Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- -- Logs begin at Wed 2021-04-28 17:30:44 MSK, end at Wed 2021-04-28 17:45:01 MSK. --
- Apr 28 17:30:44 pve02 kernel: Linux version 5.4.34-1-pve (build@pve) (gcc version 8.3.0 (Debian 8.3.0-6)) #1 SMP PVE 5.4.34-2 (Thu, 07 May 2020 10:02:02 +0200) ()
- Apr 28 17:30:44 pve02 kernel: Kernel command line: BOOT_IMAGE=/boot/vmlinuz-5.4.34-1-pve root=/dev/mapper/pve-root ro quiet
- Apr 28 17:30:44 pve02 kernel: random: get_random_u64 called from __kmem_cache_create+0x42/0x530 with crng_init=0
- Apr 28 17:30:44 pve02 kernel: random: crng done (trusting CPU's manufacturer)
- Apr 28 17:30:44 pve02 kernel: *** VALIDATE tmpfs ***
- Apr 28 17:30:44 pve02 kernel: *** VALIDATE proc ***
- Apr 28 17:30:44 pve02 kernel: *** VALIDATE cgroup1 ***
- Apr 28 17:30:44 pve02 kernel: *** VALIDATE cgroup2 ***
- Apr 28 17:30:44 pve02 kernel: #15 #16 #17 #18 #19 #20 #21 #22 #23 #24 #25 #26 #27
- Apr 28 17:30:44 pve02 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details.
- Apr 28 17:30:44 pve02 kernel: TAA CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/tsx_async_abort.html for more details.
- Apr 28 17:30:44 pve02 kernel: #29 #30 #31 #32 #33 #34 #35 #36 #37 #38 #39 #40 #41
- Apr 28 17:30:44 pve02 kernel: audit: type=2000 audit(1619620240.224:1): state=initialized audit_enabled=0 res=1
- Apr 28 17:30:44 pve02 kernel: ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored
- Apr 28 17:30:44 pve02 kernel: SCSI subsystem initialized
- Apr 28 17:30:44 pve02 kernel: *** VALIDATE bpf ***
- Apr 28 17:30:44 pve02 kernel: VFS: Disk quotas dquot_6.6.0
- Apr 28 17:30:44 pve02 kernel: *** VALIDATE ramfs ***
- Apr 28 17:30:44 pve02 kernel: *** VALIDATE hugetlbfs ***
- Apr 28 17:30:44 pve02 kernel: Initialise system trusted keyrings
- Apr 28 17:30:44 pve02 kernel: Key type blacklist registered
- Apr 28 17:30:44 pve02 kernel: *** VALIDATE fuse ***
- Apr 28 17:30:44 pve02 kernel: *** VALIDATE fuse ***
- Apr 28 17:30:44 pve02 kernel: Platform Keyring initialized
- Apr 28 17:30:44 pve02 kernel: Key type asymmetric registered
- Apr 28 17:30:44 pve02 kernel: Asymmetric key parser 'x509' registered
- Apr 28 17:30:44 pve02 kernel: platform eisa.0: EISA: Cannot allocate resource for mainboard
- Apr 28 17:30:44 pve02 kernel: platform eisa.0: Cannot allocate resource for EISA slot 1
- Apr 28 17:30:44 pve02 kernel: platform eisa.0: Cannot allocate resource for EISA slot 2
- Apr 28 17:30:44 pve02 kernel: platform eisa.0: Cannot allocate resource for EISA slot 3
- Apr 28 17:30:44 pve02 kernel: platform eisa.0: Cannot allocate resource for EISA slot 4
- Apr 28 17:30:44 pve02 kernel: platform eisa.0: Cannot allocate resource for EISA slot 5
- Apr 28 17:30:44 pve02 kernel: platform eisa.0: Cannot allocate resource for EISA slot 6
- Apr 28 17:30:44 pve02 kernel: platform eisa.0: Cannot allocate resource for EISA slot 7
- Apr 28 17:30:44 pve02 kernel: platform eisa.0: Cannot allocate resource for EISA slot 8
- Apr 28 17:30:44 pve02 kernel: Bridge firewalling registered
- Apr 28 17:30:44 pve02 kernel: Key type dns_resolver registered
- Apr 28 17:30:44 pve02 kernel: *** VALIDATE rdt ***
- Apr 28 17:30:44 pve02 kernel: Loading compiled-in X.509 certificates
- Apr 28 17:30:44 pve02 kernel: Loaded X.509 cert 'Build time autogenerated kernel key: c449e5885e9d432bd16bf0ec456145bfaa491117'
- Apr 28 17:30:44 pve02 kernel: Key type ._fscrypt registered
- Apr 28 17:30:44 pve02 kernel: Key type .fscrypt registered
