Advertisement
Guest User

Untitled

a guest
Aug 6th, 2018
107
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 11.72 KB | None | 0 0
  1. Aug 6 17:15:36 fed26 kernel: tun: Universal TUN/TAP device driver, 1.6
  2. Aug 6 17:25:14 fed26 kernel: Injecting memory failure for pfn 0x1e20b1 at process virtual address 0x7f54db290000
  3. Aug 6 17:25:14 fed26 kernel: Memory failure: 0x1e20b1: recovery action for dirty LRU page: Recovered
  4. Aug 6 17:25:14 fed26 kernel: Injecting memory failure for pfn 0x1cd99f at process virtual address 0x7f54db291000
  5. Aug 6 17:25:14 fed26 kernel: Memory failure: 0x1cd99f: recovery action for dirty LRU page: Recovered
  6. Aug 6 17:25:14 fed26 kernel: Injecting memory failure for pfn 0x1e20b0 at process virtual address 0x7f54db292000
  7. Aug 6 17:25:14 fed26 kernel: Memory failure: 0x1e20b0: recovery action for dirty LRU page: Recovered
  8. Aug 6 17:25:14 fed26 kernel: Injecting memory failure for pfn 0x223072 at process virtual address 0x7f54db293000
  9. Aug 6 17:25:14 fed26 kernel: Memory failure: 0x223072: recovery action for dirty LRU page: Recovered
  10. Aug 6 17:25:14 fed26 kernel: Injecting memory failure for pfn 0x172fbb at process virtual address 0x7f54db294000
  11. Aug 6 17:25:14 fed26 kernel: Memory failure: 0x172fbb: recovery action for dirty LRU page: Recovered
  12. Aug 6 17:25:14 fed26 kernel: Injecting memory failure for pfn 0x166210 at process virtual address 0x7f54db295000
  13. Aug 6 17:25:14 fed26 kernel: Memory failure: 0x166210: recovery action for dirty LRU page: Recovered
  14. Aug 6 17:25:14 fed26 kernel: Injecting memory failure for pfn 0x223073 at process virtual address 0x7f54db296000
  15. Aug 6 17:25:14 fed26 kernel: Memory failure: 0x223073: recovery action for dirty LRU page: Recovered
  16. Aug 6 17:25:14 fed26 kernel: Injecting memory failure for pfn 0x1c4f83 at process virtual address 0x7f54db297000
  17. Aug 6 17:25:14 fed26 kernel: Memory failure: 0x1c4f83: recovery action for dirty LRU page: Recovered
  18. Aug 6 17:25:14 fed26 kernel: Injecting memory failure for pfn 0x172fba at process virtual address 0x7f54db298000
  19. Aug 6 17:25:14 fed26 kernel: Memory failure: 0x172fba: recovery action for dirty LRU page: Recovered
  20. Aug 6 17:25:14 fed26 kernel: Injecting memory failure for pfn 0x2264d0 at process virtual address 0x7f54db299000
  21. Aug 6 17:25:14 fed26 kernel: Memory failure: 0x2264d0: recovery action for dirty LRU page: Recovered
  22. Aug 6 17:26:43 fed26 audit[65999]: USER_CMD pid=65999 uid=0 auid=1000 ses=1 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='cwd="/home/agentzh/git/systemtap/testsuite/systemtap.examples/process" cmd="true" terminal=? res=success'
  23. Aug 6 17:26:43 fed26 audit[65999]: CRED_REFR pid=65999 uid=0 auid=1000 ses=1 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:setcred grantors=pam_env,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'
  24. Aug 6 17:26:43 fed26 audit[65999]: USER_START pid=65999 uid=0 auid=1000 ses=1 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:session_open grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'
  25. Aug 6 17:26:43 fed26 audit[65999]: USER_END pid=65999 uid=0 auid=1000 ses=1 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:session_close grantors=pam_keyinit,pam_limits,pam_keyinit,pam_limits,pam_systemd,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'
  26. Aug 6 17:26:43 fed26 audit[65999]: CRED_DISP pid=65999 uid=0 auid=1000 ses=1 subj=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 msg='op=PAM:setcred grantors=pam_env,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=/dev/pts/0 res=success'
  27. Aug 6 17:31:44 fed26 kernel: Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1
  28. Aug 6 17:34:57 fed26 kernel: Injecting memory failure for pfn 0x134450 at process virtual address 0x7f186d120000
  29. Aug 6 17:34:57 fed26 kernel: Memory failure: 0x134450: recovery action for dirty LRU page: Recovered
  30. Aug 6 17:34:57 fed26 kernel: Injecting memory failure for pfn 0x14e673 at process virtual address 0x7f186d121000
  31. Aug 6 17:34:57 fed26 kernel: Memory failure: 0x14e673: recovery action for dirty LRU page: Recovered
  32. Aug 6 17:34:57 fed26 kernel: Injecting memory failure for pfn 0x160a10 at process virtual address 0x7f186d122000
  33. Aug 6 17:34:57 fed26 kernel: Memory failure: 0x160a10: recovery action for dirty LRU page: Recovered
  34. Aug 6 17:34:57 fed26 kernel: Injecting memory failure for pfn 0x123c06 at process virtual address 0x7f186d123000
  35. Aug 6 17:34:57 fed26 kernel: Memory failure: 0x123c06: recovery action for dirty LRU page: Recovered
  36. Aug 6 17:34:57 fed26 kernel: Injecting memory failure for pfn 0x20ee34 at process virtual address 0x7f186d124000
  37. Aug 6 17:34:57 fed26 kernel: Memory failure: 0x20ee34: recovery action for dirty LRU page: Recovered
  38. Aug 6 17:34:57 fed26 kernel: Injecting memory failure for pfn 0x1b9e57 at process virtual address 0x7f186d125000
  39. Aug 6 17:34:57 fed26 kernel: Memory failure: 0x1b9e57: recovery action for dirty LRU page: Recovered
  40. Aug 6 17:34:57 fed26 kernel: Injecting memory failure for pfn 0x21a8de at process virtual address 0x7f186d126000
  41. Aug 6 17:34:57 fed26 kernel: Memory failure: 0x21a8de: recovery action for dirty LRU page: Recovered
  42. Aug 6 17:34:57 fed26 kernel: Injecting memory failure for pfn 0x1052e6 at process virtual address 0x7f186d127000
  43. Aug 6 17:34:57 fed26 kernel: Memory failure: 0x1052e6: recovery action for dirty LRU page: Recovered
  44. Aug 6 17:34:57 fed26 kernel: Injecting memory failure for pfn 0x18b79b at process virtual address 0x7f186d128000
  45. Aug 6 17:34:57 fed26 kernel: Memory failure: 0x18b79b: recovery action for dirty LRU page: Recovered
  46. Aug 6 17:34:57 fed26 kernel: Injecting memory failure for pfn 0x160a11 at process virtual address 0x7f186d129000
  47. Aug 6 17:34:57 fed26 kernel: Memory failure: 0x160a11: recovery action for dirty LRU page: Recovered
  48. Aug 6 17:39:54 fed26 kernel: BUG: unable to handle kernel NULL pointer dereference at 0000000000000018
  49. Aug 6 17:39:54 fed26 kernel: IP: idr_find+0x0/0x10
  50. Aug 6 17:39:54 fed26 kernel: PGD 0 P4D 0
  51. Aug 6 17:39:54 fed26 kernel: Oops: 0000 [#1] SMP PTI
  52. Aug 6 17:39:54 fed26 kernel: Modules linked in: stap_03edb2d179459fede292b29852ff2e69_66810(OE) stap_85aea90793923170bee0b12372c2b75_65382(OE) nd_s_37300(OE) sy_8117(OE) tun binfmt_misc stap_ed788b33a8ae2e8ac99e9c00924aed2e_54644(OE) stap_44d16b3c1314a75763efeef9b733e98_53528(OE) stap_b1b2a621cc77606d887e0296b2eea2d_77558(OE) loop ip6t_rpfilter ip6t_REJECT nf_reject_ipv6 xt_conntrack ip_set nfnetlink ebtable_nat ebtable_broute bridge stp llc ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle ip6table_raw ip6table_security iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack iptable_mangle iptable_raw iptable_security ebtable_filter ebtables ip6table_filter ip6_tables vmw_vsock_vmci_transport vsock sunrpc coretemp crct10dif_pclmul crc32_pclmul ghash_clmulni_intel btusb
  53. Aug 6 17:39:54 fed26 kernel: btrtl btbcm btintel bluetooth snd_ens1371 intel_rapl_perf ecdh_generic rfkill snd_ac97_codec vmw_balloon ac97_bus gameport snd_rawmidi snd_seq_device joydev snd_pcm snd_timer snd e1000 soundcore shpchp i2c_piix4 vmw_vmci xfs libcrc32c vmwgfx drm_kms_helper ttm crc32c_intel drm mptspi scsi_transport_spi serio_raw mptscsih mptbase ata_generic pata_acpi [last unloaded: stap_3986b3532b2e7496a14f459cf5747eb_50392]
  54. Aug 6 17:39:54 fed26 kernel: CPU: 5 PID: 67399 Comm: echo Tainted: G OE 4.16.11-100.fc26.x86_64 #1
  55. Aug 6 17:39:54 fed26 kernel: Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 07/02/2015
  56. Aug 6 17:39:54 fed26 kernel: RIP: 0010:idr_find+0x0/0x10
  57. Aug 6 17:39:54 fed26 kernel: RSP: 0018:ffffb44a03733d40 EFLAGS: 00010046
  58. Aug 6 17:39:54 fed26 kernel: RAX: 0000000000000000 RBX: ffffb44a034e4000 RCX: 0000000000010747
  59. Aug 6 17:39:54 fed26 kernel: RDX: 0000000000000000 RSI: 0000000000010747 RDI: 0000000000000008
  60. Aug 6 17:39:54 fed26 kernel: RBP: ffffb44a034e48a8 R08: ffffb44a072db020 R09: 0000000000002710
  61. Aug 6 17:39:54 fed26 kernel: R10: 0000000000002710 R11: 0000000000002710 R12: 0000000000000001
  62. Aug 6 17:39:54 fed26 kernel: R13: 0000000000000000 R14: 0000000000000000 R15: ffffb44a0725f000
  63. Aug 6 17:39:54 fed26 kernel: FS: 0000000000000000(0000) GS:ffff90c375740000(0000) knlGS:0000000000000000
  64. Aug 6 17:39:54 fed26 kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  65. Aug 6 17:39:54 fed26 kernel: CR2: 0000000000000018 CR3: 000000009420a006 CR4: 00000000003606e0
  66. Aug 6 17:39:54 fed26 kernel: DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
  67. Aug 6 17:39:54 fed26 kernel: DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
  68. Aug 6 17:39:54 fed26 kernel: Call Trace:
  69. Aug 6 17:39:54 fed26 kernel: find_get_pid+0x38/0x50
  70. Aug 6 17:39:54 fed26 kernel: function___global_pid2task__overload_0+0x78/0x170 [stap_03edb2d179459fede292b29852ff2e69_66810]
  71. Aug 6 17:39:54 fed26 kernel: ? probe_4373+0xa67/0x15c0 [stap_03edb2d179459fede292b29852ff2e69_66810]
  72. Aug 6 17:39:54 fed26 kernel: ? enter_real_tracepoint_probe_0+0x191/0x2c0 [stap_03edb2d179459fede292b29852ff2e69_66810]
  73. Aug 6 17:39:54 fed26 kernel: ? __schedule+0x2d3/0x860
  74. Aug 6 17:39:54 fed26 kernel: ? do_task_dead+0x3f/0x50
  75. Aug 6 17:39:54 fed26 kernel: ? do_exit+0x73b/0xbb0
  76. Aug 6 17:39:54 fed26 kernel: ? __do_page_fault+0x279/0x4e0
  77. Aug 6 17:39:54 fed26 kernel: ? do_group_exit+0x3a/0xa0
  78. Aug 6 17:39:54 fed26 kernel: ? SyS_exit_group+0x10/0x10
  79. Aug 6 17:39:54 fed26 kernel: ? do_syscall_64+0x74/0x180
  80. Aug 6 17:39:54 fed26 kernel: ? entry_SYSCALL_64_after_hwframe+0x3d/0xa2
  81. Aug 6 17:39:54 fed26 kernel: Code: e7 44 89 6c 24 04 e8 00 fe ff ff eb af e8 89 ba 80 ff 66 0f 1f 84 00 00 00 00 00 8b 47 10 31 d2 48 29 c6 e9 c3 55 00 00 0f 1f 00 <8b> 47 10 48 29 c6 e9 a5 55 00 00 0f 1f 44 00 00 55 53 48 89 f5
  82. Aug 6 17:39:54 fed26 kernel: RIP: idr_find+0x0/0x10 RSP: ffffb44a03733d40
  83. Aug 6 17:39:54 fed26 kernel: CR2: 0000000000000018
  84. Aug 6 17:39:54 fed26 kernel: ---[ end trace 57edcd697dfa8beb ]---
  85. Aug 6 17:39:54 fed26 kernel: Fixing recursive fault but reboot is needed!
  86. Aug 6 17:39:54 fed26 kernel: watchdog: BUG: soft lockup - CPU#2 stuck for 22s! [stapio:37300]
  87. Aug 6 17:39:54 fed26 kernel: Modules linked in: stap_03edb2d179459fede292b29852ff2e69_66810(OE) stap_85aea90793923170bee0b12372c2b75_65382(OE) nd_s_37300(OE) sy_8117(OE) tun binfmt_misc stap_ed788b33a8ae2e8ac99e9c00924aed2e_54644(OE) stap_44d16b3c1314a75763efeef9b733e98_53528(OE) stap_b1b2a621cc77606d887e0296b2eea2d_77558(OE) loop ip6t_rpfilter ip6t_REJECT nf_reject_ipv6 xt_conntrack ip_set nfnetlink ebtable_nat ebtable_broute bridge stp llc ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle ip6table_raw ip6table_security iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack iptable_mangle iptable_raw iptable_security ebtable_filter ebtables ip6table_filter ip6_tables vmw_vsock_vmci_transport vsock sunrpc coretemp crct10dif_pclmul crc32_pclmul ghash_clmulni_intel btusb
  88. Aug 6 17:39:54 fed26 kernel: btrtl btbcm btintel bluetooth snd_ens1371 intel_rapl_perf ecdh_generic rfkill snd_ac97_codec vmw_balloon ac97_bus gameport snd_rawmidi snd_seq_device joydev snd_pcm snd_timer snd e1000 soundcore shpchp i2c_piix4 vmw_vmci xfs libcrc32c vmwgfx drm_kms_helper ttm crc32c_intel drm mptspi scsi_transport_spi serio_raw mptscsih mptbase ata_generic pata_acpi [last unloaded: stap_3986b3532b2e7496a14f459cf5747eb_50392]
  89. Aug 6 17:39:54 fed26 kernel: CPU: 2 PID: 37300 Comm: stapio Tainted: G D OE 4.16.11-100.fc26.x86_64 #1
  90. Aug 6 17:39:54 fed26 kernel: Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 07/02/2015
  91. Aug 6 17:39:54 fed26 kernel:
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement