000 gid=1000 euid=1000 suid=1000 fsuid=1000 egid=1000 sgid=1000 fsgid=1000 tty=(none) ses=1 comm=evince-thumbnai exe=/usr/bin/evince-thumbnailer subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 key=(null)<br /> <br /> Hash: totem-video-thu,unconfined_t,thumb_t,process2,nnp_transition,nosuid_transition<br /> <br /> Version-Release number of selected component:<br /> selinux-policy-3.13.1-229.el7_6.5.noarch

0015522: Machine with older uefi fw doesn't boot with newer shim (like on Apple 2008 iMac)

$
0
0
With the shim pkgs being rebased on v15 (it was v12 before), there is a new check that is considered critical and then power off the machine instead of loading grub2 (in the normal shim => grub2 => kernel chain)

0016277: Job devtools-openshiftio-cico-jobs-jjb-test not triggering

$
0
0
Attempting to issue a webhook from github.com for openshiftio-cico-jobs is not triggering the "devtools-openshiftio-cici-jobs-jjb-test" job. The last successful time this job ran was about 1.5 days ago [1]. Current PR [2]. Current ci-slave shows connected/available [3]. Attempted a re-delivery and got the same result. Debug from github shows the https request responding with a 200 [4].<br /> <br /> [1] <a href="https://ci.centos.org/job/devtools-openshiftio-cico-jobs-jjb-test/changes">https://ci.centos.org/job/devtools-openshiftio-cico-jobs-jjb-test/changes</a><br /> [2] <a href="https://github.com/openshiftio/openshiftio-cico-jobs/pull/1042">https://github.com/openshiftio/openshiftio-cico-jobs/pull/1042</a><br /> [3] <a href="https://ci.centos.org/computer/devtools-ci-slave04/">https://ci.centos.org/computer/devtools-ci-slave04/</a><br /> [4] Connection: keep-alive<br /> Content-Length: 2<br /> Date: Wed, 17 Jul 2019 18:39:18 GMT<br /> Server: nginx/1.10.1<br /> Transfer-Encoding: chunked<br /> X-Content-Type-Options: nosniff

0012422: SELinux is preventing /usr/libexec/gdm-session-worker from 'create' accesses on the directory gdm.

$
0
0
Description of problem:<br /> Just booting the workstation up.<br /> SELinux is preventing /usr/libexec/gdm-session-worker from 'create' accesses on the directory gdm.<br /> <br /> ***** Plugin catchall_labels (83.8 confidence) suggests *******************<br /> <br /> If you want to allow gdm-session-worker to have create access on the gdm directory<br /> Then you need to change the label on gdm<br /> Do<br /> # semanage fcontext -a -t FILE_TYPE 'gdm'<br /> where FILE_TYPE is one of the following: abrt_var_cache_t, auth_cache_t, auth_home_t, cache_home_t, cgroup_t, config_home_t, data_home_t, dbus_home_t, faillog_t, fonts_cache_t, gconf_home_t, gkeyringd_gnome_home_t, gkeyringd_tmp_t, gnome_home_t, gstreamer_home_t, icc_data_home_t, locale_t, mozilla_plugin_tmp_t, mozilla_plugin_tmpfs_t, pam_var_run_t, user_tmp_t, var_auth_t, xdm_home_t, xdm_log_t, xdm_spool_t, xdm_tmpfs_t, xdm_var_lib_t, xdm_var_run_t, xkb_var_lib_t, xserver_log_t.<br /> Then execute:<br /> restorecon -v 'gdm'<br /> <br /> <br /> ***** Plugin catchall (17.1 confidence) suggests **************************<br /> <br /> If you believe that gdm-session-worker should be allowed create access on the gdm directory by default.<br /> Then you should report this as a bug.<br /> You can generate a local policy module to allow this access.<br /> Do<br /> allow this access for now by executing:<br /> # ausearch -c 'gdm-session-wor' --raw | audit2allow -M my-gdmsessionwor<br /> # semodule -i my-gdmsessionwor.pp<br /> <br /> Additional Information:<br /> Source Context system_u:system_r:xdm_t:s0-s0:c0.c1023<br /> Target Context system_u:object_r:usr_t:s0<br /> Target Objects gdm [ dir ]<br /> Source gdm-session-wor<br /> Source Path /usr/libexec/gdm-session-worker<br /> Port <Unknown><br /> Host (removed)<br /> Source RPM Packages gdm-3.14.2-19.el7.x86_64<br /> Target RPM Packages <br /> Policy RPM selinux-policy-3.13.1-102.el7_3.7.noarch<br /> Selinux Enabled True<br /> Policy Type targeted<br /> Enforcing Mode Enforcing<br /> Host Name (removed)<br /> Platform Linux (removed) 3.10.0-514.2.2.el7.x86_64 #1 SMP<br /> Tue Dec 6 23:06:41 UTC 2016 x86_64 x86_64<br /> Alert Count 4<br /> First Seen 2016-12-17 12:25:23 CST<br /> Last Seen 2016-12-17 16:39:28 CST<br /> Local ID 7fe73b66-b749-4fc7-83e8-999bfbd51fe1<br /> <br /> Raw Audit Messages<br /> type=AVC msg=audit(1482014368.27:172): avc: denied { create } for pid=2890 comm="gdm-session-wor" name="gdm" scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:usr_t:s0 tclass=dir<br /> <br /> <br /> type=SYSCALL msg=audit(1482014368.27:172): arch=x86_64 syscall=mkdir success=no exit=EACCES a0=7fcc47ba7fa0 a1=1c0 a2=7fcc47ba7fc5 a3=7ffd0e0674f0 items=0 ppid=2877 pid=2890 auid=1002 uid=1002 gid=1002 euid=1002 suid=1002 fsuid=1002 egid=1002 sgid=1002 fsgid=1002 tty=(none) ses=1 comm=gdm-session-wor exe=/usr/libexec/gdm-session-worker subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)<br /> <br /> Hash: gdm-session-wor,xdm_t,usr_t,dir,create<br /> <br /> Version-Release number of selected component:<br /> selinux-policy-3.13.1-102.el7_3.7.noarch

