Soft lockup occurs where setsebool is trying to take the selinux policy rwlock that has been taken by the task itself in the same context (DEADLOCK)

Solution Unverified - Updated -

Issue

  • When I run setsebool -P httpd_can_network_connect 1, soft lockups occur where setsebool is trying to take the selinux policy rwlock that has been taken by the task itself in the same context.
[  208.016133] watchdog: BUG: soft lockup - CPU#1 stuck for 22s! [splunkd:2015]
[  208.017332] Modules linked in: nft_ct nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 nf_tables_set nft_counter nf_tables vsock_loopback nfnetlink vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock sunrpc intel_rapl_msr intel_rapl_common sb_edac crct10dif_pclmul crc32_pclmul ghash_clmulni_intel vmw_balloon intel_rapl_perf joydev pcspkr vmw_vmci i2c_piix4 ip_tables xfs libcrc32c vmwgfx sd_mod sg drm_kms_helper ata_generic syscopyarea sysfillrect sysimgblt fb_sys_fops ttm ata_piix drm crc32c_intel libata mptspi scsi_transport_spi serio_raw mptscsih vmxnet3 mptbase dm_mirror dm_region_hash dm_log dm_mod fuse
[  208.022903] irq event stamp: 839088
[  208.024250] hardirqs last  enabled at (839087): [<ffffffff971ffae7>] ktime_get_coarse_real_ts64+0xf7/0x190
[  208.025740] hardirqs last disabled at (839088): [<ffffffff98cb3b8d>] __schedule+0x21d/0x1b90
[  208.027188] softirqs last  enabled at (837884): [<ffffffff99000715>] __do_softirq+0x715/0xacd
[  208.028632] softirqs last disabled at (837877): [<ffffffff96ffc876>] irq_exit+0x236/0x2a0
[  208.030006] CPU: 1 PID: 2015 Comm: splunkd Kdump: loaded Tainted: G                 ---------r-  - 4.18.0-240.15.1.el8_3.x86_64+debug #1
[  208.031478] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 12/12/2018
[  208.033087] RIP: 0010:native_queued_spin_lock_slowpath+0x106/0x980
[  208.034576] Code: 04 00 00 00 00 48 8b 44 24 68 65 48 33 04 25 28 00 00 00 0f 85 15 07 00 00 48 83 c4 70 5b 5d 41 5c 41 5d 41 5e 41 5f c3 f3 90 <eb> 89 8b 44 24 30 3d 00 01 00 00 0f 84 e8 00 00 00 30 c0 89 c2 85
[  208.037931] RSP: 0018:ffff88818e7dfb40 EFLAGS: 00000202 ORIG_RAX: ffffffffffffff13
[  208.039627] RAX: 0000000000000000 RBX: ffffffff9c84a434 RCX: ffffffff971597ae
[  208.041292] RDX: 0000000000000000 RSI: 0000000000000004 RDI: ffffffff9c84a434
[  208.042869] RBP: 0000000000000001 R08: fffffbfff3909487 R09: fffffbfff3909486
[  208.044550] R10: fffffbfff3909486 R11: ffffffff9c84a437 R12: 1ffff11031cfbf6a
[  208.046207] R13: 0000000000000007 R14: fffffbfff3909486 R15: 0000000000000001
[  208.047987] FS:  00007f7ead1ff700(0000) GS:ffff8881cb600000(0000) knlGS:0000000000000000
[  208.049876] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  208.051568] CR2: 0000562f316ae280 CR3: 0000000191330003 CR4: 00000000003606e0
[  208.053427] Call Trace:
[  208.055315]  ? pv_hash+0x120/0x120
[  208.057013]  ? debug_show_held_locks+0x50/0x50
[  208.058800]  ? selinux_audit_rule_match+0x5c/0xd50
[  208.060588]  queued_read_lock_slowpath+0x154/0x4c0
[  208.062299]  _raw_read_lock+0x64/0x80
[  208.064008]  selinux_audit_rule_match+0x5c/0xd50
[  208.065784]  security_audit_rule_match+0x56/0x90
[  208.067711]  audit_filter_rules+0x24b4/0x4c50
[  208.069597]  ? trace_hardirqs_on+0x10/0x10
[  208.071458]  ? __audit_inode_child+0x1040/0x1040
[  208.073368]  ? audit_filter_syscall.constprop.7+0xc6/0x370
[  208.075147]  audit_filter_syscall.constprop.7+0x1f3/0x370
[  208.077079]  ? audit_filter_rules+0x4c50/0x4c50
[  208.078904]  ? __fd_install+0x1b6/0x500
[  208.080871]  __audit_syscall_exit+0x16a/0xaa0
[  208.082720]  ? filp_open+0x50/0x50
[  208.084454]  syscall_slow_exit_work+0x349/0x480
[  208.086275]  do_syscall_64+0x3cf/0x4d0
[  208.088035]  entry_SYSCALL_64_after_hwframe+0x6a/0xdf
[  208.089836] RIP: 0033:0x7f7eb63220e6
[  208.091417] Code: 89 54 24 08 e8 9b f4 ff ff 8b 74 24 0c 48 8b 3c 24 41 89 c0 44 8b 54 24 08 b8 01 01 00 00 89 f2 48 89 fe bf 9c ff ff ff 0f 05 <48> 3d 00 f0 ff ff 77 30 44 89 c7 89 44 24 08 e8 c6 f4 ff ff 8b 44
[  208.095217] RSP: 002b:00007f7ead1fe7c0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101
[  208.097113] RAX: 0000000000000035 RBX: 00007f7ead1fe850 RCX: 00007f7eb63220e6
[  208.098946] RDX: 0000000000000000 RSI: 00007f7eae84da60 RDI: 00000000ffffff9c
[  208.100702] RBP: 00007f7eb766fbb8 R08: 0000000000000000 R09: 00007f7eb7670598
[  208.102353] R10: 0000000000000000 R11: 0000000000000293 R12: 00007f7eae9aa700
[  208.103898] R13: 00007f7ead1fe8e0 R14: 00007f7ead1fe8e0 R15: 00007f7eae9aa818

Environment

  • Red Hat Enterprise Linux 8.3
  • Red Hat Enterprise Linux 7.9 (kernel-3.10.0-1160.15.2.el7)

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In

New to Red Hat?

Learn more about Red Hat subscriptions

Using a Red Hat product through a public cloud?

How to access this content