Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Aug 6 17:15:36 fed26 kernel: tun: Universal TUN/TAP device driver, 1.6
- Aug 6 17:25:14 fed26 kernel: Injecting memory failure for pfn 0x1e20b1 at process virtual address 0x7f54db290000
- Aug 6 17:25:14 fed26 kernel: Memory failure: 0x1e20b1: recovery action for dirty LRU page: Recovered
- Aug 6 17:25:14 fed26 kernel: Injecting memory failure for pfn 0x1cd99f at process virtual address 0x7f54db291000
- Aug 6 17:25:14 fed26 kernel: Memory failure: 0x1cd99f: recovery action for dirty LRU page: Recovered
- Aug 6 17:25:14 fed26 kernel: Injecting memory failure for pfn 0x1e20b0 at process virtual address 0x7f54db292000
- Aug 6 17:25:14 fed26 kernel: Memory failure: 0x1e20b0: recovery action for dirty LRU page: Recovered
- Aug 6 17:25:14 fed26 kernel: Injecting memory failure for pfn 0x223072 at process virtual address 0x7f54db293000
- Aug 6 17:25:14 fed26 kernel: Memory failure: 0x223072: recovery action for dirty LRU page: Recovered
- Aug 6 17:25:14 fed26 kernel: Injecting memory failure for pfn 0x172fbb at process virtual address 0x7f54db294000
- Aug 6 17:25:14 fed26 kernel: Memory failure: 0x172fbb: recovery action for dirty LRU page: Recovered
- Aug 6 17:25:14 fed26 kernel: Injecting memory failure for pfn 0x166210 at process virtual address 0x7f54db295000
- Aug 6 17:25:14 fed26 kernel: Memory failure: 0x166210: recovery action for dirty LRU page: Recovered
- Aug 6 17:25:14 fed26 kernel: Injecting memory failure for pfn 0x223073 at process virtual address 0x7f54db296000
- Aug 6 17:25:14 fed26 kernel: Memory failure: 0x223073: recovery action for dirty LRU page: Recovered
- Aug 6 17:25:14 fed26 kernel: Injecting memory failure for pfn 0x1c4f83 at process virtual address 0x7f54db297000
- Aug 6 17:25:14 fed26 kernel: Memory failure: 0x1c4f83: recovery action for dirty LRU page: Recovered
- Aug 6 17:25:14 fed26 kernel: Injecting memory failure for pfn 0x172fba at process virtual address 0x7f54db298000
- Aug 6 17:25:14 fed26 kernel: Memory failure: 0x172fba: recovery action for dirty LRU page: Recovered
- Aug 6 17:25:14 fed26 kernel: Injecting memory failure for pfn 0x2264d0 at process virtual address 0x7f54db299000
- Aug 6 17:25:14 fed26 kernel: Memory failure: 0x2264d0: recovery action for dirty LRU page: Recovered
- Aug 6 17:26:43 fed26 audit[65999]: USER_CMD pid=65999 uid=0 auid=1000 ses=1 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='cwd="/home/agentzh/git/systemtap/testsuite/systemtap.examples/process" cmd="true" terminal=? res=success'
- Aug 6 17:26:43 fed26 audit[65999]: CRED_REFR pid=65999 uid=0 auid=1000 ses=1 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:setcred grantors=pam_env,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'
- Aug 6 17:26:43 fed26 audit[65999]: USER_START pid=65999 uid=0 auid=1000 ses=1 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'
- Aug 6 17:26:43 fed26 audit[65999]: USER_END pid=65999 uid=0 auid=1000 ses=1 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'
- Aug 6 17:26:43 fed26 audit[65999]: CRED_DISP pid=65999 uid=0 auid=1000 ses=1 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:setcred grantors=pam_env,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'
- Aug 6 17:31:44 fed26 kernel: Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1
- Aug 6 17:34:57 fed26 kernel: Injecting memory failure for pfn 0x134450 at process virtual address 0x7f186d120000
- Aug 6 17:34:57 fed26 kernel: Memory failure: 0x134450: recovery action for dirty LRU page: Recovered
- Aug 6 17:34:57 fed26 kernel: Injecting memory failure for pfn 0x14e673 at process virtual address 0x7f186d121000
- Aug 6 17:34:57 fed26 kernel: Memory failure: 0x14e673: recovery action for dirty LRU page: Recovered
- Aug 6 17:34:57 fed26 kernel: Injecting memory failure for pfn 0x160a10 at process virtual address 0x7f186d122000
- Aug 6 17:34:57 fed26 kernel: Memory failure: 0x160a10: recovery action for dirty LRU page: Recovered
- Aug 6 17:34:57 fed26 kernel: Injecting memory failure for pfn 0x123c06 at process virtual address 0x7f186d123000
- Aug 6 17:34:57 fed26 kernel: Memory failure: 0x123c06: recovery action for dirty LRU page: Recovered
- Aug 6 17:34:57 fed26 kernel: Injecting memory failure for pfn 0x20ee34 at process virtual address 0x7f186d124000
- Aug 6 17:34:57 fed26 kernel: Memory failure: 0x20ee34: recovery action for dirty LRU page: Recovered
- Aug 6 17:34:57 fed26 kernel: Injecting memory failure for pfn 0x1b9e57 at process virtual address 0x7f186d125000
- Aug 6 17:34:57 fed26 kernel: Memory failure: 0x1b9e57: recovery action for dirty LRU page: Recovered
- Aug 6 17:34:57 fed26 kernel: Injecting memory failure for pfn 0x21a8de at process virtual address 0x7f186d126000
- Aug 6 17:34:57 fed26 kernel: Memory failure: 0x21a8de: recovery action for dirty LRU page: Recovered
- Aug 6 17:34:57 fed26 kernel: Injecting memory failure for pfn 0x1052e6 at process virtual address 0x7f186d127000
- Aug 6 17:34:57 fed26 kernel: Memory failure: 0x1052e6: recovery action for dirty LRU page: Recovered
- Aug 6 17:34:57 fed26 kernel: Injecting memory failure for pfn 0x18b79b at process virtual address 0x7f186d128000
- Aug 6 17:34:57 fed26 kernel: Memory failure: 0x18b79b: recovery action for dirty LRU page: Recovered
- Aug 6 17:34:57 fed26 kernel: Injecting memory failure for pfn 0x160a11 at process virtual address 0x7f186d129000
- Aug 6 17:34:57 fed26 kernel: Memory failure: 0x160a11: recovery action for dirty LRU page: Recovered
- Aug 6 17:39:54 fed26 kernel: BUG: unable to handle kernel NULL pointer dereference at 0000000000000018
- Aug 6 17:39:54 fed26 kernel: IP: idr_find+0x0/0x10
- Aug 6 17:39:54 fed26 kernel: PGD 0 P4D 0
- Aug 6 17:39:54 fed26 kernel: Oops: 0000 [#1] SMP PTI
- Aug 6 17:39:54 fed26 kernel: Modules linked in: stap_03edb2d179459fede292b29852ff2e69_66810(OE) stap_85aea90793923170bee0b12372c2b75_65382(OE) nd_s_37300(OE) sy_8117(OE) tun binfmt_misc stap_ed788b33a8ae2e8ac99e9c00924aed2e_54644(OE) stap_44d16b3c1314a75763efeef9b733e98_53528(OE) stap_b1b2a621cc77606d887e0296b2eea2d_77558(OE) loop ip6t_rpfilter ip6t_REJECT nf_reject_ipv6 xt_conntrack ip_set nfnetlink ebtable_nat ebtable_broute bridge stp llc ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle ip6table_raw ip6table_security iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack iptable_mangle iptable_raw iptable_security ebtable_filter ebtables ip6table_filter ip6_tables vmw_vsock_vmci_transport vsock sunrpc coretemp crct10dif_pclmul crc32_pclmul ghash_clmulni_intel btusb
- Aug 6 17:39:54 fed26 kernel: btrtl btbcm btintel bluetooth snd_ens1371 intel_rapl_perf ecdh_generic rfkill snd_ac97_codec vmw_balloon ac97_bus gameport snd_rawmidi snd_seq_device joydev snd_pcm snd_timer snd e1000 soundcore shpchp i2c_piix4 vmw_vmci xfs libcrc32c vmwgfx drm_kms_helper ttm crc32c_intel drm mptspi scsi_transport_spi serio_raw mptscsih mptbase ata_generic pata_acpi [last unloaded: stap_3986b3532b2e7496a14f459cf5747eb_50392]
- Aug 6 17:39:54 fed26 kernel: CPU: 5 PID: 67399 Comm: echo Tainted: G OE 4.16.11-100.fc26.x86_64 #1
- Aug 6 17:39:54 fed26 kernel: Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 07/02/2015
- Aug 6 17:39:54 fed26 kernel: RIP: 0010:idr_find+0x0/0x10
- Aug 6 17:39:54 fed26 kernel: RSP: 0018:ffffb44a03733d40 EFLAGS: 00010046
- Aug 6 17:39:54 fed26 kernel: RAX: 0000000000000000 RBX: ffffb44a034e4000 RCX: 0000000000010747
- Aug 6 17:39:54 fed26 kernel: RDX: 0000000000000000 RSI: 0000000000010747 RDI: 0000000000000008
- Aug 6 17:39:54 fed26 kernel: RBP: ffffb44a034e48a8 R08: ffffb44a072db020 R09: 0000000000002710
- Aug 6 17:39:54 fed26 kernel: R10: 0000000000002710 R11: 0000000000002710 R12: 0000000000000001
- Aug 6 17:39:54 fed26 kernel: R13: 0000000000000000 R14: 0000000000000000 R15: ffffb44a0725f000
- Aug 6 17:39:54 fed26 kernel: FS: 0000000000000000(0000) GS:ffff90c375740000(0000) knlGS:0000000000000000
- Aug 6 17:39:54 fed26 kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
- Aug 6 17:39:54 fed26 kernel: CR2: 0000000000000018 CR3: 000000009420a006 CR4: 00000000003606e0
- Aug 6 17:39:54 fed26 kernel: DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
- Aug 6 17:39:54 fed26 kernel: DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
- Aug 6 17:39:54 fed26 kernel: Call Trace:
- Aug 6 17:39:54 fed26 kernel: find_get_pid+0x38/0x50
- Aug 6 17:39:54 fed26 kernel: function___global_pid2task__overload_0+0x78/0x170 [stap_03edb2d179459fede292b29852ff2e69_66810]
- Aug 6 17:39:54 fed26 kernel: ? probe_4373+0xa67/0x15c0 [stap_03edb2d179459fede292b29852ff2e69_66810]
- Aug 6 17:39:54 fed26 kernel: ? enter_real_tracepoint_probe_0+0x191/0x2c0 [stap_03edb2d179459fede292b29852ff2e69_66810]
- Aug 6 17:39:54 fed26 kernel: ? __schedule+0x2d3/0x860
- Aug 6 17:39:54 fed26 kernel: ? do_task_dead+0x3f/0x50
- Aug 6 17:39:54 fed26 kernel: ? do_exit+0x73b/0xbb0
- Aug 6 17:39:54 fed26 kernel: ? __do_page_fault+0x279/0x4e0
- Aug 6 17:39:54 fed26 kernel: ? do_group_exit+0x3a/0xa0
- Aug 6 17:39:54 fed26 kernel: ? SyS_exit_group+0x10/0x10
- Aug 6 17:39:54 fed26 kernel: ? do_syscall_64+0x74/0x180
- Aug 6 17:39:54 fed26 kernel: ? entry_SYSCALL_64_after_hwframe+0x3d/0xa2
- Aug 6 17:39:54 fed26 kernel: Code: e7 44 89 6c 24 04 e8 00 fe ff ff eb af e8 89 ba 80 ff 66 0f 1f 84 00 00 00 00 00 8b 47 10 31 d2 48 29 c6 e9 c3 55 00 00 0f 1f 00 <8b> 47 10 48 29 c6 e9 a5 55 00 00 0f 1f 44 00 00 55 53 48 89 f5
- Aug 6 17:39:54 fed26 kernel: RIP: idr_find+0x0/0x10 RSP: ffffb44a03733d40
- Aug 6 17:39:54 fed26 kernel: CR2: 0000000000000018
- Aug 6 17:39:54 fed26 kernel: ---[ end trace 57edcd697dfa8beb ]---
- Aug 6 17:39:54 fed26 kernel: Fixing recursive fault but reboot is needed!
- Aug 6 17:39:54 fed26 kernel: watchdog: BUG: soft lockup - CPU#2 stuck for 22s! [stapio:37300]
- Aug 6 17:39:54 fed26 kernel: Modules linked in: stap_03edb2d179459fede292b29852ff2e69_66810(OE) stap_85aea90793923170bee0b12372c2b75_65382(OE) nd_s_37300(OE) sy_8117(OE) tun binfmt_misc stap_ed788b33a8ae2e8ac99e9c00924aed2e_54644(OE) stap_44d16b3c1314a75763efeef9b733e98_53528(OE) stap_b1b2a621cc77606d887e0296b2eea2d_77558(OE) loop ip6t_rpfilter ip6t_REJECT nf_reject_ipv6 xt_conntrack ip_set nfnetlink ebtable_nat ebtable_broute bridge stp llc ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle ip6table_raw ip6table_security iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack iptable_mangle iptable_raw iptable_security ebtable_filter ebtables ip6table_filter ip6_tables vmw_vsock_vmci_transport vsock sunrpc coretemp crct10dif_pclmul crc32_pclmul ghash_clmulni_intel btusb
- Aug 6 17:39:54 fed26 kernel: btrtl btbcm btintel bluetooth snd_ens1371 intel_rapl_perf ecdh_generic rfkill snd_ac97_codec vmw_balloon ac97_bus gameport snd_rawmidi snd_seq_device joydev snd_pcm snd_timer snd e1000 soundcore shpchp i2c_piix4 vmw_vmci xfs libcrc32c vmwgfx drm_kms_helper ttm crc32c_intel drm mptspi scsi_transport_spi serio_raw mptscsih mptbase ata_generic pata_acpi [last unloaded: stap_3986b3532b2e7496a14f459cf5747eb_50392]
- Aug 6 17:39:54 fed26 kernel: CPU: 2 PID: 37300 Comm: stapio Tainted: G D OE 4.16.11-100.fc26.x86_64 #1
- Aug 6 17:39:54 fed26 kernel: Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 07/02/2015
- Aug 6 17:39:54 fed26 kernel:
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement