Soft lockup occurs where setsebool is trying to take the selinux policy rwlock that has been taken by the task itself in the same context (DEADLOCK)

Solution Unverified - Updated -

Issue

  • When I run setsebool -P httpd_can_network_connect 1, soft lockups occur where setsebool is trying to take the selinux policy rwlock that has been taken by the task itself in the same context.
[  208.016133] watchdog: BUG: soft lockup - CPU#1 stuck for 22s! [splunkd:2015]
[  208.017332] Modules linked in: nft_ct nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 nf_tables_set nft_counter nf_tables vsock_loopback nfnetlink vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock sunrpc intel_rapl_msr intel_rapl_common sb_edac crct10dif_pclmul crc32_pclmul ghash_clmulni_intel vmw_balloon intel_rapl_perf joydev pcspkr vmw_vmci i2c_piix4 ip_tables xfs libcrc32c vmwgfx sd_mod sg drm_kms_helper ata_generic syscopyarea sysfillrect sysimgblt fb_sys_fops ttm ata_piix drm crc32c_intel libata mptspi scsi_transport_spi serio_raw mptscsih vmxnet3 mptbase dm_mirror dm_region_hash dm_log dm_mod fuse
[  208.022903] irq event stamp: 839088
[  208.024250] hardirqs last  enabled at (839087): [<ffffffff971ffae7>] ktime_get_coarse_real_ts64+0xf7/0x190
[  208.025740] hardirqs last disabled at (839088): [<ffffffff98cb3b8d>] __schedule+0x21d/0x1b90
[  208.027188] softirqs last  enabled at (837884): [<ffffffff99000715>] __do_softirq+0x715/0xacd
[  208.028632] softirqs last disabled at (837877): [<ffffffff96ffc876>] irq_exit+0x236/0x2a0
[  208.030006] CPU: 1 PID: 2015 Comm: splunkd Kdump: loaded Tainted: G                 ---------r-  - 4.18.0-240.15.1.el8_3.x86_64+debug #1
[  208.031478] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 12/12/2018
[  208.033087] RIP: 0010:native_queued_spin_lock_slowpath+0x106/0x980
[  208.034576] Code: 04 00 00 00 00 48 8b 44 24 68 65 48 33 04 25 28 00 00 00 0f 85 15 07 00 00 48 83 c4 70 5b 5d 41 5c 41 5d 41 5e 41 5f c3 f3 90 <eb> 89 8b 44 24 30 3d 00 01 00 00 0f 84 e8 00 00 00 30 c0 89 c2 85
[  208.037931] RSP: 0018:ffff88818e7dfb40 EFLAGS: 00000202 ORIG_RAX: ffffffffffffff13
[  208.039627] RAX: 0000000000000000 RBX: ffffffff9c84a434 RCX: ffffffff971597ae
[  208.041292] RDX: 0000000000000000 RSI: 0000000000000004 RDI: ffffffff9c84a434
[  208.042869] RBP: 0000000000000001 R08: fffffbfff3909487 R09: fffffbfff3909486
[  208.044550] R10: fffffbfff3909486 R11: ffffffff9c84a437 R12: 1ffff11031cfbf6a
[  208.046207] R13: 0000000000000007 R14: fffffbfff3909486 R15: 0000000000000001
[  208.047987] FS:  00007f7ead1ff700(0000) GS:ffff8881cb600000(0000) knlGS:0000000000000000
[  208.049876] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  208.051568] CR2: 0000562f316ae280 CR3: 0000000191330003 CR4: 00000000003606e0
[  208.053427] Call Trace:
[  208.055315]  ? pv_hash+0x120/0x120
[  208.057013]  ? debug_show_held_locks+0x50/0x50
[  208.058800]  ? selinux_audit_rule_match+0x5c/0xd50
[  208.060588]  queued_read_lock_slowpath+0x154/0x4c0
[  208.062299]  _raw_read_lock+0x64/0x80
[  208.064008]  selinux_audit_rule_match+0x5c/0xd50
[  208.065784]  security_audit_rule_match+0x56/0x90
[  208.067711]  audit_filter_rules+0x24b4/0x4c50
[  208.069597]  ? trace_hardirqs_on+0x10/0x10
[  208.071458]  ? __audit_inode_child+0x1040/0x1040
[  208.073368]  ? audit_filter_syscall.constprop.7+0xc6/0x370
[  208.075147]  audit_filter_syscall.constprop.7+0x1f3/0x370
[  208.077079]  ? audit_filter_rules+0x4c50/0x4c50
[  208.078904]  ? __fd_install+0x1b6/0x500
[  208.080871]  __audit_syscall_exit+0x16a/0xaa0
[  208.082720]  ? filp_open+0x50/0x50
[  208.084454]  syscall_slow_exit_work+0x349/0x480
[  208.086275]  do_syscall_64+0x3cf/0x4d0
[  208.088035]  entry_SYSCALL_64_after_hwframe+0x6a/0xdf
[  208.089836] RIP: 0033:0x7f7eb63220e6
[  208.091417] Code: 89 54 24 08 e8 9b f4 ff ff 8b 74 24 0c 48 8b 3c 24 41 89 c0 44 8b 54 24 08 b8 01 01 00 00 89 f2 48 89 fe bf 9c ff ff ff 0f 05 <48> 3d 00 f0 ff ff 77 30 44 89 c7 89 44 24 08 e8 c6 f4 ff ff 8b 44
[  208.095217] RSP: 002b:00007f7ead1fe7c0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101
[  208.097113] RAX: 0000000000000035 RBX: 00007f7ead1fe850 RCX: 00007f7eb63220e6
[  208.098946] RDX: 0000000000000000 RSI: 00007f7eae84da60 RDI: 00000000ffffff9c
[  208.100702] RBP: 00007f7eb766fbb8 R08: 0000000000000000 R09: 00007f7eb7670598
[  208.102353] R10: 0000000000000000 R11: 0000000000000293 R12: 00007f7eae9aa700
[  208.103898] R13: 00007f7ead1fe8e0 R14: 00007f7ead1fe8e0 R15: 00007f7eae9aa818

Environment

  • Red Hat Enterprise Linux 8.3
  • Red Hat Enterprise Linux 7.9 (kernel-3.10.0-1160.15.2.el7)

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In