0016278: [abrt] firefox: XRE_InitChildProcess(int, char**, XREChildData const*)(): firefox killed by SIGSEGV

$
0
0
Description of problem:<br /> <br /> <br /> Version-Release number of selected component:<br /> firefox-60.8.0-1.el7.centos<br /> <br /> Truncated backtrace:<br /> Thread no. 1 (3 frames)<br /> #0 XRE_InitChildProcess(int, char**, XREChildData const*) at /usr/src/debug/firefox-60.8.0/toolkit/xre/nsEmbedFunctions.cpp:668<br /> #1 content_process_main(mozilla::Bootstrap*, int, char**) at /usr/src/debug/firefox-60.8.0/ipc/contentproc/plugin-container.cpp:49<br /> #2 main(int, char**, char**) at /usr/src/debug/firefox-60.8.0/browser/app/nsBrowserApp.cpp:258

0016279: NFS client mount fails on booting

$
0
0
We have NFS server and a NFS client, when CentOS based instance start-stop-start sometimes NFS mounting fails which stops instance from coming online since mounts are necessary. Same instance can work after manual stop-start!<br /> <br /> Analysis revealed that, CentOS doesn't wait for network to come online and tries to mount the NFS mounts before that which then fails and creates problem. Not sure if you guys could help with this but it is troubling us a lot.

0016280: SELinux is preventing /usr/bin/cp from using the 'setfscreate' accesses on a process.

$
0
0
Description of problem:<br /> SELinux is preventing /usr/bin/cp from using the 'setfscreate' accesses on a process.<br /> <br /> ***** Plugin catchall (100. confidence) suggests **************************<br /> <br /> If you believe that cp should be allowed setfscreate access on processes labeled snappy_t by default.<br /> Then you should report this as a bug.<br /> You can generate a local policy module to allow this access.<br /> Do<br /> allow this access for now by executing:<br /> # ausearch -c 'cp' --raw | audit2allow -M my-cp<br /> # semodule -i my-cp.pp<br /> <br /> Additional Information:<br /> Source Context system_u:system_r:snappy_t:s0<br /> Target Context system_u:system_r:snappy_t:s0<br /> Target Objects Unknown [ process ]<br /> Source cp<br /> Source Path /usr/bin/cp<br /> Port <Unknown><br /> Host (removed)<br /> Source RPM Packages coreutils-8.22-23.el7.x86_64<br /> Target RPM Packages <br /> Policy RPM selinux-policy-3.13.1-229.el7_6.12.noarch<br /> Selinux Enabled True<br /> Policy Type targeted<br /> Enforcing Mode Enforcing<br /> Host Name (removed)<br /> Platform Linux (removed) 3.10.0-957.21.3.el7.x86_64 #1 SMP<br /> Tue Jun 18 16:35:19 UTC 2019 x86_64 x86_64<br /> Alert Count 2<br /> First Seen 2019-06-04 15:23:13 EDT<br /> Last Seen 2019-06-27 18:39:20 EDT<br /> Local ID 2b5ad48a-9fa2-4e96-baf2-e827e9d5d955<br /> <br /> Raw Audit Messages<br /> type=AVC msg=audit(1561675160.454:9542): avc: denied { setfscreate } for pid=40453 comm="cp" scontext=system_u:system_r:snappy_t:s0 tcontext=system_u:system_r:snappy_t:s0 tclass=process permissive=1<br /> <br /> <br /> type=SYSCALL msg=audit(1561675160.454:9542): arch=x86_64 syscall=write success=yes exit=ERANGE a0=3 a1=a2c9d0 a2=22 a3=7ffea93248e0 items=0 ppid=40006 pid=40453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm=cp exe=/usr/bin/cp subj=system_u:system_r:snappy_t:s0 key=(null)<br /> <br /> Hash: cp,snappy_t,snappy_t,process,setfscreate<br /> <br /> Version-Release number of selected component:<br /> selinux-policy-3.13.1-229.el7_6.12.noarch

0016281: SELinux is preventing /usr/bin/cp from 'create' accesses on the lnk_file user.

$
0
0
Description of problem:<br /> SELinux is preventing /usr/bin/cp from 'create' accesses on the lnk_file user.<br /> <br /> ***** Plugin catchall (100. confidence) suggests **************************<br /> <br /> If you believe that cp should be allowed create access on the user lnk_file by default.<br /> Then you should report this as a bug.<br /> You can generate a local policy module to allow this access.<br /> Do<br /> allow this access for now by executing:<br /> # ausearch -c 'cp' --raw | audit2allow -M my-cp<br /> # semodule -i my-cp.pp<br /> <br /> Additional Information:<br /> Source Context system_u:system_r:snappy_t:s0<br /> Target Context unconfined_u:object_r:snappy_home_t:s0<br /> Target Objects user [ lnk_file ]<br /> Source cp<br /> Source Path /usr/bin/cp<br /> Port <Unknown><br /> Host (removed)<br /> Source RPM Packages coreutils-8.22-23.el7.x86_64<br /> Target RPM Packages <br /> Policy RPM selinux-policy-3.13.1-229.el7_6.12.noarch<br /> Selinux Enabled True<br /> Policy Type targeted<br /> Enforcing Mode Enforcing<br /> Host Name (removed)<br /> Platform Linux (removed) 3.10.0-957.12.1.el7.x86_64 #1 SMP<br /> Mon Apr 29 14:59:59 UTC 2019 x86_64 x86_64<br /> Alert Count 1<br /> First Seen 2019-05-02 14:32:31 EDT<br /> Last Seen 2019-05-02 14:32:31 EDT<br /> Local ID e260d241-ce3c-441c-a48d-13f4b54bc40e<br /> <br /> Raw Audit Messages<br /> type=AVC msg=audit(1556821951.801:14662): avc: denied { create } for pid=140678 comm="cp" name="user" scontext=system_u:system_r:snappy_t:s0 tcontext=unconfined_u:object_r:snappy_home_t:s0 tclass=lnk_file permissive=1<br /> <br /> <br /> type=SYSCALL msg=audit(1556821951.801:14662): arch=x86_64 syscall=symlink success=yes exit=0 a0=25309e0 a1=2532500 a2=21 a3=7fff0f8fc760 items=0 ppid=140361 pid=140678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm=cp exe=/usr/bin/cp subj=system_u:system_r:snappy_t:s0 key=(null)<br /> <br /> Hash: cp,snappy_t,snappy_home_t,lnk_file,create<br /> <br /> Version-Release number of selected component:<br /> selinux-policy-3.13.1-229.el7_6.12.noarch

0010588: [abrt] systemd: ppoll(): systemd-logind killed by SIGABRT

$
0
0
Version-Release number of selected component:<br /> systemd-219-19.el7_2.4<br /> <br /> Truncated backtrace:<br /> Thread no. 1 (10 frames)<br /> #0 ppoll at /lib64/libc.so.6<br /> #1 __ppoll_alias at /usr/include/bits/poll2.h:71<br /> #2 bus_poll.19510 at src/libsystemd/sd-bus/sd-bus.c:2792<br /> #3 sd_bus_call at src/libsystemd/sd-bus/sd-bus.c:2026<br /> #4 sd_bus_call_method at src/libsystemd/sd-bus/bus-convenience.c:94<br /> #5 bus_remove_match_internal_dbus1 at src/libsystemd/sd-bus/bus-control.c:1438<br /> #6 bus_remove_match_internal at src/libsystemd/sd-bus/bus-control.c:1460<br /> #7 bus_slot_disconnect at src/libsystemd/sd-bus/bus-slot.c:93<br /> #8 sd_bus_slot_unref at src/libsystemd/sd-bus/bus-slot.c:210<br /> #9 sd_bus_add_match at src/libsystemd/sd-bus/sd-bus.c:2941

0015337: [abrt] firefox: mozilla::ipc::MessageChannel::OnChannelErrorFromLink(): firefox killed by SIGSEGV

$
0
0
Description of problem:<br /> firefox was updated by yum update process while being used. at that moment i was on rundeck.com/free-stuff page<br /> <br /> Version-Release number of selected component:<br /> firefox-60.2.1-1.el7.centos<br /> <br /> Truncated backtrace:<br /> Thread no. 1 (10 frames)<br /> #0 mozilla::ipc::MessageChannel::OnChannelErrorFromLink at /usr/src/debug/firefox-60.2.1/ipc/glue/MessageChannel.cpp:2562<br /> #1 mozilla::ipc::ProcessLink::OnChannelError at /usr/src/debug/firefox-60.2.1/ipc/glue/MessageLink.cpp:393<br /> #2 event_persist_closure at /usr/src/debug/firefox-60.2.1/ipc/chromium/src/third_party/libevent/event.c:1580<br /> #3 event_process_active_single_queue at /usr/src/debug/firefox-60.2.1/ipc/chromium/src/third_party/libevent/event.c:1639<br /> #4 event_process_active at /usr/src/debug/firefox-60.2.1/ipc/chromium/src/third_party/libevent/event.c:1738<br /> #5 event_base_loop at /usr/src/debug/firefox-60.2.1/ipc/chromium/src/third_party/libevent/event.c:1961<br /> #6 base::MessagePumpLibevent::Run at /usr/src/debug/firefox-60.2.1/ipc/chromium/src/base/message_pump_libevent.cc:381<br /> #7 RunInternal at /usr/src/debug/firefox-60.2.1/ipc/chromium/src/base/message_loop.cc:326<br /> #8 RunHandler at /usr/src/debug/firefox-60.2.1/ipc/chromium/src/base/message_loop.cc:319<br /> #9 MessageLoop::Run at /usr/src/debug/firefox-60.2.1/ipc/chromium/src/base/message_loop.cc:299

0016282: HTTPs resolution failure for CURL and YUM

$
0
0
Unable to resolve HTTPs links from newly spawned VM using CENTOS generic cloud images. <br /> <br /> Issue found with images for CENTOS available on <a href="https://cloud.centos.org/centos/7/images/">https://cloud.centos.org/centos/7/images/</a> <br /> Tried on following IMAGES: <br /> <br /> CentOS-7-x86_64-GenericCloud.qcow2 2019-06-04 09:28 898M <br /> CentOS-7-x86_64-GenericCloud-1804_02.qcow2 2018-05-19 01:34 892M <br /> CentOS-7-x86_64-GenericCloud-1606.qcow2 2016-07-05 15:12 873M <br /> <br /> Command to test: <br /> curl -I -v <a href="https://google.com">https://google.com</a><br /> * About to connect() to google.com port 443 (#0)<br /> * Trying x.x.x.x....<br /> * Connected to google.com (x.x.x.x) port 443 (#0)<br /> * Initializing NSS with certpath: sql:/etc/pki/nssdb<br /> * Closing connection 0<br /> curl: (77) Problem with the SSL CA cert (path? access rights?)

0015102: NSCD not correctly reporting cache hit statistics

$
0
0
NSCD is not reporting cache hits.

0014828: IP_BIND_ADDRESS_NO_PORT is not defined in

$
0
0
nginx tries to detect whether OS supports IP_BIND_ADDRESS_NO_PORT or not by running test program in "configure" phase.<br /> it does not detect it on centos-7.5 (the feature itself is supported, but not defined in proper header file)

0016283: AWS AMI Images Out of Date on Wiki

$
0
0
<a href="https://wiki.centos.org/Cloud/AWS">https://wiki.centos.org/Cloud/AWS</a><br /> AMI's are 6+ months out of date on this list. Please update this list to include the most recent AMIs.

0014851: [abrt] kernel: WARNING: CPU: 0 PID: 4 at drivers/net/wireless/intel/iwlwifi/pcie/trans.c:1874 iwl_trans_pcie_grab_nic_access+...

$
0
0
Description of problem:<br /> i logged into the system.<br /> then i tried to switch wireless networks<br /> <br /> Version-Release number of selected component:<br /> kernel<br /> <br /> Truncated backtrace:<br /> WARNING: CPU: 0 PID: 4 at drivers/net/wireless/intel/iwlwifi/pcie/trans.c:1874 iwl_trans_pcie_grab_nic_access+0xed/0x100 [iwlwifi]<br /> Timeout waiting for hardware access (CSR_GP_CNTRL 0x000403d8)<br /> Modules linked in: rfcomm cmac ip6t_rpfilter ipt_REJECT nf_reject_ipv4 ip6t_REJECT nf_reject_ipv6 xt_conntrack ip_set nfnetlink ebtable_nat ebtable_broute bridge stp llc ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle ip6table_security ip6table_raw iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack iptable_mangle iptable_security iptable_raw ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter bnep sunrpc arc4 iwlmvm mac80211 intel_powerclamp coretemp iwlwifi intel_rapl iTCO_wdt iTCO_vendor_support kvm_intel dell_wmi ppdev sparse_keymap btusb kvm btrtl btbcm snd_hda_codec_hdmi btintel snd_hda_codec_realtek bluetooth uvcvideo cfg80211 dell_laptop snd_hda_codec_generic dell_smbios dcdbas videobuf2_vmalloc videobuf2_memops<br /> irqbypass videobuf2_core videodev sg snd_soc_rt5640 snd_soc_rl6231 snd_hda_intel joydev pcspkr snd_soc_ssm4567 snd_hda_codec snd_soc_core i2c_i801 lpc_ich mei_me snd_hda_core snd_compress mei shpchp snd_seq snd_hwdep snd_seq_device wmi snd_pcm parport_pc parport snd_timer snd soundcore snd_soc_sst_acpi snd_soc_sst_match dell_smo8800 regmap_i2c i2c_designware_platform i2c_designware_core dell_rbtn acpi_pad int3400_thermal rfkill binfmt_misc ip_tables xfs libcrc32c dm_crypt drbg ansi_cprng sd_mod crc_t10dif crct10dif_generic i915 crct10dif_pclmul crct10dif_common crc32_pclmul crc32c_intel ghash_clmulni_intel ahci i2c_algo_bit drm_kms_helper libahci syscopyarea sysfillrect sysimgblt fb_sys_fops libata e1000e aesni_intel drm glue_helper lrw gf128mul ablk_helper cryptd serio_raw sdhci_pci<br /> ptp sdhci_acpi pps_core sdhci mmc_core video iosf_mbi i2c_hid i2c_core dm_mirror dm_region_hash dm_log dm_mod<br /> CPU: 0 PID: 4 Comm: kworker/0:0 Kdump: loaded Not tainted 3.10.0-862.3.2.el7.x86_64 #1<br /> Hardware name: Dell Inc. Latitude E5550/0THWR2, BIOS A11 11/18/2015<br /> Workqueue: events cfg80211_rfkill_sync_work [cfg80211]<br /> Call Trace:<br /> [<ffffffff9ab0e78e>] dump_stack+0x19/0x1b<br /> [<ffffffff9a491998>] __warn+0xd8/0x100<br /> [<ffffffff9a491a1f>] warn_slowpath_fmt+0x5f/0x80<br /> [<ffffffffc0dcb35d>] iwl_trans_pcie_grab_nic_access+0xed/0x100 [iwlwifi]<br /> [<ffffffffc0dbb62d>] iwl_set_bits_prph+0x3d/0xb0 [iwlwifi]<br /> [<ffffffffc0d5cb8f>] __iwl_mvm_mac_stop+0x15f/0x1a0 [iwlmvm]<br /> [<ffffffffc0d5cc6a>] iwl_mvm_mac_stop+0x9a/0xc0 [iwlmvm]<br /> [<ffffffffc0df38d9>] drv_stop+0x39/0x100 [mac80211]<br /> [<ffffffffc0e28883>] ieee80211_stop_device+0x43/0x50 [mac80211]<br /> [<ffffffffc0e08ef0>] ieee80211_do_stop+0x540/0x900 [mac80211]<br /> [<ffffffff9ab1661e>] ? _raw_spin_unlock_bh+0x1e/0x20<br /> [<ffffffff9aa1855a>] ? dev_deactivate_many+0x1fa/0x250<br /> [<ffffffffc0e092ca>] ieee80211_stop+0x1a/0x20 [mac80211]<br /> [<ffffffff9a9e8148>] __dev_close_many+0xa8/0x110<br /> [<ffffffff9a9e82d8>] dev_close_many+0x98/0x140<br /> [<ffffffff9a9e8403>] dev_close+0x83/0xa0<br /> [<ffffffffc0af4235>] cfg80211_shutdown_all_interfaces+0x55/0xe0 [cfg80211]<br /> [<ffffffffc0af42eb>] cfg80211_rfkill_sync_work+0x2b/0x40 [cfg80211]<br /> [<ffffffff9a4b312f>] process_one_work+0x17f/0x440<br /> [<ffffffff9a4b3df6>] worker_thread+0x126/0x3c0<br /> [<ffffffff9a4b3cd0>] ? manage_workers.isra.24+0x2a0/0x2a0<br /> [<ffffffff9a4bb161>] kthread+0xd1/0xe0<br /> [<ffffffff9a4bb090>] ? insert_kthread_work+0x40/0x40<br /> [<ffffffff9ab20677>] ret_from_fork_nospec_begin+0x21/0x21<br /> [<ffffffff9a4bb090>] ? insert_kthread_work+0x40/0x40

0016284: Update kernel-plus with patches from kernel.org for e1000 and e1000e drivers

$
0
0
IRC:<br /> <br /> < pgreco> I use a lot of e1000e devices, and there were some interesting patches upstream<br /> < pgreco> so, about e1000, which is unsupported by rh<br /> < pgreco> I think we should try to keep it updated<br /> < pgreco> wrt e1000e, I'd like to add the patches that are logic to us, mainly backporting from 4.19.x lts<br /> <br /> Commits:<br /> <br /> e1000="cf1acec008f8d7761aa3fd7c4bca7e17b2d2512d ee400a3f1bfe7004a3e14b81c38ccc5583c26295"<br /> e1000e="88f3beae583682a992de2429992256666d70a40a 49dd86f0f5ece4e7addc0f8db5e75a2fb404ede6 b9f257e27890c462cc07c3e6d4fa7509730ea396 5ec9ba494db252d8a5baaed4fdaf5b4bbbc201dd 8cff6598b3c03936022dc3998274dba43567cc05"

0016285: request creation of koji tag sets for new cri-o versions

$
0
0
Hi, please create koji tag sets for new crio versions:<br /> <br /> paas7-crio-115-candidate<br /> <br /> Do not delete old tags for now. I'll get back to you once I check with upstream on this.

0016183: 9.9.4-74 AXFR fails to load to slaves

$
0
0
after upgrade to 9.9.4-74 BIND AXFR fails to load large zone files<br /> <br /> able to do a dig @localhost ZONE axfr which works<br /> however when doing<br /> dig @MASTER.IP ZONE axfr from anywhere else it hangs<br /> <br /> down grading to 9.9.4-73 solves the problem

0016286: [abrt] totem: fast_validate(): totem killed by SIGSEGV

$
0
0
Description of problem:<br /> this problem appear over and over. every time i start up the centos<br /> <br /> Version-Release number of selected component:<br /> totem-3.22.1-1.el7<br /> <br /> Truncated backtrace:<br /> Thread no. 1 (10 frames)<br /> #0 fast_validate at gutf8.c:1492<br /> #1 g_utf8_validate at gutf8.c:1673<br /> #2 gst_message_new_error_with_details at gstmessage.c:418<br /> #3 gst_message_new_error at gstmessage.c:458<br /> #4 bvw_check_if_video_decoder_is_missing at ../src/backend/bacon-video-widget.c:396<br /> #5 bvw_bus_message_cb at ../src/backend/bacon-video-widget.c:2468<br /> #6 ffi_call_unix64 at ../src/x86/unix64.S:76<br /> #7 ffi_call at ../src/x86/ffi64.c:522<br /> #8 g_cclosure_marshal_generic at gclosure.c:1490<br /> #13 gst_bus_async_signal_func at gstbus.c:1221
Viewing all 19115 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>