- Apr 28 17:30:44 pve02 kernel: Key type big_key registered
- Apr 28 17:30:44 pve02 kernel: Key type encrypted registered
- Apr 28 17:30:44 pve02 kernel: fjes: module verification failed: signature and/or required key missing - tainting kernel
- Apr 28 17:30:44 pve02 kernel: scsi 9:0:0:0: Direct-Access ATA SuperMicro SSD 0R PQ: 0 ANSI: 5
- Apr 28 17:30:44 pve02 kernel: sd 9:0:0:0: Attached scsi generic sg0 type 0
- Apr 28 17:30:44 pve02 kernel: sd 9:0:0:0: [sda] 30932992 512-byte logical blocks: (15.8 GB/14.8 GiB)
- Apr 28 17:30:44 pve02 kernel: sd 9:0:0:0: [sda] Write Protect is off
- Apr 28 17:30:44 pve02 kernel: sd 9:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA
- Apr 28 17:30:44 pve02 kernel: sd 9:0:0:0: [sda] Attached SCSI disk
- Apr 28 17:30:44 pve02 kernel: scsi 0:0:0:0: Direct-Access IFT DS 1000 Series 661W PQ: 0 ANSI: 5
- Apr 28 17:30:44 pve02 kernel: scsi 0:0:0:1: Enclosure IFT DS 1000 Series 661W PQ: 0 ANSI: 5
- Apr 28 17:30:44 pve02 kernel: scsi 0:0:0:1: Power-on or device reset occurred
- Apr 28 17:30:44 pve02 kernel: scsi 0:0:1:0: Direct-Access IFT DS 1000 Series 661W PQ: 0 ANSI: 5
- Apr 28 17:30:44 pve02 kernel: scsi 0:0:1:1: Enclosure IFT DS 1000 Series 661W PQ: 0 ANSI: 5
- Apr 28 17:30:44 pve02 kernel: scsi 0:0:1:1: Power-on or device reset occurred
- Apr 28 17:30:44 pve02 kernel: sd 0:0:0:0: Attached scsi generic sg1 type 0
- Apr 28 17:30:44 pve02 kernel: scsi 0:0:0:1: Attached scsi generic sg2 type 13
- Apr 28 17:30:44 pve02 kernel: sd 0:0:1:0: Attached scsi generic sg3 type 0
- Apr 28 17:30:44 pve02 kernel: sd 0:0:0:0: [sdb] 209715200 512-byte logical blocks: (107 GB/100 GiB)
- Apr 28 17:30:44 pve02 kernel: sd 0:0:0:0: [sdb] Write Protect is off
- Apr 28 17:30:44 pve02 kernel: sd 0:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA
- Apr 28 17:30:44 pve02 kernel: scsi 0:0:1:1: Attached scsi generic sg4 type 13
- Apr 28 17:30:44 pve02 kernel: sd 0:0:1:0: [sdc] 209715200 512-byte logical blocks: (107 GB/100 GiB)
- Apr 28 17:30:44 pve02 kernel: sd 0:0:1:0: [sdc] Write Protect is off
- Apr 28 17:30:44 pve02 kernel: sd 0:0:1:0: [sdc] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA
- Apr 28 17:30:44 pve02 kernel: sd 0:0:0:0: [sdb] Attached SCSI disk
- Apr 28 17:30:44 pve02 kernel: ses 0:0:0:1: Attached Enclosure device
- Apr 28 17:30:44 pve02 kernel: sd 0:0:1:0: [sdc] Attached SCSI disk
- Apr 28 17:30:44 pve02 kernel: ses 0:0:1:1: Attached Enclosure device
- Apr 28 17:30:44 pve02 kernel: iscsi: registered transport (tcp)
- Apr 28 17:30:44 pve02 kernel: iscsi: registered transport (iser)
- Apr 28 17:30:44 pve02 kernel: spl: loading out-of-tree module taints kernel.
- Apr 28 17:30:44 pve02 kernel: znvpair: module license 'CDDL' taints kernel.
- Apr 28 17:30:44 pve02 kernel: Disabling lock debugging due to kernel taint
- Apr 28 17:30:44 pve02 dmeventd[869]: dmeventd ready for processing.
- Apr 28 17:30:44 pve02 systemd-udevd[890]: Process '/usr/bin/partx -d --nr 1-1024 /dev/sdb' failed with exit code 1.
- Apr 28 17:30:44 pve02 systemd-udevd[971]: Process '/usr/bin/partx -d --nr 1-1024 /dev/sdc' failed with exit code 1.
- Apr 28 17:30:45 pve02 kernel: power_meter ACPI000D:00: Ignoring unsafe software power cap!
- Apr 28 17:30:45 pve02 kernel: power_meter ACPI000D:00: hwmon_device_register() is deprecated. Please convert the driver to use hwmon_device_register_with_info().
- Apr 28 17:30:45 pve02 kernel: ipmi_si IPI0001:00: The BMC does not support clearing the recv irq bit, compensating, but the BMC needs to be fixed.
- Apr 28 17:30:46 pve02 kernel: ZFS: Loaded module v0.8.3-pve1, ZFS pool version 5000, ZFS filesystem version 5
- Apr 28 17:31:45 pve02 systemd-udevd[971]: Spawned process '/bin/systemd-run /sbin/lvm pvscan --cache 8:33' [1116] is taking longer than 59s to complete
- Apr 28 17:31:45 pve02 systemd-udevd[890]: Spawned process '/bin/systemd-run /sbin/lvm pvscan --cache 8:17' [1115] is taking longer than 59s to complete
- Apr 28 17:31:45 pve02 systemd-udevd[880]: sdb1: Worker [890] processing SEQNUM=6511 is taking a long time
- Apr 28 17:31:45 pve02 systemd-udevd[880]: sdc1: Worker [971] processing SEQNUM=6527 is taking a long time
- Apr 28 17:32:45 pve02 systemd[1]: systemd-udev-settle.service: Main process exited, code=exited, status=1/FAILURE
- Apr 28 17:32:45 pve02 systemd[1]: systemd-udev-settle.service: Failed with result 'exit-code'.
- Apr 28 17:32:45 pve02 systemd[1]: Failed to start udev Wait for Complete Device Initialization.
- Apr 28 17:32:45 pve02 systemd[1]: Dependency failed for Import ZFS pools by cache file.
- Apr 28 17:32:45 pve02 systemd[1]: zfs-import-cache.service: Job zfs-import-cache.service/start failed with result 'dependency'.
- Apr 28 17:32:45 pve02 systemd[1]: ifupdown-pre.service: Main process exited, code=exited, status=1/FAILURE
- Apr 28 17:32:45 pve02 systemd[1]: ifupdown-pre.service: Failed with result 'exit-code'.
- Apr 28 17:32:45 pve02 systemd[1]: Failed to start Helper to synchronize boot up for ifupdown.
- Apr 28 17:32:45 pve02 systemd[1]: Dependency failed for Raise network interfaces.
- Apr 28 17:32:45 pve02 systemd[1]: networking.service: Job networking.service/start failed with result 'dependency'.
- Apr 28 17:32:45 pve02 iscsid[1225]: iSCSI logger with pid=1227 started!
- Apr 28 17:32:45 pve02 pvefw-logger[1281]: starting pvefw logger
- Apr 28 17:32:45 pve02 kernel: audit: type=1400 audit(1619620365.408:2): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/bin/lxc-start" pid=1278 comm="apparmor_parser"
- Apr 28 17:32:45 pve02 kernel: audit: type=1400 audit(1619620365.412:3): apparmor="STATUS" operation="profile_load" profile="unconfined" name="nvidia_modprobe" pid=1277 comm="apparmor_parser"
- Apr 28 17:32:45 pve02 kernel: audit: type=1400 audit(1619620365.412:4): apparmor="STATUS" operation="profile_load" profile="unconfined" name="nvidia_modprobe//kmod" pid=1277 comm="apparmor_parser"
- Apr 28 17:32:45 pve02 kernel: audit: type=1400 audit(1619620365.412:5): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/bin/man" pid=1275 comm="apparmor_parser"
- Apr 28 17:32:45 pve02 kernel: audit: type=1400 audit(1619620365.412:6): apparmor="STATUS" operation="profile_load" profile="unconfined" name="man_filter" pid=1275 comm="apparmor_parser"
- Apr 28 17:32:45 pve02 kernel: audit: type=1400 audit(1619620365.412:7): apparmor="STATUS" operation="profile_load" profile="unconfined" name="man_groff" pid=1275 comm="apparmor_parser"
- Apr 28 17:32:45 pve02 kernel: audit: type=1400 audit(1619620365.412:8): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/sbin/tcpdump" pid=1274 comm="apparmor_parser"
- Apr 28 17:32:45 pve02 kernel: audit: type=1400 audit(1619620365.416:9): apparmor="STATUS" operation="profile_load" profile="unconfined" name="lxc-container-default" pid=1279 comm="apparmor_parser"
- Apr 28 17:32:45 pve02 kernel: audit: type=1400 audit(1619620365.416:10): apparmor="STATUS" operation="profile_load" profile="unconfined" name="lxc-container-default-cgns" pid=1279 comm="apparmor_parser"
- Apr 28 17:32:45 pve02 kernel: audit: type=1400 audit(1619620365.416:11): apparmor="STATUS" operation="profile_load" profile="unconfined" name="lxc-container-default-with-mounting" pid=1279 comm="apparmor_parser"
- Apr 28 17:32:45 pve02 unknown: Started bpfilter
- Apr 28 17:32:45 pve02 kernel: new mount options do not match the existing superblock, will be ignored
- Apr 28 17:32:45 pve02 postfix/postfix-script[1520]: warning: symlink leaves directory: /etc/postfix/./makedefs.out
- Apr 28 17:32:46 pve02 iscsid[1227]: iSCSI daemon with pid=1228 started!
- Apr 28 17:32:57 pve02 kernel: L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details.
- Apr 28 17:34:50 pve02 login[1972]: ROOT LOGIN on '/dev/tty1'
- Apr 28 17:38:58 pve02 systemd-udevd[2596]: Could not generate persistent MAC address for vmbr0: No such file or directory
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement