Advertisement
unps

journalctl

Apr 28th, 2021
191
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 11.31 KB | None | 0 0
  1. -- Logs begin at Wed 2021-04-28 17:30:44 MSK, end at Wed 2021-04-28 17:45:01 MSK. --
  2. Apr 28 17:30:44 pve02 kernel: Linux version 5.4.34-1-pve (build@pve) (gcc version 8.3.0 (Debian 8.3.0-6)) #1 SMP PVE 5.4.34-2 (Thu, 07 May 2020 10:02:02 +0200) ()
  3. Apr 28 17:30:44 pve02 kernel: Kernel command line: BOOT_IMAGE=/boot/vmlinuz-5.4.34-1-pve root=/dev/mapper/pve-root ro quiet
  4. Apr 28 17:30:44 pve02 kernel: random: get_random_u64 called from __kmem_cache_create+0x42/0x530 with crng_init=0
  5. Apr 28 17:30:44 pve02 kernel: random: crng done (trusting CPU's manufacturer)
  6. Apr 28 17:30:44 pve02 kernel: *** VALIDATE tmpfs ***
  7. Apr 28 17:30:44 pve02 kernel: *** VALIDATE proc ***
  8. Apr 28 17:30:44 pve02 kernel: *** VALIDATE cgroup1 ***
  9. Apr 28 17:30:44 pve02 kernel: *** VALIDATE cgroup2 ***
  10. Apr 28 17:30:44 pve02 kernel: #15 #16 #17 #18 #19 #20 #21 #22 #23 #24 #25 #26 #27
  11. Apr 28 17:30:44 pve02 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details.
  12. Apr 28 17:30:44 pve02 kernel: TAA CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/tsx_async_abort.html for more details.
  13. Apr 28 17:30:44 pve02 kernel: #29 #30 #31 #32 #33 #34 #35 #36 #37 #38 #39 #40 #41
  14. Apr 28 17:30:44 pve02 kernel: audit: type=2000 audit(1619620240.224:1): state=initialized audit_enabled=0 res=1
  15. Apr 28 17:30:44 pve02 kernel: ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored
  16. Apr 28 17:30:44 pve02 kernel: SCSI subsystem initialized
  17. Apr 28 17:30:44 pve02 kernel: *** VALIDATE bpf ***
  18. Apr 28 17:30:44 pve02 kernel: VFS: Disk quotas dquot_6.6.0
  19. Apr 28 17:30:44 pve02 kernel: *** VALIDATE ramfs ***
  20. Apr 28 17:30:44 pve02 kernel: *** VALIDATE hugetlbfs ***
  21. Apr 28 17:30:44 pve02 kernel: Initialise system trusted keyrings
  22. Apr 28 17:30:44 pve02 kernel: Key type blacklist registered
  23. Apr 28 17:30:44 pve02 kernel: *** VALIDATE fuse ***
  24. Apr 28 17:30:44 pve02 kernel: *** VALIDATE fuse ***
  25. Apr 28 17:30:44 pve02 kernel: Platform Keyring initialized
  26. Apr 28 17:30:44 pve02 kernel: Key type asymmetric registered
  27. Apr 28 17:30:44 pve02 kernel: Asymmetric key parser 'x509' registered
  28. Apr 28 17:30:44 pve02 kernel: platform eisa.0: EISA: Cannot allocate resource for mainboard
  29. Apr 28 17:30:44 pve02 kernel: platform eisa.0: Cannot allocate resource for EISA slot 1
  30. Apr 28 17:30:44 pve02 kernel: platform eisa.0: Cannot allocate resource for EISA slot 2
  31. Apr 28 17:30:44 pve02 kernel: platform eisa.0: Cannot allocate resource for EISA slot 3
  32. Apr 28 17:30:44 pve02 kernel: platform eisa.0: Cannot allocate resource for EISA slot 4
  33. Apr 28 17:30:44 pve02 kernel: platform eisa.0: Cannot allocate resource for EISA slot 5
  34. Apr 28 17:30:44 pve02 kernel: platform eisa.0: Cannot allocate resource for EISA slot 6
  35. Apr 28 17:30:44 pve02 kernel: platform eisa.0: Cannot allocate resource for EISA slot 7
  36. Apr 28 17:30:44 pve02 kernel: platform eisa.0: Cannot allocate resource for EISA slot 8
  37. Apr 28 17:30:44 pve02 kernel: Bridge firewalling registered
  38. Apr 28 17:30:44 pve02 kernel: Key type dns_resolver registered
  39. Apr 28 17:30:44 pve02 kernel: *** VALIDATE rdt ***
  40. Apr 28 17:30:44 pve02 kernel: Loading compiled-in X.509 certificates
  41. Apr 28 17:30:44 pve02 kernel: Loaded X.509 cert 'Build time autogenerated kernel key: c449e5885e9d432bd16bf0ec456145bfaa491117'
  42. Apr 28 17:30:44 pve02 kernel: Key type ._fscrypt registered
  43. Apr 28 17:30:44 pve02 kernel: Key type .fscrypt registered
  44. Apr 28 17:30:44 pve02 kernel: Key type big_key registered
  45. Apr 28 17:30:44 pve02 kernel: Key type encrypted registered
  46. Apr 28 17:30:44 pve02 kernel: fjes: module verification failed: signature and/or required key missing - tainting kernel
  47. Apr 28 17:30:44 pve02 kernel: scsi 9:0:0:0: Direct-Access ATA SuperMicro SSD 0R PQ: 0 ANSI: 5
  48. Apr 28 17:30:44 pve02 kernel: sd 9:0:0:0: Attached scsi generic sg0 type 0
  49. Apr 28 17:30:44 pve02 kernel: sd 9:0:0:0: [sda] 30932992 512-byte logical blocks: (15.8 GB/14.8 GiB)
  50. Apr 28 17:30:44 pve02 kernel: sd 9:0:0:0: [sda] Write Protect is off
  51. Apr 28 17:30:44 pve02 kernel: sd 9:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA
  52. Apr 28 17:30:44 pve02 kernel: sd 9:0:0:0: [sda] Attached SCSI disk
  53. Apr 28 17:30:44 pve02 kernel: scsi 0:0:0:0: Direct-Access IFT DS 1000 Series 661W PQ: 0 ANSI: 5
  54. Apr 28 17:30:44 pve02 kernel: scsi 0:0:0:1: Enclosure IFT DS 1000 Series 661W PQ: 0 ANSI: 5
  55. Apr 28 17:30:44 pve02 kernel: scsi 0:0:0:1: Power-on or device reset occurred
  56. Apr 28 17:30:44 pve02 kernel: scsi 0:0:1:0: Direct-Access IFT DS 1000 Series 661W PQ: 0 ANSI: 5
  57. Apr 28 17:30:44 pve02 kernel: scsi 0:0:1:1: Enclosure IFT DS 1000 Series 661W PQ: 0 ANSI: 5
  58. Apr 28 17:30:44 pve02 kernel: scsi 0:0:1:1: Power-on or device reset occurred
  59. Apr 28 17:30:44 pve02 kernel: sd 0:0:0:0: Attached scsi generic sg1 type 0
  60. Apr 28 17:30:44 pve02 kernel: scsi 0:0:0:1: Attached scsi generic sg2 type 13
  61. Apr 28 17:30:44 pve02 kernel: sd 0:0:1:0: Attached scsi generic sg3 type 0
  62. Apr 28 17:30:44 pve02 kernel: sd 0:0:0:0: [sdb] 209715200 512-byte logical blocks: (107 GB/100 GiB)
  63. Apr 28 17:30:44 pve02 kernel: sd 0:0:0:0: [sdb] Write Protect is off
  64. Apr 28 17:30:44 pve02 kernel: sd 0:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA
  65. Apr 28 17:30:44 pve02 kernel: scsi 0:0:1:1: Attached scsi generic sg4 type 13
  66. Apr 28 17:30:44 pve02 kernel: sd 0:0:1:0: [sdc] 209715200 512-byte logical blocks: (107 GB/100 GiB)
  67. Apr 28 17:30:44 pve02 kernel: sd 0:0:1:0: [sdc] Write Protect is off
  68. Apr 28 17:30:44 pve02 kernel: sd 0:0:1:0: [sdc] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA
  69. Apr 28 17:30:44 pve02 kernel: sd 0:0:0:0: [sdb] Attached SCSI disk
  70. Apr 28 17:30:44 pve02 kernel: ses 0:0:0:1: Attached Enclosure device
  71. Apr 28 17:30:44 pve02 kernel: sd 0:0:1:0: [sdc] Attached SCSI disk
  72. Apr 28 17:30:44 pve02 kernel: ses 0:0:1:1: Attached Enclosure device
  73. Apr 28 17:30:44 pve02 kernel: iscsi: registered transport (tcp)
  74. Apr 28 17:30:44 pve02 kernel: iscsi: registered transport (iser)
  75. Apr 28 17:30:44 pve02 kernel: spl: loading out-of-tree module taints kernel.
  76. Apr 28 17:30:44 pve02 kernel: znvpair: module license 'CDDL' taints kernel.
  77. Apr 28 17:30:44 pve02 kernel: Disabling lock debugging due to kernel taint
  78. Apr 28 17:30:44 pve02 dmeventd[869]: dmeventd ready for processing.
  79. Apr 28 17:30:44 pve02 systemd-udevd[890]: Process '/usr/bin/partx -d --nr 1-1024 /dev/sdb' failed with exit code 1.
  80. Apr 28 17:30:44 pve02 systemd-udevd[971]: Process '/usr/bin/partx -d --nr 1-1024 /dev/sdc' failed with exit code 1.
  81. Apr 28 17:30:45 pve02 kernel: power_meter ACPI000D:00: Ignoring unsafe software power cap!
  82. Apr 28 17:30:45 pve02 kernel: power_meter ACPI000D:00: hwmon_device_register() is deprecated. Please convert the driver to use hwmon_device_register_with_info().
  83. Apr 28 17:30:45 pve02 kernel: ipmi_si IPI0001:00: The BMC does not support clearing the recv irq bit, compensating, but the BMC needs to be fixed.
  84. Apr 28 17:30:46 pve02 kernel: ZFS: Loaded module v0.8.3-pve1, ZFS pool version 5000, ZFS filesystem version 5
  85. Apr 28 17:31:45 pve02 systemd-udevd[971]: Spawned process '/bin/systemd-run /sbin/lvm pvscan --cache 8:33' [1116] is taking longer than 59s to complete
  86. Apr 28 17:31:45 pve02 systemd-udevd[890]: Spawned process '/bin/systemd-run /sbin/lvm pvscan --cache 8:17' [1115] is taking longer than 59s to complete
  87. Apr 28 17:31:45 pve02 systemd-udevd[880]: sdb1: Worker [890] processing SEQNUM=6511 is taking a long time
  88. Apr 28 17:31:45 pve02 systemd-udevd[880]: sdc1: Worker [971] processing SEQNUM=6527 is taking a long time
  89. Apr 28 17:32:45 pve02 systemd[1]: systemd-udev-settle.service: Main process exited, code=exited, status=1/FAILURE
  90. Apr 28 17:32:45 pve02 systemd[1]: systemd-udev-settle.service: Failed with result 'exit-code'.
  91. Apr 28 17:32:45 pve02 systemd[1]: Failed to start udev Wait for Complete Device Initialization.
  92. Apr 28 17:32:45 pve02 systemd[1]: Dependency failed for Import ZFS pools by cache file.
  93. Apr 28 17:32:45 pve02 systemd[1]: zfs-import-cache.service: Job zfs-import-cache.service/start failed with result 'dependency'.
  94. Apr 28 17:32:45 pve02 systemd[1]: ifupdown-pre.service: Main process exited, code=exited, status=1/FAILURE
  95. Apr 28 17:32:45 pve02 systemd[1]: ifupdown-pre.service: Failed with result 'exit-code'.
  96. Apr 28 17:32:45 pve02 systemd[1]: Failed to start Helper to synchronize boot up for ifupdown.
  97. Apr 28 17:32:45 pve02 systemd[1]: Dependency failed for Raise network interfaces.
  98. Apr 28 17:32:45 pve02 systemd[1]: networking.service: Job networking.service/start failed with result 'dependency'.
  99. Apr 28 17:32:45 pve02 iscsid[1225]: iSCSI logger with pid=1227 started!
  100. Apr 28 17:32:45 pve02 pvefw-logger[1281]: starting pvefw logger
  101. Apr 28 17:32:45 pve02 kernel: audit: type=1400 audit(1619620365.408:2): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/bin/lxc-start" pid=1278 comm="apparmor_parser"
  102. Apr 28 17:32:45 pve02 kernel: audit: type=1400 audit(1619620365.412:3): apparmor="STATUS" operation="profile_load" profile="unconfined" name="nvidia_modprobe" pid=1277 comm="apparmor_parser"
  103. Apr 28 17:32:45 pve02 kernel: audit: type=1400 audit(1619620365.412:4): apparmor="STATUS" operation="profile_load" profile="unconfined" name="nvidia_modprobe//kmod" pid=1277 comm="apparmor_parser"
  104. Apr 28 17:32:45 pve02 kernel: audit: type=1400 audit(1619620365.412:5): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/bin/man" pid=1275 comm="apparmor_parser"
  105. Apr 28 17:32:45 pve02 kernel: audit: type=1400 audit(1619620365.412:6): apparmor="STATUS" operation="profile_load" profile="unconfined" name="man_filter" pid=1275 comm="apparmor_parser"
  106. Apr 28 17:32:45 pve02 kernel: audit: type=1400 audit(1619620365.412:7): apparmor="STATUS" operation="profile_load" profile="unconfined" name="man_groff" pid=1275 comm="apparmor_parser"
  107. Apr 28 17:32:45 pve02 kernel: audit: type=1400 audit(1619620365.412:8): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/sbin/tcpdump" pid=1274 comm="apparmor_parser"
  108. Apr 28 17:32:45 pve02 kernel: audit: type=1400 audit(1619620365.416:9): apparmor="STATUS" operation="profile_load" profile="unconfined" name="lxc-container-default" pid=1279 comm="apparmor_parser"
  109. Apr 28 17:32:45 pve02 kernel: audit: type=1400 audit(1619620365.416:10): apparmor="STATUS" operation="profile_load" profile="unconfined" name="lxc-container-default-cgns" pid=1279 comm="apparmor_parser"
  110. Apr 28 17:32:45 pve02 kernel: audit: type=1400 audit(1619620365.416:11): apparmor="STATUS" operation="profile_load" profile="unconfined" name="lxc-container-default-with-mounting" pid=1279 comm="apparmor_parser"
  111. Apr 28 17:32:45 pve02 unknown: Started bpfilter
  112. Apr 28 17:32:45 pve02 kernel: new mount options do not match the existing superblock, will be ignored
  113. Apr 28 17:32:45 pve02 postfix/postfix-script[1520]: warning: symlink leaves directory: /etc/postfix/./makedefs.out
  114. Apr 28 17:32:46 pve02 iscsid[1227]: iSCSI daemon with pid=1228 started!
  115. Apr 28 17:32:57 pve02 kernel: L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details.
  116. Apr 28 17:34:50 pve02 login[1972]: ROOT LOGIN on '/dev/tty1'
  117. Apr 28 17:38:58 pve02 systemd-udevd[2596]: Could not generate persistent MAC address for vmbr0: No such file or directory
  118.  
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement